ecuting program 1: 13:42:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x1b\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4008af03, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) 13:42:10 executing program 2: 13:42:10 executing program 1: 13:42:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000000d8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2064.705622][T15238] hfs: unable to load codepage "maccroat [ 2064.705622][T15238] an" [ 2064.739110][T15238] hfs: unable to parse mount options [ 2064.851529][T15238] hfs: unable to load codepage "maccroat [ 2064.851529][T15238] an" [ 2064.873530][T15238] hfs: unable to parse mount options 13:42:10 executing program 2: 13:42:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4008af03, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) 13:42:10 executing program 1: 13:42:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x1c\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:10 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroat%an'}}]}) 13:42:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000000e8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:10 executing program 2: 13:42:10 executing program 1: 13:42:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4008af03, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) 13:42:10 executing program 2: 13:42:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000000f8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:10 executing program 1: [ 2065.186432][T15269] hfs: unable to load codepage "maccroat%an" [ 2065.205785][T15269] hfs: unable to parse mount options 13:42:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x1d\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:10 executing program 2: 13:42:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000002c0)={0x2, 0x0, [{0x0, 0x0, 0x0}, {0x6000, 0x45, &(0x7f00000001c0)=""/69}]}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4008af03, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) 13:42:10 executing program 1: [ 2065.364062][T15269] hfs: unable to load codepage "maccroat%an" [ 2065.371563][T15269] hfs: unable to parse mount options 13:42:10 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroati\nn'}}]}) 13:42:10 executing program 2: 13:42:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000002c0)={0x1, 0x0, [{0x0, 0x0, 0x0}]}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4008af03, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) 13:42:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000108000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:10 executing program 1: 13:42:10 executing program 2: 13:42:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x1e\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:11 executing program 1: 13:42:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000002c0)={0x1, 0x0, [{0x0, 0x0, 0x0}]}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4008af03, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 2065.701657][T15303] hfs: unable to load codepage "maccroati [ 2065.701657][T15303] n" 13:42:11 executing program 2: [ 2065.747400][T15303] hfs: unable to parse mount options 13:42:11 executing program 1: 13:42:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000118000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2065.890371][T15303] hfs: unable to load codepage "maccroati [ 2065.890371][T15303] n" [ 2065.946799][T15303] hfs: unable to parse mount options 13:42:11 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroati%n'}}]}) 13:42:11 executing program 2: 13:42:11 executing program 1: 13:42:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000002c0)={0x1, 0x0, [{0x0, 0x0, 0x0}]}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4008af03, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) 13:42:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 !\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:11 executing program 1: 13:42:11 executing program 2: 13:42:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000002c0)={0x2, 0x0, [{0x0, 0x0, 0x0}, {0x0, 0x45, &(0x7f00000001c0)=""/69}]}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4008af03, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) 13:42:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000128000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:11 executing program 1: 13:42:11 executing program 2: [ 2066.222068][T15335] hfs: unable to load codepage "maccroati%n" [ 2066.252276][T15335] hfs: unable to parse mount options 13:42:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000002c0)={0x2, 0x0, [{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}]}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4008af03, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 2066.386149][T15335] hfs: unable to load codepage "maccroati%n" [ 2066.393341][T15335] hfs: unable to parse mount options 13:42:11 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatia\n'}}]}) 13:42:11 executing program 1: 13:42:11 executing program 2: 13:42:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \"\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000002c0)={0x1, 0x0, [{0x0, 0x0, 0x0}]}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4008af03, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) 13:42:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000138000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:11 executing program 2: 13:42:11 executing program 1: 13:42:12 executing program 1: 13:42:12 executing program 2: 13:42:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000002c0)={0x1, 0x0, [{0x0, 0x0, 0x0}]}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4008af03, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) 13:42:12 executing program 1: [ 2066.754597][T15366] hfs: unable to load codepage "maccroatia [ 2066.754597][T15366] " [ 2066.793680][T15366] hfs: unable to parse mount options [ 2066.925184][T15366] hfs: unable to load codepage "maccroatia [ 2066.925184][T15366] " [ 2066.948928][T15366] hfs: unable to parse mount options 13:42:12 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatia%'}}]}) 13:42:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 #\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:12 executing program 2: 13:42:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000148000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000002c0)={0x1, 0x0, [{0x0, 0x0, 0x0}]}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4008af03, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) 13:42:12 executing program 1: 13:42:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000002c0)={0x2, 0x0, [{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}]}) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4008af03, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) 13:42:12 executing program 1: 13:42:12 executing program 2: 13:42:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000158000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2067.237765][T15394] hfs: unable to load codepage "maccroatia%" [ 2067.245252][T15394] hfs: unable to parse mount options 13:42:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000002c0)={0x2, 0x0, [{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}]}) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4008af03, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) 13:42:12 executing program 1: [ 2067.367339][T15394] hfs: unable to load codepage "maccroatia%" [ 2067.380948][T15394] hfs: unable to parse mount options 13:42:12 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}, 0x45}]}) 13:42:12 executing program 2: 13:42:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 $\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:12 executing program 1: 13:42:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000002c0)={0x2, 0x0, [{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}]}) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4008af03, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) 13:42:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000168000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:12 executing program 1: 13:42:13 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x2f, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="006340400000000000000000000000013fa849006b1c1c5c024000000000000000000000000000000000000000007d"], 0x0, 0x0, 0x0}) 13:42:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000002c0)={0x2, 0x0, [{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}]}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4008af03, 0x0) 13:42:13 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)={0x2001}) [ 2067.656976][T15417] hfs: unable to load codepage "maccroatianE" [ 2067.663337][T15417] hfs: unable to parse mount options [ 2067.691045][T15425] binder: 15423:15425 transaction failed 29189/-22, size 0-8192000 line 2995 13:42:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000002c0)={0x2, 0x0, [{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}]}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4008af03, 0x0) [ 2067.769528][ T4562] binder: undelivered TRANSACTION_ERROR: 29189 [ 2067.774645][T15417] hfs: unable to load codepage "maccroatianE" [ 2067.785965][T15417] hfs: unable to parse mount options 13:42:13 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x10000) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\n\x00L\xff\xff\xff\xc3`\x00\x06'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 13:42:13 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x2}) 13:42:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 %\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000178000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000000)) [ 2068.007678][T15451] device team0 entered promiscuous mode 13:42:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000002c0)={0x2, 0x0, [{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}]}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4008af03, 0x0) 13:42:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \"\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2068.050469][T15451] device team_slave_0 entered promiscuous mode [ 2068.111819][T15451] device team_slave_1 entered promiscuous mode [ 2068.172154][T15451] 8021q: adding VLAN 0 to HW filter on device team0 [ 2068.208684][T15455] hfs: unable to parse mount options 13:42:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000188000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 !\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 &\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2068.319687][T15451] device team0 left promiscuous mode [ 2068.328512][T15455] hfs: unable to parse mount options [ 2068.342672][T15451] device team_slave_0 left promiscuous mode 13:42:13 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x3}) [ 2068.397359][T15451] device team_slave_1 left promiscuous mode 13:42:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000198000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2068.560400][T15476] hfs: unable to parse mount options [ 2068.664772][T15476] hfs: unable to parse mount options [ 2068.827175][T15466] device team0 entered promiscuous mode [ 2068.851361][T15466] device team_slave_0 entered promiscuous mode [ 2068.861172][T15466] device team_slave_1 entered promiscuous mode [ 2068.889206][T15466] 8021q: adding VLAN 0 to HW filter on device team0 13:42:14 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x10000) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\n\x00L\xff\xff\xff\xc3`\x00\x06'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 13:42:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \"\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:14 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x4}) 13:42:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \'\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 %\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000001a8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2069.128750][T15495] hfs: unable to parse mount options [ 2069.182871][T15501] device team0 left promiscuous mode 13:42:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000001b8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2069.231453][T15501] device team_slave_0 left promiscuous mode [ 2069.252946][T15495] hfs: unable to parse mount options 13:42:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 (\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x1d\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 %\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2069.294799][T15501] device team_slave_1 left promiscuous mode 13:42:14 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x5}) 13:42:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000001c8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2069.620698][T15518] hfs: unable to parse mount options [ 2069.717132][T15518] hfs: unable to parse mount options [ 2070.039684][T15503] device team0 entered promiscuous mode [ 2070.056485][T15503] device team_slave_0 entered promiscuous mode [ 2070.071859][T15503] device team_slave_1 entered promiscuous mode [ 2070.097938][T15503] 8021q: adding VLAN 0 to HW filter on device team0 13:42:15 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x10000) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\n\x00L\xff\xff\xff\xc3`\x00\x06'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 13:42:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 )\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x16\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:15 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x6}) 13:42:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x14\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000001d8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2070.250797][T15535] hfs: unable to parse mount options [ 2070.306991][T15542] device team0 left promiscuous mode [ 2070.346684][T15542] device team_slave_0 left promiscuous mode [ 2070.389025][T15535] hfs: unable to parse mount options [ 2070.395759][T15542] device team_slave_1 left promiscuous mode 13:42:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000001e8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:15 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x7}) 13:42:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 *\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 )\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x10\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2070.664796][T15554] hfs: unable to parse mount options 13:42:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000001f8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2070.802689][T15554] hfs: unable to parse mount options [ 2071.182509][T15544] device team0 entered promiscuous mode [ 2071.201900][T15544] device team_slave_0 entered promiscuous mode [ 2071.222285][T15544] device team_slave_1 entered promiscuous mode [ 2071.243205][T15544] 8021q: adding VLAN 0 to HW filter on device team0 13:42:16 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x10000) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\n\x00L\xff\xff\xff\xc3`\x00\x06'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 13:42:16 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x8}) 13:42:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 +\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000208000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x0f\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \r\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2071.501599][T15579] hfs: unable to parse mount options [ 2071.517536][T15586] device team0 left promiscuous mode 13:42:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000218000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2071.542774][T15586] device team_slave_0 left promiscuous mode [ 2071.567666][T15586] device team_slave_1 left promiscuous mode [ 2071.622914][T15579] hfs: unable to parse mount options 13:42:17 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x9}) 13:42:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 ,\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \r\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \t\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000228000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2071.868752][T15594] hfs: unable to parse mount options [ 2071.963986][T15594] hfs: unable to parse mount options [ 2072.387147][T15583] device team0 entered promiscuous mode [ 2072.392835][T15583] device team_slave_0 entered promiscuous mode [ 2072.406861][T15583] device team_slave_1 entered promiscuous mode [ 2072.417943][T15583] 8021q: adding VLAN 0 to HW filter on device team0 13:42:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x02\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:17 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xa}) 13:42:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000238000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x05\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 -\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x04\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2072.553966][T15615] hfs: unable to parse mount options [ 2072.698910][T15615] hfs: unable to parse mount options 13:42:18 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xe}) 13:42:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00\x0f\x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000248000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000", 0x76, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00, \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 G\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x04\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2072.945640][T15628] hfs: unable to parse mount options [ 2073.026152][T15628] hfs: unable to parse mount options 13:42:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000", 0x76, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00, \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:18 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x10}) 13:42:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000258000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2073.310854][T15646] hfs: unable to parse mount options 13:42:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 y\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00& \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00! \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:18 executing program 2: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, '\naccroatian'}}]}) [ 2073.427058][T15646] hfs: unable to parse mount options 13:42:18 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x23}) 13:42:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000268000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2073.667671][T15663] hfs: unable to parse mount options [ 2073.740461][T15660] hfs: unable to load codepage " [ 2073.740461][T15660] accroatian" [ 2073.775060][T15663] hfs: unable to parse mount options [ 2073.787179][T15660] hfs: unable to parse mount options 13:42:19 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x48}) 13:42:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \xe4\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x11 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:19 executing program 2: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, '\naccroatian'}}]}) 13:42:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00& \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2074.063920][T15680] hfs: unable to parse mount options 13:42:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000278000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2074.174473][T15686] hfs: unable to load codepage " [ 2074.174473][T15686] accroatian" [ 2074.184358][T15680] hfs: unable to parse mount options [ 2074.206770][T15686] hfs: unable to parse mount options 13:42:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x03\x00+\x86a\x957s\x16FA\x00'}}) 13:42:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x06 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:19 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x4c}) 13:42:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x05 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:19 executing program 2: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, '\naccroatian'}}]}) 13:42:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000288000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2074.552414][T15701] hfs: unable to parse mount options [ 2074.581258][T15706] hfs: unable to load codepage " [ 2074.581258][T15706] accroatian" [ 2074.608585][T15706] hfs: unable to parse mount options [ 2074.688457][T15701] hfs: unable to parse mount options 13:42:20 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, '\naccroatian'}}]}) 13:42:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x06 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x90\x03\x00+\x86a\x957s\x16FA\x00'}}) 13:42:20 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x60}) 13:42:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000298000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00\x0f\x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:20 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, '\naccroatian'}}]}) [ 2075.027779][T15725] hfs: unable to parse mount options 13:42:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000002a8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2075.161664][T15725] hfs: unable to parse mount options 13:42:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\xe4 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x05\x00+\x86a\x957s\x16FA\x00'}}) 13:42:20 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, '\naccroatian'}}]}) 13:42:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00\x0f\x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:20 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x68}) 13:42:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000002b8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2075.530031][T15754] hfs: unable to parse mount options 13:42:21 executing program 2: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, '\naccroatian'}}]}) 13:42:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x06\x00+\x86a\x957s\x16FA\x00'}}) [ 2075.634876][T15754] hfs: unable to parse mount options 13:42:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\xe4 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00+ \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:21 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x6c}) 13:42:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000002c8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:21 executing program 2: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, '\naccroatian'}}]}) [ 2075.905591][T15773] hfs: unable to parse mount options 13:42:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 =\x06\x00+\x86a\x957s\x16FA\x00'}}) [ 2076.050883][T15773] hfs: unable to parse mount options 13:42:21 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x74}) 13:42:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:21 executing program 2: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, '\naccroatian'}}]}) 13:42:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00+ \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000002d8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2076.340284][T15791] hfs: unable to parse mount options 13:42:21 executing program 2: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:21 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x7a}) 13:42:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x91\x06\x00+\x86a\x957s\x16FA\x00'}}) 13:42:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2076.548325][T15804] hfs: can't find a HFS filesystem on dev loop2 13:42:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00( \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:22 executing program 2: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000002e8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2076.696969][T15810] hfs: unable to parse mount options 13:42:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\a\x00+\x86a\x957s\x16FA\x00'}}) [ 2076.850052][T15810] hfs: unable to parse mount options 13:42:22 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x300}) [ 2076.892179][T15818] hfs: can't find a HFS filesystem on dev loop2 13:42:22 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:22 executing program 2: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x91\x06\x00+\x86a\x957s\x16FA\x00'}}) [ 2077.102807][T15832] hfs: can't find a HFS filesystem on dev loop5 13:42:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\t\x00+\x86a\x957s\x16FA\x00'}}) 13:42:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000002f8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2077.290349][T15840] hfs: can't find a HFS filesystem on dev loop2 [ 2077.338802][T15832] hfs: can't find a HFS filesystem on dev loop5 13:42:22 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:22 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x500}) 13:42:22 executing program 2: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 13:42:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00& \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\n\x00+\x86a\x957s\x16FA\x00'}}) 13:42:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000308000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:23 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2077.756793][T15862] hfs: can't find a HFS filesystem on dev loop2 13:42:23 executing program 2: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) [ 2077.828617][T15865] hfs: can't find a HFS filesystem on dev loop5 13:42:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\t\x00+\x86a\x957s\x16FA\x00'}}) 13:42:23 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x600}) 13:42:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\v\x00+\x86a\x957s\x16FA\x00'}}) [ 2078.117470][T15878] hfs: can't find a HFS filesystem on dev loop2 13:42:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000318000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:23 executing program 2: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) [ 2078.316899][T15887] hfs: can't find a HFS filesystem on dev loop5 13:42:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\f\x00+\x86a\x957s\x16FA\x00'}}) 13:42:23 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x700}) [ 2078.469891][T15894] hfs: can't find a HFS filesystem on dev loop2 13:42:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\xdf! \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000328000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\xa8\x1b \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2078.756607][T15909] hfs: can't find a HFS filesystem on dev loop5 13:42:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\r\x00+\x86a\x957s\x16FA\x00'}}) 13:42:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000338000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2078.939458][T15909] hfs: can't find a HFS filesystem on dev loop5 13:42:24 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x900}) 13:42:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x1a \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x18 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x0e\x00+\x86a\x957s\x16FA\x00'}}) 13:42:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000348000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2079.249024][T15931] hfs: can't find a HFS filesystem on dev loop5 13:42:24 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xa00}) 13:42:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x1a \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x18 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000358000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2079.618134][T15951] hfs: can't find a HFS filesystem on dev loop5 13:42:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 !\x0e\x00+\x86a\x957s\x16FA\x00'}}) 13:42:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2079.739098][T15951] hfs: can't find a HFS filesystem on dev loop5 13:42:25 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xe00}) 13:42:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x12 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000368000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) [ 2080.041889][T15974] hfs: can't find a HFS filesystem on dev loop5 13:42:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00!\x0e \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2080.134870][T15974] hfs: can't find a HFS filesystem on dev loop5 13:42:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x0f\x00+\x86a\x957s\x16FA\x00'}}) 13:42:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000378000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:25 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xf22}) 13:42:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 13:42:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x0e \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2080.451563][T15993] hfs: unable to parse mount options [ 2080.608760][T15993] hfs: unable to parse mount options 13:42:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 13:42:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x11\x00+\x86a\x957s\x16FA\x00'}}) 13:42:26 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x1020}) 13:42:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000388000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\v \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 13:42:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x100) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x10000}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000000c0)={0x0, r3}) fgetxattr(r2, &(0x7f0000000200)=@known='system.sockprotoname\x00', &(0x7f0000000240)=""/107, 0x6b) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000140)={0x1, 0x0, [], {0x0, @reserved}}) syz_mount_image$hfs(&(0x7f0000000d40)='hfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002200)=ANY=[@ANYBLOB="0000000000004510b1c60000000000"]) timerfd_create(0xd, 0x80000) [ 2080.915931][T16014] hfs: unable to parse mount options 13:42:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x12\x00+\x86a\x957s\x16FA\x00'}}) 13:42:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000398000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2081.034691][T16014] hfs: unable to parse mount options 13:42:26 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x1f00}) 13:42:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x100) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x10000}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000000c0)={0x0, r3}) fgetxattr(r2, &(0x7f0000000200)=@known='system.sockprotoname\x00', &(0x7f0000000240)=""/107, 0x6b) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000140)={0x1, 0x0, [], {0x0, @reserved}}) syz_mount_image$hfs(&(0x7f0000000d40)='hfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002200)=ANY=[@ANYBLOB="0000000000004510b1c60000000000"]) timerfd_create(0xd, 0x80000) 13:42:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 13:42:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\n \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000003a8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2081.328203][T16034] hfs: can't find a HFS filesystem on dev loop5 13:42:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x100) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x10000}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000000c0)={0x0, r3}) fgetxattr(r2, &(0x7f0000000200)=@known='system.sockprotoname\x00', &(0x7f0000000240)=""/107, 0x6b) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000140)={0x1, 0x0, [], {0x0, @reserved}}) syz_mount_image$hfs(&(0x7f0000000d40)='hfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002200)=ANY=[@ANYBLOB="0000000000004510b1c60000000000"]) timerfd_create(0xd, 0x80000) 13:42:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x13\x00+\x86a\x957s\x16FA\x00'}}) [ 2081.405578][T16034] hfs: can't find a HFS filesystem on dev loop5 13:42:26 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x2000}) 13:42:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 13:42:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x100) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x10000}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000000c0)={0x0, r3}) fgetxattr(r2, &(0x7f0000000200)=@known='system.sockprotoname\x00', &(0x7f0000000240)=""/107, 0x6b) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000140)={0x1, 0x0, [], {0x0, @reserved}}) syz_mount_image$hfs(&(0x7f0000000d40)='hfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002200)=ANY=[@ANYBLOB="0000000000004510b1c60000000000"]) 13:42:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000003b8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x14\x00+\x86a\x957s\x16FA\x00'}}) 13:42:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\t \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x100) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x10000}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000000c0)={0x0, r3}) fgetxattr(r2, &(0x7f0000000200)=@known='system.sockprotoname\x00', &(0x7f0000000240)=""/107, 0x6b) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000140)={0x1, 0x0, [], {0x0, @reserved}}) [ 2081.780276][T16055] hfs: can't find a HFS filesystem on dev loop5 13:42:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) [ 2081.889464][T16055] hfs: can't find a HFS filesystem on dev loop5 13:42:27 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x2010}) 13:42:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x100) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x10000}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000000c0)={0x0, r3}) fgetxattr(r2, &(0x7f0000000200)=@known='system.sockprotoname\x00', &(0x7f0000000240)=""/107, 0x6b) 13:42:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000003c8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\a \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) [ 2082.165491][T16082] hfs: unable to parse mount options 13:42:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x15\x00+\x86a\x957s\x16FA\x00'}}) 13:42:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x100) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x10000}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000000c0)={0x0, r3}) fgetxattr(r2, &(0x7f0000000200)=@known='system.sockprotoname\x00', &(0x7f0000000240)=""/107, 0x6b) [ 2082.256978][T16082] hfs: unable to parse mount options 13:42:27 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x220f}) 13:42:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x100) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x10000}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000000c0)={0x0, r3}) 13:42:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 13:42:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000003d8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2082.549768][T16102] hfs: unable to parse mount options 13:42:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x100) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x10000}) 13:42:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x16\x00+\x86a\x957s\x16FA\x00'}}) 13:42:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x14\x00+\x86a\x957s\x16FA\x00'}}) 13:42:28 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x2300}) 13:42:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, 0x0) 13:42:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x100) 13:42:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x17\x00+\x86a\x957s\x16FA\x00'}}) [ 2082.818823][T16119] hfs: can't find a HFS filesystem on dev loop5 13:42:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000003e8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2082.977362][T16119] hfs: can't find a HFS filesystem on dev loop5 13:42:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, 0x0) 13:42:28 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x3f00}) 13:42:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x100) 13:42:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x18\x00+\x86a\x957s\x16FA\x00'}}) 13:42:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000003f8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x100) 13:42:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, 0x0) 13:42:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) [ 2083.407094][T16150] hfs: can't find a HFS filesystem on dev loop5 13:42:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x100) 13:42:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000408000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2083.619922][T16150] hfs: can't find a HFS filesystem on dev loop5 13:42:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) 13:42:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x19\x00+\x86a\x957s\x16FA\x00'}}) 13:42:29 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x4000}) 13:42:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 13:42:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) 13:42:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000418000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 13:42:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:29 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x800) [ 2084.033018][T16179] hfs: can't find a HFS filesystem on dev loop5 13:42:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x1a\x00+\x86a\x957s\x16FA\x00'}}) [ 2084.156238][T16179] hfs: can't find a HFS filesystem on dev loop5 13:42:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000428000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:29 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x4244}) 13:42:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) 13:42:29 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x800) 13:42:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 13:42:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x1b\x00+\x86a\x957s\x16FA\x00'}}) 13:42:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) 13:42:29 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x800) 13:42:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000438000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2084.523662][T16208] hfs: unable to parse mount options 13:42:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) 13:42:30 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x4442}) 13:42:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000", 0x3f, 0x10000}], 0x0, 0x0) 13:42:30 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x800) 13:42:30 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x800) 13:42:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000448000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \xa8\x1b\x00+\x86a\x957s\x16FA\x00'}}) 13:42:30 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x800) 13:42:30 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x800) [ 2084.917875][T16236] hfs: unable to parse mount options 13:42:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000", 0x3f, 0x10000}], 0x0, 0x0) 13:42:30 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x800) [ 2085.013931][T16236] hfs: unable to parse mount options 13:42:30 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x800) 13:42:30 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x4800}) 13:42:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000458000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x800) 13:42:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x1c\x00+\x86a\x957s\x16FA\x00'}}) 13:42:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000", 0x3f, 0x10000}], 0x0, 0x0) 13:42:30 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x800) 13:42:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x800) [ 2085.363996][T16263] hfs: can't find a HFS filesystem on dev loop5 13:42:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000468000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:30 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x800) 13:42:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 13:42:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x800) [ 2085.496019][T16263] hfs: can't find a HFS filesystem on dev loop5 13:42:30 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x4c00}) 13:42:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x1d\x00+\x86a\x957s\x16FA\x00'}}) 13:42:31 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x800) 13:42:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:31 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x800) 13:42:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000478000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2085.894617][T16294] hfs: can't find a HFS filesystem on dev loop5 13:42:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 13:42:31 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x800) 13:42:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:31 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x4d50}) 13:42:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x1e\x00+\x86a\x957s\x16FA\x00'}}) 13:42:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000488000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) [ 2086.221644][T16316] hfs: unable to parse mount options 13:42:31 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x800) 13:42:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) [ 2086.314594][T16316] hfs: unable to parse mount options 13:42:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x1f\x00+\x86a\x957s\x16FA\x00'}}) 13:42:31 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x504d}) 13:42:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 2086.562037][T16340] hfs: unable to parse mount options 13:42:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000498000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) [ 2086.684327][T16340] hfs: unable to parse mount options 13:42:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00 \x00+\x86a\x957s\x16FA\x00'}}) 13:42:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:32 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x5354}) 13:42:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 13:42:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000004a8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00!\x00+\x86a\x957s\x16FA\x00'}}) 13:42:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) [ 2087.016852][T16368] hfs: unable to parse mount options 13:42:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 13:42:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) [ 2087.127827][T16368] hfs: unable to parse mount options 13:42:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:32 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x5453}) 13:42:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000004b8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) [ 2087.351162][T16391] hfs: unable to parse mount options 13:42:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) [ 2087.490318][T16391] hfs: unable to parse mount options 13:42:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x0e!\x00+\x86a\x957s\x16FA\x00'}}) 13:42:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:33 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x6000}) 13:42:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000004c8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 13:42:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319b") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) [ 2087.762156][T16414] hfs: can't find a HFS filesystem on dev loop5 13:42:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) [ 2087.895201][T16414] hfs: can't find a HFS filesystem on dev loop5 13:42:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319b") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000004d8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:33 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x6800}) 13:42:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \xdf!\x00+\x86a\x957s\x16FA\x00'}}) 13:42:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 13:42:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319b") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 13:42:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\"\x00+\x86a\x957s\x16FA\x00'}}) [ 2088.283210][T16443] hfs: can't find a HFS filesystem on dev loop5 13:42:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd0") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319b") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000004e8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2088.447968][T16443] hfs: can't find a HFS filesystem on dev loop5 13:42:33 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x6c00}) 13:42:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd0") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 13:42:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319b") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319b") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00#\x00+\x86a\x957s\x16FA\x00'}}) 13:42:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd0") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000004f8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2088.791778][T16469] hfs: can't find a HFS filesystem on dev loop5 13:42:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd0") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) [ 2088.908768][T16469] hfs: can't find a HFS filesystem on dev loop5 13:42:34 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x7400}) 13:42:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00 \x00+\x86a\x957s\x16FA\x00'}}) 13:42:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) 13:42:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd0") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) 13:42:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000508000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2089.187453][T16496] hfs: can't find a HFS filesystem on dev loop5 13:42:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00$\x00+\x86a\x957s\x16FA\x00'}}) 13:42:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) 13:42:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd0") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x800) [ 2089.286614][T16496] hfs: can't find a HFS filesystem on dev loop5 13:42:34 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x7a00}) 13:42:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) 13:42:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00 \x00+\x86a\x957s\x16FA\x00'}}) 13:42:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) 13:42:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000518000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00%\x00+\x86a\x957s\x16FA\x00'}}) [ 2089.617735][T16519] hfs: can't find a HFS filesystem on dev loop5 13:42:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x800) 13:42:35 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xedc0}) 13:42:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) 13:42:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x800) 13:42:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) 13:42:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x17\x00+\x86a\x957s\x16FA\x00'}}) 13:42:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000528000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2089.926362][T16537] hfs: unable to parse mount options [ 2089.981012][T16537] hfs: unable to parse mount options 13:42:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x800) 13:42:35 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xff0f}) 13:42:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:42:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00&\x00+\x86a\x957s\x16FA\x00'}}) 13:42:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:42:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000538000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2090.259275][T16557] hfs: unable to parse mount options 13:42:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x800) [ 2090.352175][T16557] hfs: unable to parse mount options 13:42:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x06 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:35 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x20000}) 13:42:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x03 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00)\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\'\x00+\x86a\x957s\x16FA\x00'}}) 13:42:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000548000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2090.609182][T16574] hfs: can't find a HFS filesystem on dev loop5 [ 2090.720091][T16574] hfs: can't find a HFS filesystem on dev loop5 13:42:36 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xe0000}) 13:42:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000558000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00!\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x1d\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x19\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00(\x00+\x86a\x957s\x16FA\x00'}}) [ 2091.049935][T16590] hfs: can't find a HFS filesystem on dev loop5 [ 2091.142953][T16590] hfs: can't find a HFS filesystem on dev loop5 13:42:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000568000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:36 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x400000}) 13:42:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x17\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00)\x00+\x86a\x957s\x16FA\x00'}}) 13:42:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x13\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2091.530121][T16609] hfs: can't find a HFS filesystem on dev loop5 13:42:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000578000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x10\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2091.620522][T16609] hfs: can't find a HFS filesystem on dev loop5 13:42:37 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x1000000}) 13:42:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00*\x00+\x86a\x957s\x16FA\x00'}}) 13:42:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000588000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2091.955816][T16629] hfs: can't find a HFS filesystem on dev loop5 13:42:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x0f\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\r\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2092.074643][T16629] hfs: can't find a HFS filesystem on dev loop5 13:42:37 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x2000000}) 13:42:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\t\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000598000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\b\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x05\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00+\x00+\x86a\x957s\x16FA\x00'}}) [ 2092.472166][T16647] hfs: can't find a HFS filesystem on dev loop5 13:42:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000005a8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2092.587128][T16647] hfs: can't find a HFS filesystem on dev loop5 13:42:38 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x3000000}) 13:42:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000005b8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2092.848006][T16665] hfs: can't find a HFS filesystem on dev loop5 13:42:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00@\x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x05\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00,\x00+\x86a\x957s\x16FA\x00'}}) [ 2092.948522][T16665] hfs: can't find a HFS filesystem on dev loop5 13:42:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00-\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:38 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x4000000}) 13:42:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000005c8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2093.183221][T16683] hfs: can't find a HFS filesystem on dev loop5 [ 2093.314938][T16683] hfs: can't find a HFS filesystem on dev loop5 13:42:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00@\x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00-\x00+\x86a\x957s\x16FA\x00'}}) 13:42:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00-\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00,\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:38 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x5000000}) 13:42:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000005d8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2093.675499][T16701] hfs: can't find a HFS filesystem on dev loop5 [ 2093.756853][T16701] hfs: can't find a HFS filesystem on dev loop5 13:42:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00+\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000005e8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:39 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x6000000}) 13:42:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \xdf6\x00+\x86a\x957s\x16FA\x00'}}) [ 2093.980689][T16712] hfs: can't find a HFS filesystem on dev loop5 13:42:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00*\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00(\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000005f8000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2094.102556][T16712] hfs: can't find a HFS filesystem on dev loop5 13:42:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\'\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:39 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x7000000}) 13:42:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x06=\x00+\x86a\x957s\x16FA\x00'}}) [ 2094.379328][T16730] hfs: can't find a HFS filesystem on dev loop5 13:42:39 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x8000000}) 13:42:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000608000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:40 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f00000002c0)={0x200, 0x0, 0x9, 0x0, 0x0}) futex(&(0x7f0000000000)=0x1, 0x5, 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000100), 0x1) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000340)={@remote={[], 0x1}, 0x6, 'vcan0\x00'}) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x2) r2 = msgget$private(0x0, 0x28b) msgctl$IPC_STAT(r2, 0x2, &(0x7f0000000140)=""/81) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x20084840) dup2(r1, r0) 13:42:40 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fcntl$getflags(r0, 0x1) connect$unix(r0, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x20084840) dup2(r1, r0) 13:42:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00@\x00+\x86a\x957s\x16FA\x00'}}) [ 2094.658667][T16739] hfs: can't find a HFS filesystem on dev loop5 13:42:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00%\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:40 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f00000002c0)={0x200, 0x0, 0x9, 0x0, 0x0}) futex(&(0x7f0000000000)=0x1, 0x5, 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000100), 0x1) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000340)={@remote={[], 0x1}, 0x6, 'vcan0\x00'}) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x2) r2 = msgget$private(0x0, 0x28b) msgctl$IPC_STAT(r2, 0x2, &(0x7f0000000140)=""/81) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x20084840) dup2(r1, r0) 13:42:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00$\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2094.771871][T16739] hfs: can't find a HFS filesystem on dev loop5 13:42:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000618000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:40 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x9000000}) 13:42:40 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fcntl$getflags(r0, 0x1) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x20084840) dup2(r1, r0) 13:42:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00G\x00+\x86a\x957s\x16FA\x00'}}) 13:42:40 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(r0, &(0x7f00000006c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) fcntl$getflags(r0, 0x1) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x20084840) dup2(r1, r0) [ 2095.111604][T16764] hfs: can't find a HFS filesystem on dev loop5 13:42:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\"\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x1f\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2095.288058][T16764] hfs: can't find a HFS filesystem on dev loop5 13:42:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000628000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:40 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xa000000}) 13:42:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x1e\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00y\x00+\x86a\x957s\x16FA\x00'}}) 13:42:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\"\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2095.598052][T16788] hfs: can't find a HFS filesystem on dev loop5 13:42:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000638000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2095.735773][T16788] hfs: can't find a HFS filesystem on dev loop5 13:42:41 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x10000000}) 13:42:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x1f\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x1d\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x03\x90\x00+\x86a\x957s\x16FA\x00'}}) [ 2095.955113][T16803] hfs: can't find a HFS filesystem on dev loop5 13:42:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00y\x00+\x86a\x957s\x16FA\x00'}}) 13:42:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000648000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2096.100481][T16803] hfs: can't find a HFS filesystem on dev loop5 13:42:41 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x1f000000}) 13:42:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x06\x91\x00+\x86a\x957s\x16FA\x00'}}) 13:42:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x1a\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000658000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:41 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fcntl$getflags(r0, 0x1) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x20084840) dup2(r1, r0) [ 2096.350925][T16821] hfs: can't find a HFS filesystem on dev loop5 [ 2096.424581][T16821] hfs: can't find a HFS filesystem on dev loop5 13:42:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00y\x00+\x86a\x957s\x16FA\x00'}}) 13:42:41 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x20000000}) 13:42:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x1b\xa8\x00+\x86a\x957s\x16FA\x00'}}) 13:42:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000668000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2096.707334][T16840] hfs: can't find a HFS filesystem on dev loop5 13:42:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x1a\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2096.855412][T16840] hfs: can't find a HFS filesystem on dev loop5 13:42:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 !\xdf\x00+\x86a\x957s\x16FA\x00'}}) 13:42:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000678000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:42 executing program 4: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x1f000000}) 13:42:42 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x20100000}) 13:42:42 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f00000002c0)={0x200, 0x0, 0x9, 0x0, 0x0}) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000340)={@remote={[], 0x1}, 0x6, 'vcan0\x00'}) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000004ac0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="a1769b28c9928bbc2e8222b6ca20e99edebfc50b7d8c1cb9cbd0b473b1fa0338a68511e507f0c17600f49f2135088bbe7f99c89134a15d2754269de34686f72837ce4e204969d51f0946e47e6571d82cfc5c4835a9a8f07fca0e908d120f601b630d0876b352f044f8e7ada20fb94e2a26bbfea006ba4de7f559", 0x7a}, {&(0x7f0000000740)="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", 0x1000}], 0x2}, 0x3}, {{&(0x7f0000000140)=@generic={0xa, "aaccaa5c02da1388b2237f43b9d38494a50b159454a8a8363d1a5ad3a51164d5e47f7ff692f7e52201aafa729b99ef573ffe57b14089adb9a57b6be5cc23fc7b684adcba57d5bdaddf80e20ac2531f030efdee60265ffe69b9799690c5240a8aabe3b273980e5446c0d7295f4544d936737942eaaae1e5691e02dad1266a"}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)="db5536cd", 0x4}, {&(0x7f0000000200)="7bcf464f2717ab731d361dff5059687e0bbda370ee9c27af822a0ab0b3adcd133cc7df7724597e7eed6fdd6231fbe7fc1b2fdd795d74f155f26c4ff30fd514bbb8a4c232c13e3a4985da7b41cf4b4c7b5387374b7082218c6b28737c150788088d06a1f02297e175ee103129b76ed7bcb6474631f6530102006e96c8d00bf1b980d5c78f0157cf888e4b1ab09d55594132a0eecd97bbe026f8a3218c1ba177242dc04d345558ba0ae5", 0xa9}, {&(0x7f0000000440)="7c234a2f69ad14d2a4ceb90ecf04772b4c879276de5fa16650bb01932556199c1cfa36da99d3f77602434350251381108890c3cd40c800ba9b08e3db06ab45765d7856bb9fa5a67b7cd26c592ffcb5b4a58e50d5e98f845c16f5b88e4b23b8bbfb88c920c97438bfd634200c659b7565f2026f1ccf06e4", 0x77}], 0x3, &(0x7f0000001740)=[{0xd0, 0x116, 0x0, "894f3915bb0c862f3717796473252a7cab93e9fac0be12faa91a54c4ab68aebaa1dd23fb617356df0d12eed1992f9d21c60ebae61fb94035768b0c703fd41a262780259dbb3610b5816f20036cd64f9cde5092c414b59e02b9709589eba95ae40f947e42b8bad4564395eb0d22313db88e3213e7c65a0b088c02c13aa9f45a0cc684c81b1275f468968d9a96b58c25700fb43593f30d48333265cad206a501077ddc811793fb87acef28302d25cf1eb51d52a67c0aa74e59e479bb2a47c5ab1d"}, {0x1010, 0x107, 0x4, "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"}, {0x1010, 0x10b, 0x7ea, "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"}], 0x20f0}, 0x2}, {{&(0x7f0000000500)=@pptp={0x18, 0x2, {0x1, @multicast2}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000580)="6ade3b7efd0a73104b062e7cf3b8d9", 0xf}], 0x1, &(0x7f0000003840)=[{0x48, 0x115, 0x100, "6c1eba7dd6210c2bc544bbe17d1a797cc51d7faafc94abf98ffaf9200994104d8c48fe940e1ee5ff3c131587edd57c54cd90"}, {0x80, 0x118, 0x3f, "a2396a3d25e05a96a15f5e4514f352faee1b9e9e751e10e17d1cd814890debf1005b8aa67f4e9b49e70183e0b9be0e6f5f5cb11ff33ea2e6e5d76298f8c13b65b8ba72c5856de9faca42e605f948a4d5eace6292ee3868887e4953872d50259fd9934b7008e1501a73b8"}, {0x1010, 0x1, 0x2, "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"}], 0x10d8}, 0xff97}, {{&(0x7f0000000600)=@l2={0x1f, 0x5, {0x7f, 0x6, 0x65f3, 0x3, 0x98c, 0x8}, 0x8, 0x9}, 0x80, &(0x7f00000049c0)=[{&(0x7f0000004940)="8436aa6d73eedf73d3da5278dcf98194132a018bf22553e5fa5efe9684b65ec880eaae76a049c932b3f1c01914115ffe1f4a64b349476d541c1fd6a9574bb0718416a9", 0x43}, {&(0x7f0000000680)="de8e0e1f8ee3a2c8a101effa69c5ac766898b2ddf3391a60a4a5815263f7afe8d239615a", 0x24}], 0x2, &(0x7f0000004a00)=[{0x68, 0x10f, 0x12000000000000, "59068ee914802eb5693077f4c075a45967c137ee51e5e5c9fa6500eb11c172646f9fab7fe7ed4d686c3defae0602a5113283e12184bb5a2ca9f3891f7c7b740869ccc8c0f0376f98f733e9d478d4a65be921589fdcc0"}, {0x10, 0x11f, 0x2}, {0x20, 0x88, 0x1, "d7af4aac32c629b33cda"}], 0x98}, 0x5}], 0x4, 0x20084840) dup2(r1, r0) 13:42:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x16\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2097.175385][T16858] hfs: can't find a HFS filesystem on dev loop4 13:42:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x15\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000688000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2097.271006][T16862] hfs: can't find a HFS filesystem on dev loop5 13:42:42 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0xa000) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000100)={0x0, 0x100, 0xe1, &(0x7f0000000040)}) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f00000002c0)={0x200, 0x0, 0x9, 0x0, 0x0}) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000340)={@remote={[], 0x1}, 0x6, 'vcan0\x00'}) ioctl$TCXONC(r2, 0x540a, 0xb4e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x20084840) dup2(r1, r0) [ 2097.352856][T16862] hfs: can't find a HFS filesystem on dev loop5 13:42:42 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x220f0000}) 13:42:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 6\xdf\x00+\x86a\x957s\x16FA\x00'}}) 13:42:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000000c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2097.595509][T16879] hfs: can't find a HFS filesystem on dev loop5 13:42:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x16\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2097.734347][T16879] hfs: can't find a HFS filesystem on dev loop5 13:42:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x14\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:43 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x23000000}) 13:42:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000001c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2097.971155][T16894] hfs: can't find a HFS filesystem on dev loop5 13:42:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\xe4\x00+\x86a\x957s\x16FA\x00'}}) 13:42:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x13\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x12\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2098.081551][T16894] hfs: can't find a HFS filesystem on dev loop5 13:42:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x14\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:43 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x3f000000}) 13:42:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000002c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2098.380081][T16912] hfs: can't find a HFS filesystem on dev loop5 [ 2098.465589][T16912] hfs: can't find a HFS filesystem on dev loop5 13:42:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x02\x00+\x86a\x957s\x16FA\x00'}}) 13:42:44 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x40000000}) 13:42:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000003c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x12\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x11\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2098.705782][T16924] hfs: can't find a HFS filesystem on dev loop5 13:42:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x14\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2098.776835][T16924] hfs: can't find a HFS filesystem on dev loop5 13:42:44 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x42440000}) 13:42:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000004c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x03\x00+\x86a\x957s\x16FA\x00'}}) [ 2099.046136][T16939] hfs: can't find a HFS filesystem on dev loop5 13:42:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x11\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x0f\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:44 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xc8fa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e23}, 0x1000000ce) fcntl$getflags(r0, 0x1) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x20084840) dup2(r1, r0) 13:42:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000005c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2099.203479][T16939] hfs: can't find a HFS filesystem on dev loop5 13:42:44 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x48000000}) 13:42:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x0e\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x11\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2099.453288][T16959] hfs: can't find a HFS filesystem on dev loop5 13:42:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000006c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2099.593431][T16959] hfs: can't find a HFS filesystem on dev loop5 13:42:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x04\x00+\x86a\x957s\x16FA\x00'}}) 13:42:45 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x4c000000}) 13:42:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x0f\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000007c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\t\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2099.873717][T16977] hfs: can't find a HFS filesystem on dev loop5 13:42:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\a\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2099.978492][T16977] hfs: can't find a HFS filesystem on dev loop5 13:42:45 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x4d500000}) 13:42:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x05\x00+\x86a\x957s\x16FA\x00'}}) 13:42:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x0f\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000008c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2100.184025][T16990] hfs: can't find a HFS filesystem on dev loop5 [ 2100.298629][T16990] hfs: can't find a HFS filesystem on dev loop5 13:42:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\t\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:45 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x53540000}) 13:42:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x06\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000009c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x06\x00+\x86a\x957s\x16FA\x00'}}) [ 2100.581012][T17006] hfs: can't find a HFS filesystem on dev loop5 13:42:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x05\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) [ 2100.673082][T17006] hfs: can't find a HFS filesystem on dev loop5 13:42:46 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x60000000}) 13:42:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000000ac000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10difG\x00\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:46 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000640)="360e0cfd5bd55efc5af9d673f589", 0x0, 0xffffffffffffff34}, 0x28) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f00000002c0)={0x200, 0x0, 0x9, 0x0, 0x0}) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000340)={@remote={[], 0x1}, 0x6, 'vcan0\x00'}) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x20084840) dup2(r1, r0) [ 2100.952371][T17022] hfs: can't find a HFS filesystem on dev loop5 13:42:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\a\x00+\x86a\x957s\x16FA\x00'}}) 13:42:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif*\x00\x00 \x00\x00\x00+\x86a\x957s\x16FA\x00'}}) 13:42:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000000bc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2101.082181][T17022] hfs: can't find a HFS filesystem on dev loop5 [ 2101.154708][T17027] could not allocate digest TFM handle crct10difG 13:42:46 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fcntl$getflags(r0, 0x1) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup2(r1, r0) 13:42:46 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x68000000}) 13:42:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000000cc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:46 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fcntl$getflags(r0, 0x1) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x20084840) dup2(r1, r0) [ 2101.396546][T17039] could not allocate digest TFM handle crct10dif* [ 2101.400633][T17049] hfs: can't find a HFS filesystem on dev loop5 13:42:46 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fcntl$getflags(r0, 0x1) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x20084840) r2 = dup2(r1, r0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000100)={0x2efa5d85, 0x0, 0xfffd, 0xe0000000000000}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000001c0)=0x100000000, 0x4) sendto$isdn(r2, &(0x7f0000000140)={0x200, 0x5213, "dc75979a8f31dba98afc9801b349df616a1971f78f3c2f5c62502452b412e6ec5ee8a774379dc095e049acd1137b873d0001000098a9e2d94ec97fd0b28a177961"}, 0x49, 0x40803, &(0x7f0000000000)={0x22, 0x7, 0x2, 0x7, 0x5d5f}, 0x6) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000040)={0x1, r3, 0x2, 0xd4d}) 13:42:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\b\x00+\x86a\x957s\x16FA\x00'}}) [ 2101.476911][T17049] hfs: can't find a HFS filesystem on dev loop5 13:42:47 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x6c000000}) 13:42:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000000dc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2101.800589][T17067] hfs: can't find a HFS filesystem on dev loop5 13:42:47 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fcntl$getflags(r0, 0x1) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x20084840) r2 = dup2(r1, r0) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f0000000000)=@rose) 13:42:47 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) set_robust_list(&(0x7f0000000140)={&(0x7f0000000000), 0x276, &(0x7f0000000100)={&(0x7f0000000040)}}, 0x18) sendmmsg(r0, &(0x7f0000002dc0), 0x400000000000267, 0x20084840) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x7, 0x400) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r2, 0x10f, 0x84, &(0x7f00000001c0), &(0x7f0000000200)=0x4) dup2(r1, r0) 13:42:47 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f00000002c0)={0x200, 0x0, 0x9, 0x0, 0x0}) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000340)={@remote={[], 0x1}, 0x6, 'vcan0\x00'}) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200000, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x4701, 0x0) r5 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x0, 0x2) r6 = accept(r0, &(0x7f0000000440)=@nl, &(0x7f0000000280)=0x80) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x400, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000500)='\xe9\x1fq\x89Y\x1e\x923aK/file0\x00', 0x408000, 0x8) r9 = fcntl$dupfd(r1, 0x0, r0) r10 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000600)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r11 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000780)='/proc/capi/capi20ncci\x00', 0x2, 0x0) r12 = syz_open_dev$admmidi(&(0x7f00000007c0)='/dev/admmidi#\x00', 0x9, 0x2) r13 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000800)='/dev/hwrng\x00', 0x80, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) r14 = syz_open_dev$swradio(&(0x7f0000000840)='/dev/swradio#\x00', 0x0, 0x2) r15 = syz_open_dev$admmidi(&(0x7f0000000880)='/dev/admmidi#\x00', 0x200, 0x10001) r16 = syz_open_dev$mouse(&(0x7f00000008c0)='/dev/input/mouse#\x00', 0x1, 0x6000) r17 = syz_open_dev$sndpcmc(&(0x7f0000000900)='/dev/snd/pcmC#D#c\x00', 0x2, 0x802) getpeername(r0, &(0x7f0000000940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000009c0)=0x80) r19 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x1212c1, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000b80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40300}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a40)={0xe4, r3, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x40}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x9}, @NBD_ATTR_SOCKETS={0x54, 0x7, [{0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r10}, {0x8, 0x1, r11}, {0x8, 0x1, r12}, {0x8, 0x1, r13}]}, @NBD_ATTR_SOCKETS={0x3c, 0x7, [{0x8, 0x1, r14}, {0x8, 0x1, r15}, {0x8, 0x1, r16}, {0x8, 0x1, r17}, {0x8, 0x1, r18}, {0x8, 0x1, r1}, {0x8, 0x1, r19}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xc3}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xe4}, 0x1, 0x0, 0x0, 0x840}, 0x20000000) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r9, 0xc040564a, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x0, 0x2, 0x3, 0x7ff, 0x1}) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x20084840) dup2(r1, r0) 13:42:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\t\x00+\x86a\x957s\x16FA\x00'}}) [ 2101.913738][T17067] hfs: can't find a HFS filesystem on dev loop5 13:42:47 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fcntl$getflags(r0, 0x1) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x20084840) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000100)={0x162, 0x29, 0x2, {0x7, [{{0x1, 0x3, 0x2}, 0x7fffffff, 0x7, 0xa, '\xe9\x1fq\x89Y\x1e\x923aK'}, {{0x1, 0x2, 0x3}, 0x7, 0x58, 0xa, '\xe9\x1fq\x89Y\x1e\x923aK'}, {{0x1, 0x1, 0x2}, 0x7, 0x2, 0xa, '\xe9\x1fq\x89Y\x1e\x923aK'}, {{0x0, 0x3, 0x3}, 0x1, 0x100, 0xa, '\xe9\x1fq\x89Y\x1e\x923aK'}, {{0x20, 0x1, 0x3}, 0x1000, 0x5, 0x7, './file0'}, {{0x4, 0x3, 0x7}, 0x3, 0x8001, 0xa, '\xe9\x1fq\x89Y\x1e\x923aK'}, {{0x20, 0x0, 0x7}, 0xffffffff, 0xa, 0xa, '\xe9\x1fq\x89Y\x1e\x923aK'}, {{0x99, 0x4, 0x2}, 0x1, 0xffffffffffffffff, 0xa, '\xe9\x1fq\x89Y\x1e\x923aK'}, {{0x21, 0x1, 0x8}, 0x3, 0x8, 0x10, '\xe9\x1fq\x89Y\x1e\x923aK/file0'}, {{0x20}, 0x0, 0x400, 0xa, '\xe9\x1fq\x89Y\x1e\x923aK'}]}}, 0x162) dup2(r1, r0) 13:42:47 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x74000000}) 13:42:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000000ec000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2102.208541][T17092] hfs: can't find a HFS filesystem on dev loop5 13:42:47 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400042, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000740)=""/4096) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r2, r0, 0x80000) ioctl$SIOCRSSCAUSE(r3, 0x89e1, &(0x7f0000000000)=0x1) fcntl$getflags(r0, 0x1) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x20084840) dup2(r2, r0) 13:42:47 executing program 2 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:42:47 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x7a000000}) 13:42:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000000fc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:47 executing program 1 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:42:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\n\x00+\x86a\x957s\x16FA\x00'}}) [ 2102.474656][T17102] FAULT_INJECTION: forcing a failure. [ 2102.474656][T17102] name failslab, interval 1, probability 0, space 0, times 0 [ 2102.522070][T17102] CPU: 0 PID: 17102 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #70 [ 2102.531051][T17102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2102.541309][T17102] Call Trace: [ 2102.544625][T17102] dump_stack+0x172/0x1f0 [ 2102.548967][T17102] should_fail.cold+0xa/0x15 [ 2102.553573][T17102] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2102.559400][T17102] ? ___might_sleep+0x163/0x280 [ 2102.564284][T17102] __should_failslab+0x121/0x190 [ 2102.569230][T17102] ? sock_destroy_inode+0x60/0x60 [ 2102.574266][T17102] should_failslab+0x9/0x14 [ 2102.578774][T17102] kmem_cache_alloc+0x2b2/0x6f0 [ 2102.583825][T17102] ? ksys_dup3+0x3e0/0x3e0 [ 2102.588247][T17102] ? sock_destroy_inode+0x60/0x60 [ 2102.593274][T17102] sock_alloc_inode+0x1d/0x260 [ 2102.598130][T17102] alloc_inode+0x66/0x190 [ 2102.602468][T17102] new_inode_pseudo+0x19/0xf0 [ 2102.607272][T17102] sock_alloc+0x41/0x270 [ 2102.611529][T17102] __sys_accept4+0xe2/0x6a0 [ 2102.616043][T17102] ? wait_for_completion+0x440/0x440 [ 2102.621335][T17102] ? __ia32_sys_listen+0x80/0x80 [ 2102.626290][T17102] ? fput_many+0x12c/0x1a0 [ 2102.630706][T17102] ? fput+0x1b/0x20 [ 2102.634577][T17102] ? ksys_write+0x1f1/0x2d0 [ 2102.639087][T17102] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2102.644547][T17102] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2102.650013][T17102] ? do_syscall_64+0x26/0x610 [ 2102.654698][T17102] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2102.660850][T17102] ? do_syscall_64+0x26/0x610 [ 2102.665540][T17102] __x64_sys_accept4+0x97/0xf0 [ 2102.670310][T17102] do_syscall_64+0x103/0x610 [ 2102.674913][T17102] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2102.680805][T17102] RIP: 0033:0x458c29 [ 2102.684699][T17102] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2102.704655][T17102] RSP: 002b:00007f38e51a5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 2102.713068][T17102] RAX: ffffffffffffffda RBX: 00007f38e51a5c90 RCX: 0000000000458c29 13:42:48 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2102.721041][T17102] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 2102.729019][T17102] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2102.737009][T17102] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38e51a66d4 [ 2102.744987][T17102] R13: 00000000004beac8 R14: 00000000004cf810 R15: 0000000000000004 13:42:48 executing program 2 (fault-call:3 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2102.808521][T17108] FAULT_INJECTION: forcing a failure. [ 2102.808521][T17108] name failslab, interval 1, probability 0, space 0, times 0 [ 2102.810178][T17103] hfs: can't find a HFS filesystem on dev loop5 [ 2102.828813][T17108] CPU: 1 PID: 17108 Comm: syz-executor.1 Not tainted 5.1.0-rc5+ #70 [ 2102.836862][T17108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2102.846966][T17108] Call Trace: [ 2102.850307][T17108] dump_stack+0x172/0x1f0 [ 2102.854755][T17108] should_fail.cold+0xa/0x15 [ 2102.859373][T17108] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2102.865197][T17108] ? ___might_sleep+0x163/0x280 [ 2102.870065][T17108] __should_failslab+0x121/0x190 [ 2102.875014][T17108] ? sock_destroy_inode+0x60/0x60 [ 2102.880040][T17108] should_failslab+0x9/0x14 [ 2102.884549][T17108] kmem_cache_alloc+0x2b2/0x6f0 [ 2102.889444][T17108] ? ksys_dup3+0x3e0/0x3e0 [ 2102.893872][T17108] ? sock_destroy_inode+0x60/0x60 [ 2102.898904][T17108] sock_alloc_inode+0x1d/0x260 [ 2102.903674][T17108] alloc_inode+0x66/0x190 [ 2102.908009][T17108] new_inode_pseudo+0x19/0xf0 [ 2102.912805][T17108] sock_alloc+0x41/0x270 [ 2102.917141][T17108] __sys_accept4+0xe2/0x6a0 [ 2102.921658][T17108] ? wait_for_completion+0x440/0x440 [ 2102.927038][T17108] ? __ia32_sys_listen+0x80/0x80 [ 2102.931995][T17108] ? fput_many+0x12c/0x1a0 [ 2102.936412][T17108] ? fput+0x1b/0x20 [ 2102.940259][T17108] ? ksys_write+0x1f1/0x2d0 [ 2102.944772][T17108] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2102.950245][T17108] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2102.955751][T17108] ? do_syscall_64+0x26/0x610 [ 2102.960432][T17108] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2102.966509][T17108] ? do_syscall_64+0x26/0x610 [ 2102.971199][T17108] __x64_sys_accept4+0x97/0xf0 [ 2102.976085][T17108] do_syscall_64+0x103/0x610 [ 2102.980686][T17108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2102.986673][T17108] RIP: 0033:0x458c29 [ 2102.990573][T17108] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2103.010320][T17108] RSP: 002b:00007f9dd43afc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 2103.018768][T17108] RAX: ffffffffffffffda RBX: 00007f9dd43afc90 RCX: 0000000000458c29 [ 2103.026741][T17108] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 2103.034713][T17108] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2103.042685][T17108] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9dd43b06d4 [ 2103.050664][T17108] R13: 00000000004beac8 R14: 00000000004cf810 R15: 0000000000000004 [ 2103.075165][T17113] FAULT_INJECTION: forcing a failure. [ 2103.075165][T17113] name failslab, interval 1, probability 0, space 0, times 0 [ 2103.116293][T17113] CPU: 0 PID: 17113 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2103.124336][T17113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2103.134403][T17113] Call Trace: [ 2103.137720][T17113] dump_stack+0x172/0x1f0 [ 2103.142156][T17113] should_fail.cold+0xa/0x15 [ 2103.146771][T17113] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2103.152687][T17113] ? ___might_sleep+0x163/0x280 [ 2103.157570][T17113] __should_failslab+0x121/0x190 [ 2103.162611][T17113] should_failslab+0x9/0x14 [ 2103.167131][T17113] __kmalloc+0x2dc/0x740 [ 2103.171393][T17113] ? fput_many+0x12c/0x1a0 [ 2103.176009][T17113] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2103.179941][T17117] FAULT_INJECTION: forcing a failure. [ 2103.179941][T17117] name failslab, interval 1, probability 0, space 0, times 0 [ 2103.182258][T17113] ? strnlen_user+0x1f0/0x280 [ 2103.182273][T17113] ? __x64_sys_memfd_create+0x13c/0x470 [ 2103.182297][T17113] __x64_sys_memfd_create+0x13c/0x470 [ 2103.210616][T17113] ? memfd_fcntl+0x1550/0x1550 [ 2103.215387][T17113] ? do_syscall_64+0x26/0x610 [ 2103.220075][T17113] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2103.225395][T17113] ? trace_hardirqs_on+0x67/0x230 [ 2103.230437][T17113] do_syscall_64+0x103/0x610 [ 2103.235037][T17113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2103.240930][T17113] RIP: 0033:0x458c29 [ 2103.244855][T17113] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:42:48 executing program 1 (fault-call:3 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:42:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\v\x00+\x86a\x957s\x16FA\x00'}}) [ 2103.264487][T17113] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2103.272912][T17113] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 2103.280877][T17113] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 2103.288941][T17113] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2103.297000][T17113] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fe5118836d4 [ 2103.304968][T17113] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:42:48 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x8cffffff}) [ 2103.313649][T17117] CPU: 1 PID: 17117 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #70 [ 2103.321659][T17117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2103.331739][T17117] Call Trace: [ 2103.335028][T17117] dump_stack+0x172/0x1f0 [ 2103.335050][T17117] should_fail.cold+0xa/0x15 [ 2103.335069][T17117] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2103.350110][T17117] ? ___might_sleep+0x163/0x280 [ 2103.354972][T17117] __should_failslab+0x121/0x190 [ 2103.354993][T17117] ? sock_destroy_inode+0x60/0x60 [ 2103.365009][T17117] should_failslab+0x9/0x14 [ 2103.369528][T17117] kmem_cache_alloc_trace+0x2d1/0x760 [ 2103.374936][T17117] ? kmem_cache_alloc+0x32e/0x6f0 [ 2103.379982][T17117] ? ksys_dup3+0x3e0/0x3e0 [ 2103.384413][T17117] ? sock_destroy_inode+0x60/0x60 [ 2103.389446][T17117] sock_alloc_inode+0x63/0x260 [ 2103.394207][T17117] alloc_inode+0x66/0x190 [ 2103.398535][T17117] new_inode_pseudo+0x19/0xf0 [ 2103.403216][T17117] sock_alloc+0x41/0x270 [ 2103.407467][T17117] __sys_accept4+0xe2/0x6a0 [ 2103.411982][T17117] ? wait_for_completion+0x440/0x440 [ 2103.417271][T17117] ? __ia32_sys_listen+0x80/0x80 [ 2103.422314][T17117] ? fput_many+0x12c/0x1a0 [ 2103.426747][T17117] ? fput+0x1b/0x20 [ 2103.430561][T17117] ? ksys_write+0x1f1/0x2d0 [ 2103.435074][T17117] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2103.440536][T17117] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2103.446082][T17117] ? do_syscall_64+0x26/0x610 [ 2103.450767][T17117] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2103.456835][T17117] ? do_syscall_64+0x26/0x610 [ 2103.461521][T17117] __x64_sys_accept4+0x97/0xf0 [ 2103.466309][T17117] do_syscall_64+0x103/0x610 [ 2103.470922][T17117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2103.476823][T17117] RIP: 0033:0x458c29 [ 2103.480716][T17117] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2103.500519][T17117] RSP: 002b:00007f38e51a5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 2103.508960][T17117] RAX: ffffffffffffffda RBX: 00007f38e51a5c90 RCX: 0000000000458c29 [ 2103.516934][T17117] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 2103.528390][T17117] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2103.536426][T17117] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38e51a66d4 [ 2103.544404][T17117] R13: 00000000004beac8 R14: 00000000004cf810 R15: 0000000000000004 13:42:49 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:49 executing program 2 (fault-call:3 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2103.581423][T17120] FAULT_INJECTION: forcing a failure. [ 2103.581423][T17120] name failslab, interval 1, probability 0, space 0, times 0 [ 2103.631869][T17120] CPU: 0 PID: 17120 Comm: syz-executor.1 Not tainted 5.1.0-rc5+ #70 [ 2103.639904][T17120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2103.639911][T17120] Call Trace: [ 2103.639935][T17120] dump_stack+0x172/0x1f0 [ 2103.639953][T17120] should_fail.cold+0xa/0x15 [ 2103.639969][T17120] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2103.639988][T17120] ? ___might_sleep+0x163/0x280 [ 2103.640004][T17120] __should_failslab+0x121/0x190 [ 2103.640020][T17120] ? sock_destroy_inode+0x60/0x60 [ 2103.640032][T17120] should_failslab+0x9/0x14 [ 2103.640049][T17120] kmem_cache_alloc_trace+0x2d1/0x760 [ 2103.640062][T17120] ? kmem_cache_alloc+0x32e/0x6f0 [ 2103.640074][T17120] ? ksys_dup3+0x3e0/0x3e0 [ 2103.640092][T17120] ? sock_destroy_inode+0x60/0x60 [ 2103.640106][T17120] sock_alloc_inode+0x63/0x260 [ 2103.640120][T17120] alloc_inode+0x66/0x190 [ 2103.640134][T17120] new_inode_pseudo+0x19/0xf0 [ 2103.640149][T17120] sock_alloc+0x41/0x270 [ 2103.640163][T17120] __sys_accept4+0xe2/0x6a0 [ 2103.640183][T17120] ? wait_for_completion+0x440/0x440 [ 2103.705759][T17120] ? __ia32_sys_listen+0x80/0x80 [ 2103.705776][T17120] ? fput_many+0x12c/0x1a0 [ 2103.705789][T17120] ? fput+0x1b/0x20 [ 2103.705805][T17120] ? ksys_write+0x1f1/0x2d0 [ 2103.705825][T17120] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2103.705836][T17120] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2103.705854][T17120] ? do_syscall_64+0x26/0x610 [ 2103.772561][T17120] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2103.778637][T17120] ? do_syscall_64+0x26/0x610 [ 2103.783357][T17120] __x64_sys_accept4+0x97/0xf0 [ 2103.788126][T17120] do_syscall_64+0x103/0x610 [ 2103.792807][T17120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2103.799044][T17120] RIP: 0033:0x458c29 [ 2103.802945][T17120] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2103.823358][T17120] RSP: 002b:00007f9dd43afc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 2103.831799][T17120] RAX: ffffffffffffffda RBX: 00007f9dd43afc90 RCX: 0000000000458c29 [ 2103.839770][T17120] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 2103.847743][T17120] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2103.855712][T17120] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9dd43b06d4 [ 2103.863684][T17120] R13: 00000000004beac8 R14: 00000000004cf810 R15: 0000000000000004 13:42:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\f\x00+\x86a\x957s\x16FA\x00'}}) 13:42:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000010c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:49 executing program 1 (fault-call:3 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2103.941010][T17129] FAULT_INJECTION: forcing a failure. [ 2103.941010][T17129] name failslab, interval 1, probability 0, space 0, times 0 [ 2103.961928][T17128] hfs: unable to parse mount options [ 2103.964866][T17129] CPU: 1 PID: 17129 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2103.975248][T17129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2103.985317][T17129] Call Trace: [ 2103.988634][T17129] dump_stack+0x172/0x1f0 [ 2103.992989][T17129] should_fail.cold+0xa/0x15 [ 2103.997598][T17129] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2104.003420][T17129] ? ___might_sleep+0x163/0x280 [ 2104.008393][T17129] __should_failslab+0x121/0x190 [ 2104.013341][T17129] ? shmem_destroy_callback+0xc0/0xc0 [ 2104.018725][T17129] should_failslab+0x9/0x14 [ 2104.023320][T17129] kmem_cache_alloc+0x2b2/0x6f0 [ 2104.028170][T17129] ? __alloc_fd+0x44d/0x560 [ 2104.032680][T17129] ? shmem_destroy_callback+0xc0/0xc0 [ 2104.038055][T17129] shmem_alloc_inode+0x1c/0x50 [ 2104.042827][T17129] alloc_inode+0x66/0x190 [ 2104.047180][T17129] new_inode_pseudo+0x19/0xf0 [ 2104.051862][T17129] new_inode+0x1f/0x40 [ 2104.055935][T17129] shmem_get_inode+0x84/0x780 [ 2104.060620][T17129] __shmem_file_setup.part.0+0x7e/0x2b0 [ 2104.066196][T17129] shmem_file_setup+0x66/0x90 [ 2104.070900][T17129] __x64_sys_memfd_create+0x2a2/0x470 [ 2104.076274][T17129] ? memfd_fcntl+0x1550/0x1550 [ 2104.081038][T17129] ? do_syscall_64+0x26/0x610 [ 2104.085716][T17129] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2104.091005][T17129] ? trace_hardirqs_on+0x67/0x230 [ 2104.096124][T17129] do_syscall_64+0x103/0x610 [ 2104.100726][T17129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2104.106620][T17129] RIP: 0033:0x458c29 [ 2104.110515][T17129] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2104.130257][T17129] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2104.138693][T17129] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 2104.146676][T17129] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 2104.154649][T17129] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2104.162634][T17129] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fe5118836d4 [ 2104.170702][T17129] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2104.182043][T17132] FAULT_INJECTION: forcing a failure. [ 2104.182043][T17132] name failslab, interval 1, probability 0, space 0, times 0 [ 2104.211710][T17132] CPU: 1 PID: 17132 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #70 [ 2104.219728][T17132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2104.229881][T17132] Call Trace: [ 2104.233184][T17132] dump_stack+0x172/0x1f0 [ 2104.237532][T17132] should_fail.cold+0xa/0x15 [ 2104.242138][T17132] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2104.247954][T17132] ? ___might_sleep+0x163/0x280 [ 2104.252820][T17132] __should_failslab+0x121/0x190 [ 2104.257943][T17132] should_failslab+0x9/0x14 [ 2104.262455][T17132] kmem_cache_alloc+0x2b2/0x6f0 [ 2104.267307][T17132] ? find_held_lock+0x35/0x130 [ 2104.272075][T17132] ? __alloc_fd+0x44d/0x560 [ 2104.276582][T17132] __d_alloc+0x2e/0x8c0 [ 2104.280741][T17132] d_alloc_pseudo+0x1e/0x30 [ 2104.285251][T17132] alloc_file_pseudo+0xe2/0x280 [ 2104.290108][T17132] ? kasan_check_read+0x11/0x20 [ 2104.294976][T17132] ? alloc_file+0x4d0/0x4d0 [ 2104.299481][T17132] ? __alloc_fd+0x44d/0x560 [ 2104.303984][T17132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2104.310240][T17132] sock_alloc_file+0x4d/0x170 [ 2104.314923][T17132] __sys_accept4+0x259/0x6a0 [ 2104.319519][T17132] ? __ia32_sys_listen+0x80/0x80 [ 2104.324460][T17132] ? fput_many+0x12c/0x1a0 [ 2104.328882][T17132] ? fput+0x1b/0x20 [ 2104.332692][T17132] ? ksys_write+0x1f1/0x2d0 [ 2104.337220][T17132] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2104.342684][T17132] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2104.348145][T17132] ? do_syscall_64+0x26/0x610 [ 2104.352823][T17132] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2104.358887][T17132] ? do_syscall_64+0x26/0x610 [ 2104.363571][T17132] __x64_sys_accept4+0x97/0xf0 [ 2104.368343][T17132] do_syscall_64+0x103/0x610 [ 2104.373012][T17132] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2104.378900][T17132] RIP: 0033:0x458c29 [ 2104.382792][T17132] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2104.402586][T17132] RSP: 002b:00007f38e51a5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 2104.411007][T17132] RAX: ffffffffffffffda RBX: 00007f38e51a5c90 RCX: 0000000000458c29 [ 2104.418981][T17132] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 2104.427040][T17132] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2104.435013][T17132] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38e51a66d4 13:42:49 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2104.442984][T17132] R13: 00000000004beac8 R14: 00000000004cf810 R15: 0000000000000004 [ 2104.480971][T17128] hfs: unable to parse mount options [ 2104.516210][T17139] FAULT_INJECTION: forcing a failure. [ 2104.516210][T17139] name failslab, interval 1, probability 0, space 0, times 0 [ 2104.544468][T17139] CPU: 1 PID: 17139 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2104.552474][T17139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2104.562524][T17139] Call Trace: [ 2104.562551][T17139] dump_stack+0x172/0x1f0 [ 2104.562572][T17139] should_fail.cold+0xa/0x15 [ 2104.562589][T17139] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2104.562609][T17139] ? ___might_sleep+0x163/0x280 [ 2104.562627][T17139] __should_failslab+0x121/0x190 [ 2104.562641][T17139] should_failslab+0x9/0x14 [ 2104.562653][T17139] kmem_cache_alloc+0x2b2/0x6f0 [ 2104.562665][T17139] ? current_time+0x6b/0x140 [ 2104.562678][T17139] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 2104.562693][T17139] ? lockdep_hardirqs_on+0x418/0x5d0 13:42:50 executing program 2 (fault-call:3 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2104.562713][T17139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2104.596007][T17143] FAULT_INJECTION: forcing a failure. [ 2104.596007][T17143] name failslab, interval 1, probability 0, space 0, times 0 [ 2104.599853][T17139] ? timespec64_trunc+0xf0/0x180 [ 2104.599868][T17139] __d_alloc+0x2e/0x8c0 [ 2104.599884][T17139] d_alloc_pseudo+0x1e/0x30 [ 2104.599896][T17139] alloc_file_pseudo+0xe2/0x280 [ 2104.599913][T17139] ? alloc_file+0x4d0/0x4d0 [ 2104.657818][T17139] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2104.664084][T17139] __shmem_file_setup.part.0+0x108/0x2b0 [ 2104.664104][T17139] shmem_file_setup+0x66/0x90 [ 2104.664124][T17139] __x64_sys_memfd_create+0x2a2/0x470 [ 2104.679865][T17139] ? memfd_fcntl+0x1550/0x1550 [ 2104.684633][T17139] ? do_syscall_64+0x26/0x610 [ 2104.690372][T17139] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2104.695672][T17139] ? trace_hardirqs_on+0x67/0x230 [ 2104.700726][T17139] do_syscall_64+0x103/0x610 [ 2104.705320][T17139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2104.711218][T17139] RIP: 0033:0x458c29 [ 2104.715114][T17139] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2104.734902][T17139] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2104.743315][T17139] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 2104.751287][T17139] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 2104.759283][T17139] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2104.767260][T17139] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fe5118836d4 [ 2104.775273][T17139] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2104.783281][T17143] CPU: 0 PID: 17143 Comm: syz-executor.1 Not tainted 5.1.0-rc5+ #70 [ 2104.791274][T17143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2104.801342][T17143] Call Trace: [ 2104.804759][T17143] dump_stack+0x172/0x1f0 [ 2104.809092][T17143] should_fail.cold+0xa/0x15 [ 2104.809110][T17143] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2104.809130][T17143] ? ___might_sleep+0x163/0x280 [ 2104.809148][T17143] __should_failslab+0x121/0x190 [ 2104.809161][T17143] should_failslab+0x9/0x14 [ 2104.809184][T17143] kmem_cache_alloc+0x2b2/0x6f0 [ 2104.809197][T17143] ? find_held_lock+0x35/0x130 [ 2104.809212][T17143] ? __alloc_fd+0x44d/0x560 [ 2104.809227][T17143] __d_alloc+0x2e/0x8c0 [ 2104.809243][T17143] d_alloc_pseudo+0x1e/0x30 [ 2104.809257][T17143] alloc_file_pseudo+0xe2/0x280 [ 2104.809277][T17143] ? kasan_check_read+0x11/0x20 [ 2104.821660][T17143] ? alloc_file+0x4d0/0x4d0 [ 2104.821677][T17143] ? __alloc_fd+0x44d/0x560 [ 2104.821692][T17143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2104.821716][T17143] sock_alloc_file+0x4d/0x170 [ 2104.821733][T17143] __sys_accept4+0x259/0x6a0 [ 2104.821750][T17143] ? __ia32_sys_listen+0x80/0x80 [ 2104.821762][T17143] ? fput_many+0x12c/0x1a0 [ 2104.821774][T17143] ? fput+0x1b/0x20 [ 2104.821788][T17143] ? ksys_write+0x1f1/0x2d0 [ 2104.821808][T17143] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2104.821827][T17143] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2104.922389][T17143] ? do_syscall_64+0x26/0x610 [ 2104.927077][T17143] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2104.933183][T17143] ? do_syscall_64+0x26/0x610 [ 2104.937964][T17143] __x64_sys_accept4+0x97/0xf0 [ 2104.942819][T17143] do_syscall_64+0x103/0x610 [ 2104.947415][T17143] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2104.953304][T17143] RIP: 0033:0x458c29 [ 2104.957201][T17143] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2104.976808][T17143] RSP: 002b:00007f9dd438ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 2104.985228][T17143] RAX: ffffffffffffffda RBX: 00007f9dd438ec90 RCX: 0000000000458c29 [ 2104.993201][T17143] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 2105.001181][T17143] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2105.009162][T17143] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9dd438f6d4 13:42:50 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xc0ed0000}) [ 2105.017221][T17143] R13: 00000000004beac8 R14: 00000000004cf810 R15: 0000000000000003 13:42:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\r\x00+\x86a\x957s\x16FA\x00'}}) 13:42:50 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:50 executing program 1 (fault-call:3 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2105.105960][T17147] hfs: can't find a HFS filesystem on dev loop5 [ 2105.124169][T17151] FAULT_INJECTION: forcing a failure. [ 2105.124169][T17151] name failslab, interval 1, probability 0, space 0, times 0 [ 2105.143791][T17151] CPU: 0 PID: 17151 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #70 [ 2105.151808][T17151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2105.161877][T17151] Call Trace: [ 2105.165201][T17151] dump_stack+0x172/0x1f0 [ 2105.169567][T17151] should_fail.cold+0xa/0x15 [ 2105.174190][T17151] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2105.180029][T17151] ? ___might_sleep+0x163/0x280 [ 2105.184908][T17151] __should_failslab+0x121/0x190 [ 2105.189860][T17151] should_failslab+0x9/0x14 [ 2105.194379][T17151] kmem_cache_alloc+0x2b2/0x6f0 [ 2105.199249][T17151] __alloc_file+0x27/0x300 [ 2105.203751][T17151] alloc_empty_file+0x72/0x170 [ 2105.208542][T17151] alloc_file+0x5e/0x4d0 [ 2105.212787][T17151] alloc_file_pseudo+0x189/0x280 [ 2105.217918][T17151] ? alloc_file+0x4d0/0x4d0 [ 2105.222430][T17151] ? __alloc_fd+0x44d/0x560 [ 2105.226947][T17151] sock_alloc_file+0x4d/0x170 [ 2105.231643][T17151] __sys_accept4+0x259/0x6a0 [ 2105.236452][T17151] ? __ia32_sys_listen+0x80/0x80 [ 2105.241389][T17151] ? fput_many+0x12c/0x1a0 [ 2105.245822][T17151] ? fput+0x1b/0x20 [ 2105.249667][T17151] ? ksys_write+0x1f1/0x2d0 [ 2105.254351][T17151] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2105.259895][T17151] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2105.265350][T17151] ? do_syscall_64+0x26/0x610 [ 2105.270028][T17151] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2105.276091][T17151] ? do_syscall_64+0x26/0x610 [ 2105.280786][T17151] __x64_sys_accept4+0x97/0xf0 [ 2105.286249][T17151] do_syscall_64+0x103/0x610 [ 2105.290845][T17151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2105.296734][T17151] RIP: 0033:0x458c29 [ 2105.300660][T17151] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2105.320279][T17151] RSP: 002b:00007f38e51a5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 2105.328774][T17151] RAX: ffffffffffffffda RBX: 00007f38e51a5c90 RCX: 0000000000458c29 [ 2105.336742][T17151] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 2105.344708][T17151] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 13:42:50 executing program 2 (fault-call:3 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:42:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000011c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2105.352701][T17151] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38e51a66d4 [ 2105.360676][T17151] R13: 00000000004beac8 R14: 00000000004cf810 R15: 0000000000000004 [ 2105.471715][T17159] FAULT_INJECTION: forcing a failure. [ 2105.471715][T17159] name failslab, interval 1, probability 0, space 0, times 0 [ 2105.495494][T17161] FAULT_INJECTION: forcing a failure. [ 2105.495494][T17161] name failslab, interval 1, probability 0, space 0, times 0 [ 2105.521453][T17163] FAULT_INJECTION: forcing a failure. [ 2105.521453][T17163] name failslab, interval 1, probability 0, space 0, times 0 [ 2105.530689][T17159] CPU: 1 PID: 17159 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2105.542587][T17159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2105.553890][T17159] Call Trace: [ 2105.557203][T17159] dump_stack+0x172/0x1f0 [ 2105.561544][T17159] should_fail.cold+0xa/0x15 [ 2105.566149][T17159] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2105.571968][T17159] ? ___might_sleep+0x163/0x280 [ 2105.576844][T17159] __should_failslab+0x121/0x190 [ 2105.581886][T17159] should_failslab+0x9/0x14 [ 2105.586489][T17159] kmem_cache_alloc+0x2b2/0x6f0 [ 2105.591353][T17159] __alloc_file+0x27/0x300 [ 2105.595945][T17159] alloc_empty_file+0x72/0x170 [ 2105.600713][T17159] alloc_file+0x5e/0x4d0 [ 2105.604960][T17159] alloc_file_pseudo+0x189/0x280 [ 2105.609987][T17159] ? alloc_file+0x4d0/0x4d0 [ 2105.614512][T17159] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2105.620780][T17159] __shmem_file_setup.part.0+0x108/0x2b0 [ 2105.626426][T17159] shmem_file_setup+0x66/0x90 [ 2105.631121][T17159] __x64_sys_memfd_create+0x2a2/0x470 [ 2105.636499][T17159] ? memfd_fcntl+0x1550/0x1550 [ 2105.636843][T17147] hfs: can't find a HFS filesystem on dev loop5 [ 2105.641265][T17159] ? do_syscall_64+0x26/0x610 [ 2105.641280][T17159] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2105.641301][T17159] ? trace_hardirqs_on+0x67/0x230 [ 2105.662686][T17159] do_syscall_64+0x103/0x610 [ 2105.667288][T17159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2105.673189][T17159] RIP: 0033:0x458c29 [ 2105.677085][T17159] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2105.696964][T17159] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2105.705394][T17159] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 2105.713379][T17159] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 2105.721337][T17159] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2105.729815][T17159] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fe5118836d4 [ 2105.737775][T17159] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2105.747235][T17163] CPU: 1 PID: 17163 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #70 [ 2105.755405][T17163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2105.765455][T17163] Call Trace: [ 2105.768743][T17163] dump_stack+0x172/0x1f0 [ 2105.773072][T17163] should_fail.cold+0xa/0x15 [ 2105.777670][T17163] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2105.783473][T17163] ? ___might_sleep+0x163/0x280 [ 2105.788412][T17163] __should_failslab+0x121/0x190 [ 2105.793367][T17163] should_failslab+0x9/0x14 [ 2105.797867][T17163] kmem_cache_alloc+0x2b2/0x6f0 [ 2105.802714][T17163] ? rcu_read_lock_sched_held+0x110/0x130 [ 2105.808429][T17163] ? kmem_cache_alloc+0x32e/0x6f0 [ 2105.813457][T17163] security_file_alloc+0x39/0x170 [ 2105.818826][T17163] __alloc_file+0xac/0x300 13:42:51 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2105.823595][T17163] alloc_empty_file+0x72/0x170 [ 2105.828355][T17163] alloc_file+0x5e/0x4d0 [ 2105.832599][T17163] alloc_file_pseudo+0x189/0x280 [ 2105.837542][T17163] ? alloc_file+0x4d0/0x4d0 [ 2105.842062][T17163] ? __alloc_fd+0x44d/0x560 [ 2105.846587][T17163] sock_alloc_file+0x4d/0x170 [ 2105.851267][T17163] __sys_accept4+0x259/0x6a0 [ 2105.855868][T17163] ? __ia32_sys_listen+0x80/0x80 [ 2105.860914][T17163] ? fput_many+0x12c/0x1a0 [ 2105.865335][T17163] ? fput+0x1b/0x20 [ 2105.869151][T17163] ? ksys_write+0x1f1/0x2d0 [ 2105.873654][T17163] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2105.879116][T17163] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2105.884576][T17163] ? do_syscall_64+0x26/0x610 [ 2105.889249][T17163] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2105.895308][T17163] ? do_syscall_64+0x26/0x610 [ 2105.899987][T17163] __x64_sys_accept4+0x97/0xf0 [ 2105.904923][T17163] do_syscall_64+0x103/0x610 [ 2105.909531][T17163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2105.915440][T17163] RIP: 0033:0x458c29 [ 2105.919332][T17163] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2105.939198][T17163] RSP: 002b:00007f38e51a5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 2105.948915][T17163] RAX: ffffffffffffffda RBX: 00007f38e51a5c90 RCX: 0000000000458c29 [ 2105.957063][T17163] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 2105.965045][T17163] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2105.973022][T17163] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38e51a66d4 [ 2105.981086][T17163] R13: 00000000004beac8 R14: 00000000004cf810 R15: 0000000000000004 [ 2105.991282][T17161] CPU: 0 PID: 17161 Comm: syz-executor.1 Not tainted 5.1.0-rc5+ #70 [ 2105.999282][T17161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2106.009349][T17161] Call Trace: [ 2106.012656][T17161] dump_stack+0x172/0x1f0 [ 2106.017009][T17161] should_fail.cold+0xa/0x15 [ 2106.021624][T17161] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2106.027452][T17161] ? ___might_sleep+0x163/0x280 [ 2106.032402][T17161] __should_failslab+0x121/0x190 [ 2106.037354][T17161] should_failslab+0x9/0x14 [ 2106.041868][T17161] kmem_cache_alloc+0x2b2/0x6f0 [ 2106.046741][T17161] __alloc_file+0x27/0x300 [ 2106.051168][T17161] alloc_empty_file+0x72/0x170 [ 2106.055945][T17161] alloc_file+0x5e/0x4d0 [ 2106.060205][T17161] alloc_file_pseudo+0x189/0x280 [ 2106.065154][T17161] ? alloc_file+0x4d0/0x4d0 [ 2106.069688][T17161] ? __alloc_fd+0x44d/0x560 [ 2106.089845][T17161] sock_alloc_file+0x4d/0x170 [ 2106.094547][T17161] __sys_accept4+0x259/0x6a0 [ 2106.099425][T17161] ? __ia32_sys_listen+0x80/0x80 [ 2106.104385][T17161] ? fput_many+0x12c/0x1a0 [ 2106.108840][T17161] ? fput+0x1b/0x20 [ 2106.112668][T17161] ? ksys_write+0x1f1/0x2d0 [ 2106.117191][T17161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2106.122678][T17161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2106.128148][T17161] ? do_syscall_64+0x26/0x610 [ 2106.132848][T17161] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2106.139370][T17161] ? do_syscall_64+0x26/0x610 [ 2106.144076][T17161] __x64_sys_accept4+0x97/0xf0 [ 2106.148855][T17161] do_syscall_64+0x103/0x610 [ 2106.153465][T17161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2106.159354][T17161] RIP: 0033:0x458c29 [ 2106.163473][T17161] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:42:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x0e\x00+\x86a\x957s\x16FA\x00'}}) 13:42:51 executing program 2 (fault-call:3 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2106.183959][T17161] RSP: 002b:00007f9dd43afc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 2106.192373][T17161] RAX: ffffffffffffffda RBX: 00007f9dd43afc90 RCX: 0000000000458c29 [ 2106.200350][T17161] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 2106.208319][T17161] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2106.216287][T17161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9dd43b06d4 [ 2106.224254][T17161] R13: 00000000004beac8 R14: 00000000004cf810 R15: 0000000000000004 13:42:51 executing program 1 (fault-call:3 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2106.292620][T17171] FAULT_INJECTION: forcing a failure. [ 2106.292620][T17171] name failslab, interval 1, probability 0, space 0, times 0 [ 2106.318712][T17171] CPU: 0 PID: 17171 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2106.326728][T17171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2106.336788][T17171] Call Trace: [ 2106.336817][T17171] dump_stack+0x172/0x1f0 [ 2106.336837][T17171] should_fail.cold+0xa/0x15 [ 2106.336854][T17171] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2106.336878][T17171] ? ___might_sleep+0x163/0x280 [ 2106.359963][T17171] __should_failslab+0x121/0x190 [ 2106.364899][T17171] should_failslab+0x9/0x14 [ 2106.364914][T17171] kmem_cache_alloc+0x2b2/0x6f0 [ 2106.364935][T17171] __alloc_file+0x27/0x300 [ 2106.378785][T17171] alloc_empty_file+0x72/0x170 [ 2106.383553][T17171] alloc_file+0x5e/0x4d0 [ 2106.387815][T17171] alloc_file_pseudo+0x189/0x280 [ 2106.392848][T17171] ? alloc_file+0x4d0/0x4d0 [ 2106.397531][T17171] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2106.403776][T17171] __shmem_file_setup.part.0+0x108/0x2b0 [ 2106.409415][T17171] shmem_file_setup+0x66/0x90 [ 2106.414090][T17171] __x64_sys_memfd_create+0x2a2/0x470 [ 2106.419544][T17171] ? memfd_fcntl+0x1550/0x1550 [ 2106.424306][T17171] ? do_syscall_64+0x26/0x610 [ 2106.428982][T17171] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2106.434272][T17171] ? trace_hardirqs_on+0x67/0x230 [ 2106.439432][T17171] do_syscall_64+0x103/0x610 [ 2106.444040][T17171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2106.450019][T17171] RIP: 0033:0x458c29 [ 2106.453940][T17171] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2106.473541][T17171] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2106.481952][T17171] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 13:42:51 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xf4ffffff}) 13:42:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:42:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x0f\x00+\x86a\x957s\x16FA\x00'}}) 13:42:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000012c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2106.490006][T17171] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 2106.498067][T17171] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2106.506266][T17171] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fe5118836d4 [ 2106.514231][T17171] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2106.574710][T17177] FAULT_INJECTION: forcing a failure. [ 2106.574710][T17177] name failslab, interval 1, probability 0, space 0, times 0 [ 2106.599315][T17177] CPU: 0 PID: 17177 Comm: syz-executor.1 Not tainted 5.1.0-rc5+ #70 [ 2106.607315][T17177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2106.607322][T17177] Call Trace: 13:42:52 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2106.607348][T17177] dump_stack+0x172/0x1f0 [ 2106.607368][T17177] should_fail.cold+0xa/0x15 [ 2106.607386][T17177] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2106.607412][T17177] ? ___might_sleep+0x163/0x280 [ 2106.607432][T17177] __should_failslab+0x121/0x190 [ 2106.607454][T17177] should_failslab+0x9/0x14 [ 2106.620807][T17177] kmem_cache_alloc+0x2b2/0x6f0 [ 2106.620822][T17177] ? rcu_read_lock_sched_held+0x110/0x130 [ 2106.620835][T17177] ? kmem_cache_alloc+0x32e/0x6f0 [ 2106.620855][T17177] security_file_alloc+0x39/0x170 13:42:52 executing program 1 (fault-call:3 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:42:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x4) [ 2106.620870][T17177] __alloc_file+0xac/0x300 [ 2106.620883][T17177] alloc_empty_file+0x72/0x170 [ 2106.620897][T17177] alloc_file+0x5e/0x4d0 [ 2106.620916][T17177] alloc_file_pseudo+0x189/0x280 [ 2106.630440][T17177] ? alloc_file+0x4d0/0x4d0 [ 2106.630459][T17177] ? __alloc_fd+0x44d/0x560 [ 2106.630481][T17177] sock_alloc_file+0x4d/0x170 [ 2106.630495][T17177] __sys_accept4+0x259/0x6a0 [ 2106.630513][T17177] ? __ia32_sys_listen+0x80/0x80 [ 2106.630525][T17177] ? fput_many+0x12c/0x1a0 [ 2106.630537][T17177] ? fput+0x1b/0x20 13:42:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x10\x00+\x86a\x957s\x16FA\x00'}}) [ 2106.630551][T17177] ? ksys_write+0x1f1/0x2d0 [ 2106.630571][T17177] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2106.630585][T17177] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2106.630603][T17177] ? do_syscall_64+0x26/0x610 [ 2106.641333][T17177] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2106.641350][T17177] ? do_syscall_64+0x26/0x610 [ 2106.641368][T17177] __x64_sys_accept4+0x97/0xf0 [ 2106.641383][T17177] do_syscall_64+0x103/0x610 [ 2106.641403][T17177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2106.641414][T17177] RIP: 0033:0x458c29 [ 2106.641427][T17177] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2106.641434][T17177] RSP: 002b:00007f9dd43afc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 2106.641447][T17177] RAX: ffffffffffffffda RBX: 00007f9dd43afc90 RCX: 0000000000458c29 [ 2106.641455][T17177] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 2106.641463][T17177] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2106.641471][T17177] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9dd43b06d4 [ 2106.641480][T17177] R13: 00000000004beac8 R14: 00000000004cf810 R15: 0000000000000004 [ 2106.898757][T17190] FAULT_INJECTION: forcing a failure. [ 2106.898757][T17190] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2106.923372][T17190] CPU: 1 PID: 17190 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2106.931390][T17190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2106.941459][T17190] Call Trace: 13:42:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0xe0) [ 2106.944761][T17190] dump_stack+0x172/0x1f0 [ 2106.944785][T17190] should_fail.cold+0xa/0x15 [ 2106.944805][T17190] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2106.954006][T17190] ? ___might_sleep+0x163/0x280 [ 2106.954034][T17190] should_fail_alloc_page+0x50/0x60 [ 2106.954050][T17190] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2106.954075][T17190] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2106.981132][T17190] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2106.987375][T17190] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2106.993709][T17190] alloc_pages_vma+0xdd/0x540 [ 2106.998397][T17190] shmem_alloc_page+0xc0/0x180 [ 2107.003163][T17190] ? shmem_swapin+0x1a0/0x1a0 [ 2107.007847][T17190] ? lock_downgrade+0x880/0x880 [ 2107.012708][T17190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2107.019001][T17190] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2107.024720][T17190] ? __vm_enough_memory+0x320/0x5a0 [ 2107.030024][T17190] shmem_alloc_and_acct_page+0x165/0x970 [ 2107.035683][T17190] shmem_getpage_gfp+0x43b/0x2500 [ 2107.040726][T17190] ? shmem_unuse_inode.constprop.0+0xfd0/0xfd0 [ 2107.046981][T17190] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 2107.052795][T17190] ? current_time+0x6b/0x140 [ 2107.057382][T17190] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 2107.063195][T17190] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2107.069443][T17190] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2107.075446][T17190] shmem_write_begin+0x105/0x1e0 [ 2107.080582][T17190] generic_perform_write+0x231/0x530 [ 2107.086161][T17190] ? page_endio+0x780/0x780 [ 2107.090665][T17190] ? current_time+0x140/0x140 [ 2107.095720][T17190] ? lock_acquire+0x1ea/0x3f0 [ 2107.100495][T17190] __generic_file_write_iter+0x25e/0x630 [ 2107.106225][T17190] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2107.111957][T17190] generic_file_write_iter+0x360/0x610 [ 2107.117439][T17190] ? __generic_file_write_iter+0x630/0x630 [ 2107.123250][T17190] ? aa_path_link+0x460/0x460 [ 2107.127935][T17190] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2107.134180][T17190] ? iov_iter_init+0xee/0x220 [ 2107.138867][T17190] new_sync_write+0x4c7/0x760 [ 2107.143552][T17190] ? default_llseek+0x2e0/0x2e0 [ 2107.148399][T17190] ? lock_downgrade+0x880/0x880 [ 2107.153281][T17190] __vfs_write+0xe4/0x110 [ 2107.157615][T17190] vfs_write+0x20c/0x580 [ 2107.161867][T17190] ksys_pwrite64+0x183/0x1c0 [ 2107.166468][T17190] ? __ia32_sys_pread64+0xf0/0xf0 [ 2107.171496][T17190] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2107.176956][T17190] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2107.182424][T17190] ? do_syscall_64+0x26/0x610 [ 2107.187187][T17190] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2107.193252][T17190] ? do_syscall_64+0x26/0x610 [ 2107.198023][T17190] __x64_sys_pwrite64+0x97/0xf0 [ 2107.202881][T17190] do_syscall_64+0x103/0x610 [ 2107.207583][T17190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2107.213490][T17190] RIP: 0033:0x412c27 [ 2107.217407][T17190] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2107.237282][T17190] RSP: 002b:00007fe511882a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2107.245841][T17190] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000412c27 [ 2107.253829][T17190] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 2107.261812][T17190] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2107.269789][T17190] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 2107.277853][T17190] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2107.286889][T17185] hfs: unable to parse mount options 13:42:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:42:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x2000) [ 2107.408115][T17185] hfs: unable to parse mount options 13:42:52 executing program 4 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:52 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xf5ffffff}) 13:42:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x11\x00+\x86a\x957s\x16FA\x00'}}) 13:42:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0xe0ff) 13:42:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000013c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x4) [ 2107.598204][T17212] FAULT_INJECTION: forcing a failure. [ 2107.598204][T17212] name failslab, interval 1, probability 0, space 0, times 0 [ 2107.610835][T17212] CPU: 0 PID: 17212 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2107.619078][T17212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2107.629235][T17212] Call Trace: [ 2107.632532][T17212] dump_stack+0x172/0x1f0 [ 2107.636868][T17212] should_fail.cold+0xa/0x15 [ 2107.641466][T17212] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2107.648577][T17212] ? is_dynamic_key+0x1c0/0x1c0 [ 2107.653444][T17212] __should_failslab+0x121/0x190 [ 2107.658992][T17212] should_failslab+0x9/0x14 [ 2107.663496][T17212] kmem_cache_alloc+0x47/0x6f0 [ 2107.668256][T17212] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2107.674067][T17212] xas_alloc+0x2df/0x3d0 [ 2107.678311][T17212] xas_create+0x2cd/0x1040 [ 2107.682745][T17212] xas_create_range+0x198/0x5d0 [ 2107.687614][T17212] shmem_add_to_page_cache+0x6f3/0x1200 [ 2107.696691][T17212] ? shmem_writepage+0xe90/0xe90 [ 2107.702240][T17212] shmem_getpage_gfp+0x6db/0x2500 [ 2107.707278][T17212] ? shmem_unuse_inode.constprop.0+0xfd0/0xfd0 [ 2107.713519][T17212] ? current_time+0x6b/0x140 [ 2107.718141][T17212] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 2107.723949][T17212] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2107.730185][T17212] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2107.736170][T17212] shmem_write_begin+0x105/0x1e0 [ 2107.741209][T17212] generic_perform_write+0x231/0x530 [ 2107.746506][T17212] ? page_endio+0x780/0x780 [ 2107.751004][T17212] ? current_time+0x140/0x140 [ 2107.756188][T17212] ? lock_acquire+0x16f/0x3f0 [ 2107.761041][T17212] __generic_file_write_iter+0x25e/0x630 [ 2107.766757][T17212] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2107.772478][T17212] generic_file_write_iter+0x360/0x610 [ 2107.777944][T17212] ? __generic_file_write_iter+0x630/0x630 [ 2107.783749][T17212] ? aa_path_link+0x460/0x460 [ 2107.788446][T17212] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2107.794684][T17212] ? iov_iter_init+0xee/0x220 [ 2107.799466][T17212] new_sync_write+0x4c7/0x760 [ 2107.804576][T17212] ? default_llseek+0x2e0/0x2e0 [ 2107.809517][T17212] ? lock_downgrade+0x880/0x880 [ 2107.814385][T17212] __vfs_write+0xe4/0x110 [ 2107.818717][T17212] vfs_write+0x20c/0x580 [ 2107.822960][T17212] ksys_pwrite64+0x183/0x1c0 [ 2107.827548][T17212] ? __ia32_sys_pread64+0xf0/0xf0 [ 2107.832567][T17212] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2107.838024][T17212] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2107.843475][T17212] ? do_syscall_64+0x26/0x610 [ 2107.848149][T17212] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2107.854223][T17212] ? do_syscall_64+0x26/0x610 [ 2107.858909][T17212] __x64_sys_pwrite64+0x97/0xf0 [ 2107.863756][T17212] do_syscall_64+0x103/0x610 [ 2107.868344][T17212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2107.874226][T17212] RIP: 0033:0x412c27 [ 2107.878114][T17212] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2107.898057][T17212] RSP: 002b:00007fe511882a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2107.906460][T17212] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000412c27 [ 2107.914436][T17212] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 2107.922400][T17212] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2107.930373][T17212] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 2107.938335][T17212] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:42:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x4000000) 13:42:53 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2108.045639][T17222] hfs: unable to parse mount options 13:42:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0xffe0) [ 2108.124478][T17222] hfs: unable to parse mount options [ 2108.213196][T17235] FAULT_INJECTION: forcing a failure. [ 2108.213196][T17235] name failslab, interval 1, probability 0, space 0, times 0 [ 2108.226091][T17235] CPU: 0 PID: 17235 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2108.234076][T17235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2108.244137][T17235] Call Trace: [ 2108.247446][T17235] dump_stack+0x172/0x1f0 [ 2108.251796][T17235] should_fail.cold+0xa/0x15 [ 2108.256403][T17235] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2108.262332][T17235] ? is_dynamic_key+0x1c0/0x1c0 [ 2108.267378][T17235] __should_failslab+0x121/0x190 [ 2108.272329][T17235] should_failslab+0x9/0x14 [ 2108.276846][T17235] kmem_cache_alloc+0x47/0x6f0 [ 2108.281911][T17235] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2108.287731][T17235] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2108.293021][T17235] xas_alloc+0x2df/0x3d0 [ 2108.297282][T17235] xas_create+0x2cd/0x1040 [ 2108.301709][T17235] xas_create_range+0x198/0x5d0 [ 2108.306571][T17235] shmem_add_to_page_cache+0x6f3/0x1200 [ 2108.312131][T17235] ? shmem_writepage+0xe90/0xe90 [ 2108.317083][T17235] shmem_getpage_gfp+0x6db/0x2500 [ 2108.322121][T17235] ? shmem_unuse_inode.constprop.0+0xfd0/0xfd0 [ 2108.328321][T17235] ? current_time+0x6b/0x140 [ 2108.332921][T17235] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 2108.338729][T17235] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2108.345587][T17235] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2108.351487][T17235] shmem_write_begin+0x105/0x1e0 [ 2108.356437][T17235] generic_perform_write+0x231/0x530 [ 2108.361736][T17235] ? page_endio+0x780/0x780 [ 2108.366247][T17235] ? current_time+0x140/0x140 [ 2108.370927][T17235] ? lock_acquire+0x16f/0x3f0 [ 2108.375611][T17235] __generic_file_write_iter+0x25e/0x630 [ 2108.385058][T17235] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2108.390880][T17235] generic_file_write_iter+0x360/0x610 [ 2108.396343][T17235] ? __generic_file_write_iter+0x630/0x630 [ 2108.402149][T17235] ? aa_path_link+0x460/0x460 [ 2108.406955][T17235] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2108.413221][T17235] ? iov_iter_init+0xee/0x220 [ 2108.417905][T17235] new_sync_write+0x4c7/0x760 [ 2108.422589][T17235] ? default_llseek+0x2e0/0x2e0 [ 2108.427435][T17235] ? lock_downgrade+0x880/0x880 [ 2108.432305][T17235] __vfs_write+0xe4/0x110 [ 2108.436640][T17235] vfs_write+0x20c/0x580 [ 2108.440890][T17235] ksys_pwrite64+0x183/0x1c0 [ 2108.445483][T17235] ? __ia32_sys_pread64+0xf0/0xf0 [ 2108.450505][T17235] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2108.456047][T17235] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2108.461507][T17235] ? do_syscall_64+0x26/0x610 [ 2108.466274][T17235] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2108.472343][T17235] ? do_syscall_64+0x26/0x610 [ 2108.477023][T17235] __x64_sys_pwrite64+0x97/0xf0 [ 2108.481894][T17235] do_syscall_64+0x103/0x610 [ 2108.486492][T17235] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2108.492383][T17235] RIP: 0033:0x412c27 [ 2108.496274][T17235] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2108.516254][T17235] RSP: 002b:00007fe511882a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2108.524875][T17235] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000412c27 [ 2108.532855][T17235] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 2108.540828][T17235] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2108.548917][T17235] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 2108.556887][T17235] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:42:53 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xf6ffffff}) 13:42:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0xfeffffff) 13:42:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x4000000) 13:42:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000014c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x12\x00+\x86a\x957s\x16FA\x00'}}) 13:42:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0xfffffffe) 13:42:54 executing program 4 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x20000000) [ 2108.764911][T17247] hfs: unable to parse mount options 13:42:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000015c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2108.902316][T17247] hfs: unable to parse mount options 13:42:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x1000000000000) 13:42:54 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xf9fdffff}) [ 2108.950198][T17268] FAULT_INJECTION: forcing a failure. [ 2108.950198][T17268] name failslab, interval 1, probability 0, space 0, times 0 13:42:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0xe0ffffff) 13:42:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x13\x00+\x86a\x957s\x16FA\x00'}}) [ 2108.996096][T17268] CPU: 1 PID: 17268 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2109.004293][T17268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2109.014359][T17268] Call Trace: [ 2109.017671][T17268] dump_stack+0x172/0x1f0 [ 2109.022190][T17268] should_fail.cold+0xa/0x15 [ 2109.026795][T17268] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2109.032889][T17268] ? ___might_sleep+0x163/0x280 [ 2109.037757][T17268] __should_failslab+0x121/0x190 [ 2109.042719][T17268] should_failslab+0x9/0x14 [ 2109.047230][T17268] kmem_cache_alloc+0x2b2/0x6f0 [ 2109.052092][T17268] ? __save_stack_trace+0x99/0x100 [ 2109.058077][T17268] __alloc_file+0x27/0x300 [ 2109.062509][T17268] alloc_empty_file+0x72/0x170 [ 2109.067314][T17268] path_openat+0xef/0x46e0 [ 2109.071734][T17268] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2109.077534][T17268] ? kasan_slab_alloc+0xf/0x20 [ 2109.082299][T17268] ? kmem_cache_alloc+0x11a/0x6f0 [ 2109.087317][T17268] ? getname_flags+0xd6/0x5b0 [ 2109.092073][T17268] ? getname+0x1a/0x20 [ 2109.096156][T17268] ? do_sys_open+0x2c9/0x5d0 [ 2109.100740][T17268] ? __x64_sys_open+0x7e/0xc0 [ 2109.105413][T17268] ? do_syscall_64+0x103/0x610 [ 2109.110176][T17268] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2109.116388][T17268] ? __lock_acquire+0x548/0x3fb0 [ 2109.121330][T17268] ? __lock_acquire+0x548/0x3fb0 [ 2109.126274][T17268] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2109.131661][T17268] ? __alloc_fd+0x44d/0x560 [ 2109.136174][T17268] do_filp_open+0x1a1/0x280 [ 2109.140682][T17268] ? may_open_dev+0x100/0x100 [ 2109.145364][T17268] ? lock_downgrade+0x880/0x880 [ 2109.150222][T17268] ? kasan_check_read+0x11/0x20 [ 2109.155069][T17268] ? do_raw_spin_unlock+0x57/0x270 [ 2109.160183][T17268] ? _raw_spin_unlock+0x2d/0x50 [ 2109.165034][T17268] ? __alloc_fd+0x44d/0x560 [ 2109.170156][T17268] do_sys_open+0x3fe/0x5d0 [ 2109.174587][T17268] ? filp_open+0x80/0x80 [ 2109.178847][T17268] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2109.184319][T17268] ? do_syscall_64+0x26/0x610 [ 2109.189006][T17268] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2109.195141][T17268] ? do_syscall_64+0x26/0x610 [ 2109.199834][T17268] __x64_sys_open+0x7e/0xc0 [ 2109.204336][T17268] do_syscall_64+0x103/0x610 [ 2109.208939][T17268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2109.214829][T17268] RIP: 0033:0x412bc1 [ 2109.218723][T17268] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2109.238507][T17268] RSP: 002b:00007fe511882a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2109.246918][T17268] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412bc1 [ 2109.254915][T17268] RDX: 00007fe511882b0a RSI: 0000000000000002 RDI: 00007fe511882b00 [ 2109.262884][T17268] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2109.271485][T17268] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2109.279454][T17268] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:42:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x400000000000000) 13:42:54 executing program 4 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000016c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0xfeffffff) [ 2109.409894][T17280] hfs: unable to parse mount options [ 2109.481821][T17287] FAULT_INJECTION: forcing a failure. [ 2109.481821][T17287] name failslab, interval 1, probability 0, space 0, times 0 [ 2109.506669][T17287] CPU: 1 PID: 17287 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2109.514864][T17287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2109.524923][T17287] Call Trace: [ 2109.528238][T17287] dump_stack+0x172/0x1f0 [ 2109.532584][T17287] should_fail.cold+0xa/0x15 [ 2109.537191][T17287] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2109.543095][T17287] ? ___might_sleep+0x163/0x280 [ 2109.547964][T17287] __should_failslab+0x121/0x190 [ 2109.547980][T17287] should_failslab+0x9/0x14 [ 2109.548002][T17287] kmem_cache_alloc+0x2b2/0x6f0 [ 2109.562347][T17287] ? __save_stack_trace+0x99/0x100 [ 2109.562367][T17287] __alloc_file+0x27/0x300 [ 2109.562384][T17287] alloc_empty_file+0x72/0x170 [ 2109.576654][T17287] path_openat+0xef/0x46e0 13:42:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x14\x00+\x86a\x957s\x16FA\x00'}}) [ 2109.581079][T17287] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2109.587323][T17287] ? kasan_slab_alloc+0xf/0x20 [ 2109.592118][T17287] ? kmem_cache_alloc+0x11a/0x6f0 [ 2109.597151][T17287] ? getname_flags+0xd6/0x5b0 [ 2109.601835][T17287] ? getname+0x1a/0x20 [ 2109.605905][T17287] ? do_sys_open+0x2c9/0x5d0 [ 2109.610505][T17287] ? __x64_sys_open+0x7e/0xc0 [ 2109.615440][T17287] ? do_syscall_64+0x103/0x610 [ 2109.620202][T17287] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2109.626276][T17287] ? __lock_acquire+0x548/0x3fb0 [ 2109.631313][T17287] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2109.636731][T17287] ? __alloc_fd+0x44d/0x560 [ 2109.641251][T17287] do_filp_open+0x1a1/0x280 [ 2109.645843][T17287] ? may_open_dev+0x100/0x100 [ 2109.650611][T17287] ? lock_downgrade+0x880/0x880 [ 2109.655471][T17287] ? kasan_check_read+0x11/0x20 [ 2109.660582][T17287] ? do_raw_spin_unlock+0x57/0x270 [ 2109.665699][T17287] ? _raw_spin_unlock+0x2d/0x50 [ 2109.670548][T17287] ? __alloc_fd+0x44d/0x560 [ 2109.675091][T17287] do_sys_open+0x3fe/0x5d0 13:42:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0xfeffffff00000000) [ 2109.679511][T17287] ? filp_open+0x80/0x80 [ 2109.683761][T17287] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2109.692467][T17287] ? do_syscall_64+0x26/0x610 [ 2109.697149][T17287] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2109.703264][T17287] ? do_syscall_64+0x26/0x610 [ 2109.708036][T17287] __x64_sys_open+0x7e/0xc0 [ 2109.712632][T17287] do_syscall_64+0x103/0x610 [ 2109.717232][T17287] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2109.723559][T17287] RIP: 0033:0x412bc1 [ 2109.727552][T17287] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2109.747949][T17287] RSP: 002b:00007fe511882a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2109.756363][T17287] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412bc1 [ 2109.764514][T17287] RDX: 00007fe511882b0a RSI: 0000000000000002 RDI: 00007fe511882b00 [ 2109.772494][T17287] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2109.780509][T17287] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2109.788581][T17287] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2109.800319][T17280] hfs: unable to parse mount options 13:42:55 executing program 4 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0xffffffe0) 13:42:55 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xfbffffff}) 13:42:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000017c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000080)={0x8, {0xffffffff, 0x3f, 0xb29, 0x400}}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f00000000c0)=0x3) statx(r1, &(0x7f0000000240)='./file0\x00', 0x1000, 0x200, &(0x7f0000000280)) accept4$netrom(r2, 0x0, 0x0, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000100)={0xd9, 0x9, 0xd4, 0x0, 0x0, [], [], [], 0x80, 0xfff}) [ 2109.974921][T17302] FAULT_INJECTION: forcing a failure. [ 2109.974921][T17302] name failslab, interval 1, probability 0, space 0, times 0 13:42:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0xfffffffe) [ 2110.056558][T17302] CPU: 0 PID: 17302 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2110.064581][T17302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2110.074655][T17302] Call Trace: [ 2110.077959][T17302] dump_stack+0x172/0x1f0 [ 2110.082303][T17302] should_fail.cold+0xa/0x15 [ 2110.087019][T17302] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2110.092940][T17302] ? ___might_sleep+0x163/0x280 [ 2110.097804][T17302] __should_failslab+0x121/0x190 13:42:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x15\x00+\x86a\x957s\x16FA\x00'}}) [ 2110.102757][T17302] should_failslab+0x9/0x14 [ 2110.107274][T17302] kmem_cache_alloc+0x2b2/0x6f0 [ 2110.112224][T17302] ? rcu_read_lock_sched_held+0x110/0x130 [ 2110.118082][T17302] ? kmem_cache_alloc+0x32e/0x6f0 [ 2110.123305][T17302] security_file_alloc+0x39/0x170 [ 2110.128343][T17302] __alloc_file+0xac/0x300 [ 2110.132766][T17302] alloc_empty_file+0x72/0x170 [ 2110.137533][T17302] path_openat+0xef/0x46e0 [ 2110.142126][T17302] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2110.148029][T17302] ? kasan_slab_alloc+0xf/0x20 [ 2110.152873][T17302] ? kmem_cache_alloc+0x11a/0x6f0 [ 2110.157895][T17302] ? getname_flags+0xd6/0x5b0 [ 2110.162578][T17302] ? getname+0x1a/0x20 [ 2110.166652][T17302] ? do_sys_open+0x2c9/0x5d0 [ 2110.171326][T17302] ? __x64_sys_open+0x7e/0xc0 [ 2110.176005][T17302] ? do_syscall_64+0x103/0x610 [ 2110.180767][T17302] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2110.186866][T17302] ? __lock_acquire+0x548/0x3fb0 [ 2110.191807][T17302] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2110.197399][T17302] ? __alloc_fd+0x44d/0x560 [ 2110.201905][T17302] do_filp_open+0x1a1/0x280 [ 2110.206422][T17302] ? may_open_dev+0x100/0x100 [ 2110.211108][T17302] ? lock_downgrade+0x880/0x880 [ 2110.215995][T17302] ? kasan_check_read+0x11/0x20 [ 2110.220848][T17302] ? do_raw_spin_unlock+0x57/0x270 [ 2110.226047][T17302] ? _raw_spin_unlock+0x2d/0x50 [ 2110.230910][T17302] ? __alloc_fd+0x44d/0x560 [ 2110.235426][T17302] do_sys_open+0x3fe/0x5d0 [ 2110.239845][T17302] ? filp_open+0x80/0x80 [ 2110.244118][T17302] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2110.249574][T17302] ? do_syscall_64+0x26/0x610 [ 2110.254246][T17302] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2110.260335][T17302] ? do_syscall_64+0x26/0x610 [ 2110.265107][T17302] __x64_sys_open+0x7e/0xc0 [ 2110.269612][T17302] do_syscall_64+0x103/0x610 [ 2110.274202][T17302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2110.280094][T17302] RIP: 0033:0x412bc1 [ 2110.283986][T17302] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2110.303759][T17302] RSP: 002b:00007fe511882a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2110.312455][T17302] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412bc1 [ 2110.320511][T17302] RDX: 00007fe511882b0a RSI: 0000000000000002 RDI: 00007fe511882b00 [ 2110.328593][T17302] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2110.336646][T17302] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2110.344622][T17302] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:42:55 executing program 4 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x800) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000000c0)={0xfbb0000, 0x6, 0x0, [], &(0x7f0000000080)={0xb90bff, 0xffffffffffffff00}}) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={'nr', 0x0}, 0x6, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x6, 0x5, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) accept4$netrom(r1, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f00000002c0)=r3) [ 2110.414474][T17309] hfs: unable to parse mount options 13:42:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x1000000000000) [ 2110.533469][T17309] hfs: unable to parse mount options 13:42:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000018c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2110.553804][T17326] FAULT_INJECTION: forcing a failure. [ 2110.553804][T17326] name failslab, interval 1, probability 0, space 0, times 0 [ 2110.608340][T17326] CPU: 1 PID: 17326 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2110.616590][T17326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2110.626653][T17326] Call Trace: [ 2110.629982][T17326] dump_stack+0x172/0x1f0 [ 2110.634335][T17326] should_fail.cold+0xa/0x15 [ 2110.638966][T17326] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2110.644786][T17326] ? ___might_sleep+0x163/0x280 [ 2110.649667][T17326] __should_failslab+0x121/0x190 [ 2110.654723][T17326] should_failslab+0x9/0x14 [ 2110.659272][T17326] kmem_cache_alloc+0x2b2/0x6f0 [ 2110.664517][T17326] ? rcu_read_lock_sched_held+0x110/0x130 [ 2110.670249][T17326] ? kmem_cache_alloc+0x32e/0x6f0 [ 2110.675283][T17326] security_file_alloc+0x39/0x170 [ 2110.680330][T17326] __alloc_file+0xac/0x300 [ 2110.684757][T17326] alloc_empty_file+0x72/0x170 [ 2110.689700][T17326] path_openat+0xef/0x46e0 [ 2110.694118][T17326] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2110.699925][T17326] ? kasan_slab_alloc+0xf/0x20 13:42:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f00000002c0)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0xffff}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e21, 0x1000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}}, 0x2, 0x3}, &(0x7f0000000280)=0x90) ioctl(r1, 0x30, &(0x7f0000000080)="d71e6b623e3b2a794d224067b5cb9bb5875bd5d67d895ee04a895843641277e9582687a7d0bc3248d33923a85228831b58e2e2d45b623d30492b31efe66da556d67f4058faad63a175eb00c5eb8cd5c9da5327037d27dd1c6f76778c60de8d1df2537e9b9137bd5fd582352d790aaebc7980992ebb6037551e0fdb89a54db91062e05c36529fe94dc4acc41f76dfaa8692505ddc777ad7773c6e39545ae47a63aa") 13:42:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x400000000000000) [ 2110.704872][T17326] ? kmem_cache_alloc+0x11a/0x6f0 [ 2110.709899][T17326] ? getname_flags+0xd6/0x5b0 [ 2110.714576][T17326] ? getname+0x1a/0x20 [ 2110.718664][T17326] ? do_sys_open+0x2c9/0x5d0 [ 2110.723259][T17326] ? __x64_sys_open+0x7e/0xc0 [ 2110.727952][T17326] ? do_syscall_64+0x103/0x610 [ 2110.732725][T17326] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2110.738812][T17326] ? __lock_acquire+0x548/0x3fb0 [ 2110.743751][T17326] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2110.749227][T17326] ? __alloc_fd+0x44d/0x560 [ 2110.753731][T17326] do_filp_open+0x1a1/0x280 [ 2110.758236][T17326] ? may_open_dev+0x100/0x100 [ 2110.762917][T17326] ? lock_downgrade+0x880/0x880 [ 2110.767777][T17326] ? kasan_check_read+0x11/0x20 [ 2110.772803][T17326] ? do_raw_spin_unlock+0x57/0x270 [ 2110.777915][T17326] ? _raw_spin_unlock+0x2d/0x50 [ 2110.782788][T17326] ? __alloc_fd+0x44d/0x560 [ 2110.787303][T17326] do_sys_open+0x3fe/0x5d0 [ 2110.791733][T17326] ? filp_open+0x80/0x80 [ 2110.796071][T17326] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2110.801657][T17326] ? do_syscall_64+0x26/0x610 [ 2110.806341][T17326] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2110.813360][T17326] ? do_syscall_64+0x26/0x610 [ 2110.818062][T17326] __x64_sys_open+0x7e/0xc0 [ 2110.822571][T17326] do_syscall_64+0x103/0x610 [ 2110.827170][T17326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2110.833058][T17326] RIP: 0033:0x412bc1 [ 2110.836955][T17326] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2110.856656][T17326] RSP: 002b:00007fe511882a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2110.865156][T17326] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412bc1 [ 2110.873134][T17326] RDX: 00007fe511882b0a RSI: 0000000000000002 RDI: 00007fe511882b00 [ 2110.881107][T17326] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2110.889084][T17326] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2110.897165][T17326] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:42:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x16\x00+\x86a\x957s\x16FA\x00'}}) 13:42:56 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xfcfdffff}) 13:42:56 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x200200, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000001c0)) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f00000000c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x6, &(0x7f0000000180)="0a0400123c12842e6ca8a519796d") syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x28800, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000080)="a93f41b58657e53699a6642215951ae484ae2ffb682ba4e1e528f4c200e4060fe0e4bc880bf65f974c1608fa91") getpeername$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) set_thread_area(&(0x7f0000000140)={0x4, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, 0x8, 0x0, 0x80000000, 0xe000000000000000, 0x4, 0x7}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) write$P9_RRENAME(r0, &(0x7f00000002c0)={0xfffffffffffffe4a, 0x15, 0x2}, 0xfffffffffffffffe) 13:42:56 executing program 4 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x2000000000000000) 13:42:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000019c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2111.074980][T17340] hfs: unable to parse mount options [ 2111.101243][T17349] FAULT_INJECTION: forcing a failure. [ 2111.101243][T17349] name failslab, interval 1, probability 0, space 0, times 0 [ 2111.126947][T17349] CPU: 0 PID: 17349 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2111.134992][T17349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2111.145063][T17349] Call Trace: [ 2111.148365][T17349] dump_stack+0x172/0x1f0 [ 2111.152703][T17349] should_fail.cold+0xa/0x15 [ 2111.157304][T17349] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2111.163134][T17349] ? ___might_sleep+0x163/0x280 [ 2111.168058][T17349] __should_failslab+0x121/0x190 [ 2111.173008][T17349] should_failslab+0x9/0x14 [ 2111.177512][T17349] kmem_cache_alloc+0x2b2/0x6f0 [ 2111.182392][T17349] __kernfs_new_node+0xef/0x690 [ 2111.187344][T17349] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2111.192807][T17349] ? __lock_acquire+0x548/0x3fb0 [ 2111.197745][T17349] kernfs_new_node+0x99/0x130 [ 2111.202427][T17349] kernfs_create_dir_ns+0x52/0x160 [ 2111.207566][T17349] internal_create_group+0x7f8/0xc40 [ 2111.212850][T17349] ? bd_set_size+0x89/0xb0 [ 2111.217270][T17349] ? remove_files.isra.0+0x190/0x190 [ 2111.222579][T17349] sysfs_create_group+0x20/0x30 [ 2111.227795][T17349] lo_ioctl+0x10af/0x2150 [ 2111.232214][T17349] ? lo_rw_aio+0x1120/0x1120 [ 2111.236804][T17349] blkdev_ioctl+0x6f2/0x1d10 [ 2111.241397][T17349] ? blkpg_ioctl+0xa90/0xa90 [ 2111.245985][T17349] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2111.251806][T17349] ? __fget+0x35a/0x550 [ 2111.255997][T17349] block_ioctl+0xee/0x130 [ 2111.260333][T17349] ? blkdev_fallocate+0x410/0x410 [ 2111.265444][T17349] do_vfs_ioctl+0xd6e/0x1390 [ 2111.270049][T17349] ? ioctl_preallocate+0x210/0x210 [ 2111.275269][T17349] ? __fget+0x381/0x550 [ 2111.279427][T17349] ? ksys_dup3+0x3e0/0x3e0 [ 2111.283842][T17349] ? do_sys_open+0x31d/0x5d0 [ 2111.288437][T17349] ? tomoyo_file_ioctl+0x23/0x30 [ 2111.293373][T17349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2111.299619][T17349] ? security_file_ioctl+0x93/0xc0 [ 2111.304728][T17349] ksys_ioctl+0xab/0xd0 [ 2111.308888][T17349] __x64_sys_ioctl+0x73/0xb0 [ 2111.313477][T17349] do_syscall_64+0x103/0x610 [ 2111.318248][T17349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2111.324134][T17349] RIP: 0033:0x458a97 [ 2111.328029][T17349] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2111.347719][T17349] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2111.356134][T17349] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 2111.364102][T17349] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 13:42:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0xe0ffffffffffffff) 13:42:56 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl(r0, 0x800, &(0x7f0000000080)="9d7aae2fb59dfd67e37553a7d74bc045586599a9eb5ca9e391901586") r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x309900, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000140)={0xd98b, 0x7, 0x308, 0xfffffffffffffffb, 0x2a506ed, 0xd1e0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f0000000180)="5161e07e9f8c474ad4ab54e64e78765627c17c60438b29f03e35e0e394e997bdd6922706eeef2c7ea0aebfc37e31ae75c5e2f978856caea9ec3a1c7956c66abc831ba4c8a636a7152ad5ea56ada0e02ca362af464effa8b5ff8cf197629d036fefdb6c5c7087125812697b715e96a91f7c54b8418d582028690a84b5") r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r3, 0x0, 0x0, 0x0) [ 2111.372072][T17349] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2111.380042][T17349] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2111.388010][T17349] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:42:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x17\x00+\x86a\x957s\x16FA\x00'}}) [ 2111.484469][T17340] hfs: unable to parse mount options 13:42:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0xfeffffff00000000) 13:42:56 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x8001000109000, 0x0) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000100)={0x1ff, &(0x7f0000000080)="545ee8ac35663665c85db539a83ef556f4f9d0253956940bef1782822c6351259a1629dd13be9f3ebdf6ac6b76f55bd88101904aafbab7e576f273aae2e1b70b2d4b185d937739"}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000340)={0xffffffffffffffff}, 0x111, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000140), r3, 0x1}}, 0x18) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:42:57 executing program 4 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:57 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xfdfdffff}) 13:42:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0xffffffffffffffe0) 13:42:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000001ac000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2111.781536][T17375] FAULT_INJECTION: forcing a failure. [ 2111.781536][T17375] name failslab, interval 1, probability 0, space 0, times 0 [ 2111.794456][T17375] CPU: 0 PID: 17375 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2111.802449][T17375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2111.812979][T17375] Call Trace: [ 2111.816281][T17375] dump_stack+0x172/0x1f0 [ 2111.820614][T17375] should_fail.cold+0xa/0x15 [ 2111.825222][T17375] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2111.831048][T17375] ? __save_stack_trace+0x99/0x100 [ 2111.836253][T17375] __should_failslab+0x121/0x190 [ 2111.841197][T17375] should_failslab+0x9/0x14 [ 2111.845785][T17375] kmem_cache_alloc+0x47/0x6f0 [ 2111.850896][T17375] ? save_stack+0xa9/0xd0 [ 2111.855235][T17375] ? save_stack+0x45/0xd0 [ 2111.859573][T17375] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2111.865469][T17375] ? kasan_slab_alloc+0xf/0x20 [ 2111.870229][T17375] ? kmem_cache_alloc+0x11a/0x6f0 [ 2111.875256][T17375] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 2111.881601][T17375] idr_get_free+0x474/0x890 [ 2111.886117][T17375] idr_alloc_u32+0x19e/0x330 [ 2111.890716][T17375] ? __fprop_inc_percpu_max+0x230/0x230 [ 2111.896359][T17375] ? mark_held_locks+0xf0/0xf0 [ 2111.901128][T17375] idr_alloc_cyclic+0x132/0x270 [ 2111.906009][T17375] ? idr_alloc+0x150/0x150 [ 2111.910433][T17375] __kernfs_new_node+0x171/0x690 [ 2111.915378][T17375] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2111.920934][T17375] ? kasan_check_read+0x11/0x20 [ 2111.925785][T17375] ? _raw_spin_unlock_irq+0x5e/0x90 [ 2111.930990][T17375] ? __schedule+0x1383/0x1cc0 [ 2111.935680][T17375] ? __lock_acquire+0x548/0x3fb0 [ 2111.940621][T17375] kernfs_new_node+0x99/0x130 [ 2111.945306][T17375] kernfs_create_dir_ns+0x52/0x160 [ 2111.950417][T17375] internal_create_group+0x7f8/0xc40 [ 2111.955697][T17375] ? bd_set_size+0x89/0xb0 [ 2111.960122][T17375] ? remove_files.isra.0+0x190/0x190 [ 2111.965418][T17375] sysfs_create_group+0x20/0x30 [ 2111.970268][T17375] lo_ioctl+0x10af/0x2150 [ 2111.974603][T17375] ? lo_rw_aio+0x1120/0x1120 [ 2111.979204][T17375] blkdev_ioctl+0x6f2/0x1d10 [ 2111.983815][T17375] ? blkpg_ioctl+0xa90/0xa90 [ 2111.988408][T17375] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2111.994313][T17375] ? __fget+0x35a/0x550 [ 2111.998484][T17375] block_ioctl+0xee/0x130 [ 2112.002817][T17375] ? blkdev_fallocate+0x410/0x410 [ 2112.007844][T17375] do_vfs_ioctl+0xd6e/0x1390 [ 2112.012440][T17375] ? ioctl_preallocate+0x210/0x210 [ 2112.017556][T17375] ? __fget+0x381/0x550 [ 2112.021816][T17375] ? ksys_dup3+0x3e0/0x3e0 [ 2112.026252][T17375] ? do_sys_open+0x31d/0x5d0 [ 2112.030842][T17375] ? tomoyo_file_ioctl+0x23/0x30 [ 2112.035779][T17375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2112.042018][T17375] ? security_file_ioctl+0x93/0xc0 [ 2112.047132][T17375] ksys_ioctl+0xab/0xd0 [ 2112.051292][T17375] __x64_sys_ioctl+0x73/0xb0 [ 2112.055882][T17375] do_syscall_64+0x103/0x610 [ 2112.060655][T17375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2112.066643][T17375] RIP: 0033:0x458a97 [ 2112.070629][T17375] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2112.090335][T17375] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2112.098836][T17375] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 2112.106802][T17375] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2112.114854][T17375] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2112.122909][T17375] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 13:42:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="17dc1f123c123f319bd070") r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x114, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x796}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x87b}]}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x30, 0x12}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8000}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xa}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x38, 0x10}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x20000840}, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x200, 0x40002) ioctl$VIDIOC_ENUMAUDIO(r3, 0xc0345641, &(0x7f0000000080)={0x5, "49ef413e766fc55f7ab1cfd9207853c7ceb4b1fb96908b8ce157606080b0efa2", 0x1, 0x1}) accept4$netrom(r3, 0x0, 0x0, 0x1) 13:42:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x18\x00+\x86a\x957s\x16FA\x00'}}) [ 2112.131144][T17375] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2112.179387][T17378] hfs: unable to parse mount options 13:42:57 executing program 4 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:57 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x60000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000080)={{0x6, 0x945, 0x5, 0x7, 0xfffffffffffffffd, 0xa0000000000}, 0x7, 0x1ff, 0x5b4, 0x3, 0x92, "bd12e4a1c9500865fb52e2f92f38d51778c0a8102a18d2d8b7a72204c292a64cfcc426f710b6ce6b9b042067385c6230f45ce0a05fe2c2a365517b5bfb50f7d08bc1bf80e733ead7492fb7d0b9032b5515f52d64affc5459774b142882d601ab79a81ba51475d2b659d18ebfa52c01a28876f5a0990271fc32ad389b7a154f2c"}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) [ 2112.304042][T17378] hfs: unable to parse mount options [ 2112.314634][T17394] FAULT_INJECTION: forcing a failure. [ 2112.314634][T17394] name failslab, interval 1, probability 0, space 0, times 0 [ 2112.352400][T17394] CPU: 0 PID: 17394 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2112.360416][T17394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2112.370482][T17394] Call Trace: [ 2112.373793][T17394] dump_stack+0x172/0x1f0 [ 2112.378134][T17394] should_fail.cold+0xa/0x15 [ 2112.382743][T17394] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2112.388657][T17394] ? ___might_sleep+0x163/0x280 [ 2112.393656][T17394] __should_failslab+0x121/0x190 [ 2112.398601][T17394] should_failslab+0x9/0x14 [ 2112.403116][T17394] kmem_cache_alloc+0x2b2/0x6f0 [ 2112.407998][T17394] ? find_held_lock+0x35/0x130 [ 2112.412766][T17394] ? kernfs_activate+0x192/0x1f0 [ 2112.417717][T17394] __kernfs_new_node+0xef/0x690 [ 2112.422574][T17394] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2112.428030][T17394] ? lock_downgrade+0x880/0x880 [ 2112.432903][T17394] ? kasan_check_write+0x14/0x20 [ 2112.437844][T17394] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2112.443399][T17394] ? wait_for_completion+0x440/0x440 [ 2112.448780][T17394] kernfs_new_node+0x99/0x130 [ 2112.453459][T17394] __kernfs_create_file+0x51/0x340 [ 2112.458581][T17394] sysfs_add_file_mode_ns+0x222/0x560 [ 2112.464058][T17394] internal_create_group+0x35b/0xc40 [ 2112.469340][T17394] ? bd_set_size+0x89/0xb0 [ 2112.473764][T17394] ? remove_files.isra.0+0x190/0x190 [ 2112.479058][T17394] sysfs_create_group+0x20/0x30 [ 2112.483911][T17394] lo_ioctl+0x10af/0x2150 [ 2112.488244][T17394] ? lo_rw_aio+0x1120/0x1120 [ 2112.492936][T17394] blkdev_ioctl+0x6f2/0x1d10 [ 2112.497534][T17394] ? blkpg_ioctl+0xa90/0xa90 [ 2112.502125][T17394] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2112.508503][T17394] ? __fget+0x35a/0x550 [ 2112.512671][T17394] block_ioctl+0xee/0x130 [ 2112.517016][T17394] ? blkdev_fallocate+0x410/0x410 [ 2112.522207][T17394] do_vfs_ioctl+0xd6e/0x1390 [ 2112.526805][T17394] ? ioctl_preallocate+0x210/0x210 [ 2112.532001][T17394] ? __fget+0x381/0x550 [ 2112.536168][T17394] ? ksys_dup3+0x3e0/0x3e0 [ 2112.540582][T17394] ? do_sys_open+0x31d/0x5d0 [ 2112.545173][T17394] ? tomoyo_file_ioctl+0x23/0x30 [ 2112.550111][T17394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2112.556358][T17394] ? security_file_ioctl+0x93/0xc0 [ 2112.561478][T17394] ksys_ioctl+0xab/0xd0 [ 2112.565643][T17394] __x64_sys_ioctl+0x73/0xb0 [ 2112.570237][T17394] do_syscall_64+0x103/0x610 [ 2112.574830][T17394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2112.580717][T17394] RIP: 0033:0x458a97 13:42:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xde0, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x800) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x1c) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) [ 2112.584632][T17394] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2112.604509][T17394] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2112.613179][T17394] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 2112.621233][T17394] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2112.629204][T17394] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2112.637170][T17394] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2112.645323][T17394] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:42:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x19\x00+\x86a\x957s\x16FA\x00'}}) 13:42:58 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xff0f0000}) 13:42:58 executing program 4 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sync_file_range(r0, 0x5, 0x2cb, 0x4) pipe2(&(0x7f0000000000), 0x4000) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:42:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = accept4$netrom(r1, 0x0, 0x0, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x90c5, 0xc400) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000000c0)={'rose0\x00', {0x2, 0x4e20, @multicast1}}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000080)={0xfffffffffffffff7}, 0x1) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000100)={0x0, 0x6, 0x0, 0x8, 0xfffffffffffffffb}, &(0x7f0000000140)=0x18) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000180)={r4, @in6={{0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0x17}, 0x69}}}, 0x84) 13:42:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000001bc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2112.964071][T17411] FAULT_INJECTION: forcing a failure. [ 2112.964071][T17411] name failslab, interval 1, probability 0, space 0, times 0 13:42:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = shmget$private(0x0, 0x1000, 0x1024, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000100)=""/111) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r3 = accept4$netrom(r2, 0x0, 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={0x0, @bcast, @netrom={'nr', 0x0}, 0x5, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, 0x7, [@null, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) [ 2113.014133][T17411] CPU: 0 PID: 17411 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2113.022247][T17411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2113.032403][T17411] Call Trace: [ 2113.036017][T17411] dump_stack+0x172/0x1f0 [ 2113.040377][T17411] should_fail.cold+0xa/0x15 [ 2113.045386][T17411] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2113.051586][T17411] ? ___might_sleep+0x163/0x280 [ 2113.056689][T17411] __should_failslab+0x121/0x190 [ 2113.061748][T17411] should_failslab+0x9/0x14 [ 2113.066344][T17411] kmem_cache_alloc+0x2b2/0x6f0 [ 2113.071275][T17411] ? lock_downgrade+0x880/0x880 [ 2113.076122][T17411] ? kasan_check_read+0x11/0x20 [ 2113.080964][T17411] __kernfs_new_node+0xef/0x690 [ 2113.086033][T17411] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2113.091477][T17411] ? wait_for_completion+0x440/0x440 [ 2113.096772][T17411] ? mutex_unlock+0xd/0x10 [ 2113.101177][T17411] ? kernfs_activate+0x192/0x1f0 [ 2113.106102][T17411] kernfs_new_node+0x99/0x130 [ 2113.110769][T17411] __kernfs_create_file+0x51/0x340 [ 2113.115976][T17411] sysfs_add_file_mode_ns+0x222/0x560 [ 2113.121356][T17411] internal_create_group+0x35b/0xc40 [ 2113.126641][T17411] ? bd_set_size+0x89/0xb0 [ 2113.131056][T17411] ? remove_files.isra.0+0x190/0x190 [ 2113.136343][T17411] sysfs_create_group+0x20/0x30 [ 2113.141191][T17411] lo_ioctl+0x10af/0x2150 [ 2113.145510][T17411] ? lo_rw_aio+0x1120/0x1120 [ 2113.150088][T17411] blkdev_ioctl+0x6f2/0x1d10 [ 2113.154675][T17411] ? blkpg_ioctl+0xa90/0xa90 [ 2113.159261][T17411] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2113.165071][T17411] ? __fget+0x35a/0x550 [ 2113.169317][T17411] block_ioctl+0xee/0x130 [ 2113.173671][T17411] ? blkdev_fallocate+0x410/0x410 [ 2113.178687][T17411] do_vfs_ioctl+0xd6e/0x1390 [ 2113.183296][T17411] ? ioctl_preallocate+0x210/0x210 [ 2113.188397][T17411] ? __fget+0x381/0x550 [ 2113.192539][T17411] ? ksys_dup3+0x3e0/0x3e0 [ 2113.196951][T17411] ? do_sys_open+0x31d/0x5d0 [ 2113.201541][T17411] ? tomoyo_file_ioctl+0x23/0x30 [ 2113.206473][T17411] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2113.212695][T17411] ? security_file_ioctl+0x93/0xc0 [ 2113.217792][T17411] ksys_ioctl+0xab/0xd0 [ 2113.221976][T17411] __x64_sys_ioctl+0x73/0xb0 [ 2113.226580][T17411] do_syscall_64+0x103/0x610 [ 2113.231173][T17411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2113.237048][T17411] RIP: 0033:0x458a97 [ 2113.240925][T17411] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2113.260516][T17411] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2113.268915][T17411] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 2113.277320][T17411] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2113.285275][T17411] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2113.293347][T17411] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2113.301329][T17411] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:42:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x1a\x00+\x86a\x957s\x16FA\x00'}}) [ 2113.346800][T17408] hfs: can't find a HFS filesystem on dev loop5 13:42:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x9, &(0x7f0000000000)="0a79fd6469b2b9de898f43") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x200000080800) 13:42:58 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='clear_refs\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='/dev/audio\x00', r0}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x8000, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f00000000c0)="0f43630066b99208000066b80058000066ba000000000f300f01c866b9580b000066b80900000066ba000000000f300f01cf0fc79a4b0064670f353ef22e0f3266b9550a00000f320f20c06635040000000f22c0", 0x54}], 0x1, 0xe072644f63e1f25f, &(0x7f0000000180), 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r4, 0x0, 0x0, 0x0) [ 2113.425997][T17408] hfs: can't find a HFS filesystem on dev loop5 13:42:58 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xfffffdf9}) 13:42:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x8, 0x204100) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e20, @rand_addr=0x8}, 0x10) 13:42:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adce45de2003f319bd070") r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x8, 0x501000) connect$pppoe(r1, &(0x7f0000000240)={0x18, 0x0, {0x7ff, @random="239d1f568bc6", 'veth0_to_team\x00'}}, 0x1e) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$bt_hci(r2, 0x0, 0x2, &(0x7f0000000040)=""/109, &(0x7f00000000c0)=0x6d) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:42:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000001cc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:59 executing program 4 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x1b\x00+\x86a\x957s\x16FA\x00'}}) [ 2113.713963][T17439] hfs: unable to parse mount options 13:42:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) connect$x25(r1, &(0x7f0000000100)={0x9, @null=' \x00'}, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, 0x0, &(0x7f0000000180)) r2 = getpid() lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$rose(r1, 0x104, 0x3, &(0x7f00000000c0), 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) setxattr$system_posix_acl(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000b00)={{}, {}, [{}], {}, [{}, {0x8, 0x4}, {0x8, 0x7}], {}, {0x20, 0x2}}, 0x44, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) ptrace$cont(0xffffffffffffffff, r2, 0x10000, 0x6eb59be5) socket$inet_udplite(0x2, 0x2, 0x88) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530"]) chdir(&(0x7f0000000380)='./file0\x00') link(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file1\x00') lgetxattr(&(0x7f0000000240)='./file1/file0\x00', 0x0, &(0x7f0000000500)=""/227, 0xe3) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r3, 0x0, 0x0, 0x0) 13:42:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x2, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000140)=0xffffffffffffffff, 0x4) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) [ 2113.791568][T17439] hfs: unable to parse mount options 13:42:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000001dc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2113.896914][T17453] FAULT_INJECTION: forcing a failure. [ 2113.896914][T17453] name failslab, interval 1, probability 0, space 0, times 0 [ 2113.951149][T17453] CPU: 1 PID: 17453 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2113.959487][T17453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2113.971836][T17453] Call Trace: [ 2113.976381][T17453] dump_stack+0x172/0x1f0 [ 2113.981003][T17453] should_fail.cold+0xa/0x15 [ 2113.986056][T17453] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2113.992690][T17453] ? ___might_sleep+0x163/0x280 [ 2113.997649][T17453] __should_failslab+0x121/0x190 [ 2114.002597][T17453] should_failslab+0x9/0x14 [ 2114.007645][T17453] kmem_cache_alloc+0x2b2/0x6f0 [ 2114.012500][T17453] ? lock_downgrade+0x880/0x880 [ 2114.017915][T17453] ? kasan_check_read+0x11/0x20 [ 2114.022772][T17453] __kernfs_new_node+0xef/0x690 [ 2114.027714][T17453] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2114.033359][T17453] ? wait_for_completion+0x440/0x440 [ 2114.038682][T17453] ? mutex_unlock+0xd/0x10 [ 2114.043106][T17453] ? kernfs_activate+0x192/0x1f0 13:42:59 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xfffffdfc}) [ 2114.048044][T17453] kernfs_new_node+0x99/0x130 [ 2114.052727][T17453] __kernfs_create_file+0x51/0x340 [ 2114.057916][T17453] sysfs_add_file_mode_ns+0x222/0x560 [ 2114.063469][T17453] internal_create_group+0x35b/0xc40 [ 2114.069204][T17453] ? bd_set_size+0x89/0xb0 [ 2114.073721][T17453] ? remove_files.isra.0+0x190/0x190 [ 2114.079244][T17453] sysfs_create_group+0x20/0x30 [ 2114.084115][T17453] lo_ioctl+0x10af/0x2150 [ 2114.088721][T17453] ? lo_rw_aio+0x1120/0x1120 [ 2114.093495][T17453] blkdev_ioctl+0x6f2/0x1d10 [ 2114.098183][T17453] ? blkpg_ioctl+0xa90/0xa90 [ 2114.103171][T17453] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2114.109369][T17453] ? __fget+0x35a/0x550 [ 2114.113542][T17453] block_ioctl+0xee/0x130 [ 2114.118402][T17453] ? blkdev_fallocate+0x410/0x410 [ 2114.123464][T17453] do_vfs_ioctl+0xd6e/0x1390 [ 2114.128159][T17453] ? ioctl_preallocate+0x210/0x210 [ 2114.133281][T17453] ? __fget+0x381/0x550 [ 2114.137793][T17453] ? ksys_dup3+0x3e0/0x3e0 [ 2114.142213][T17453] ? do_sys_open+0x31d/0x5d0 [ 2114.146809][T17453] ? tomoyo_file_ioctl+0x23/0x30 [ 2114.151751][T17453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2114.158005][T17453] ? security_file_ioctl+0x93/0xc0 [ 2114.163140][T17453] ksys_ioctl+0xab/0xd0 [ 2114.167310][T17453] __x64_sys_ioctl+0x73/0xb0 [ 2114.172003][T17453] do_syscall_64+0x103/0x610 [ 2114.177210][T17453] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2114.183189][T17453] RIP: 0033:0x458a97 [ 2114.187169][T17453] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2114.206796][T17453] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2114.215212][T17453] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 2114.223423][T17453] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2114.231403][T17453] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2114.239466][T17453] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 13:42:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x1c\x00+\x86a\x957s\x16FA\x00'}}) [ 2114.247448][T17453] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2114.305657][T17461] QAT: Invalid ioctl [ 2114.319362][T17461] QAT: Invalid ioctl [ 2114.332354][T17456] overlayfs: failed to resolve './file1': -2 13:42:59 executing program 4 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:42:59 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x8000, 0x0) write$FUSE_BMAP(r0, &(0x7f0000000440)={0x18, 0xfffffffffffffffe, 0x6, {0x17}}, 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x338c0a09, 0x142) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x8) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000480), &(0x7f00000004c0)=0x4) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000080)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000002c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast1, @in6=@loopback, 0x4e24, 0x40, 0x4e24, 0x4, 0x2, 0x80, 0x80, 0x2f, r3, r4}, {0x5, 0x9eef, 0x3, 0x9, 0x0, 0x1, 0xcb36, 0x1f}, {0x0, 0x101, 0x9a, 0xba2c}, 0x3, 0x6e6bb2, 0x3, 0x1, 0x3, 0x2}, {{@in6=@mcast1, 0x4d3, 0xff}, 0xa, @in6=@loopback, 0x3504, 0x3, 0x1, 0x25c, 0x5, 0x80, 0x6}}, 0xe8) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 13:42:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x0, @default, @bpq0='bpq0\x00', 0x6, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3, 0x4, [@null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) accept4$netrom(r1, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) [ 2114.460176][T17468] hfs: unable to parse mount options 13:43:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = dup3(r0, r0, 0x80000) accept4$netrom(r0, 0x0, &(0x7f0000000000), 0x80000) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000000080)=""/160) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:00 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xfffffdfd}) 13:43:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000001ec000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x1d\x00+\x86a\x957s\x16FA\x00'}}) [ 2114.629582][T17479] FAULT_INJECTION: forcing a failure. [ 2114.629582][T17479] name failslab, interval 1, probability 0, space 0, times 0 [ 2114.657420][T17479] CPU: 0 PID: 17479 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2114.666082][T17479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2114.678449][T17479] Call Trace: [ 2114.681740][T17479] dump_stack+0x172/0x1f0 [ 2114.686268][T17479] should_fail.cold+0xa/0x15 [ 2114.690866][T17479] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2114.696732][T17479] ? ___might_sleep+0x163/0x280 [ 2114.702117][T17479] __should_failslab+0x121/0x190 [ 2114.707885][T17479] should_failslab+0x9/0x14 [ 2114.712658][T17479] kmem_cache_alloc+0x2b2/0x6f0 [ 2114.717645][T17479] ? lock_downgrade+0x880/0x880 [ 2114.722666][T17479] ? kasan_check_read+0x11/0x20 [ 2114.727620][T17479] __kernfs_new_node+0xef/0x690 [ 2114.733531][T17479] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2114.741891][T17479] ? wait_for_completion+0x440/0x440 [ 2114.747274][T17479] ? mutex_unlock+0xd/0x10 [ 2114.752127][T17479] ? kernfs_activate+0x192/0x1f0 [ 2114.757452][T17479] kernfs_new_node+0x99/0x130 [ 2114.762133][T17479] __kernfs_create_file+0x51/0x340 [ 2114.767346][T17479] sysfs_add_file_mode_ns+0x222/0x560 [ 2114.772843][T17479] internal_create_group+0x35b/0xc40 [ 2114.778566][T17479] ? bd_set_size+0x89/0xb0 [ 2114.783158][T17479] ? remove_files.isra.0+0x190/0x190 [ 2114.788637][T17479] sysfs_create_group+0x20/0x30 [ 2114.793494][T17479] lo_ioctl+0x10af/0x2150 [ 2114.798098][T17479] ? lo_rw_aio+0x1120/0x1120 [ 2114.802690][T17479] blkdev_ioctl+0x6f2/0x1d10 [ 2114.808010][T17479] ? blkpg_ioctl+0xa90/0xa90 [ 2114.812696][T17479] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2114.818905][T17479] ? __fget+0x35a/0x550 [ 2114.823628][T17479] block_ioctl+0xee/0x130 [ 2114.828051][T17479] ? blkdev_fallocate+0x410/0x410 [ 2114.833162][T17479] do_vfs_ioctl+0xd6e/0x1390 [ 2114.837765][T17479] ? ioctl_preallocate+0x210/0x210 [ 2114.843141][T17479] ? __fget+0x381/0x550 [ 2114.847313][T17479] ? ksys_dup3+0x3e0/0x3e0 [ 2114.851994][T17479] ? do_sys_open+0x31d/0x5d0 [ 2114.856677][T17479] ? tomoyo_file_ioctl+0x23/0x30 [ 2114.861623][T17479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2114.868053][T17479] ? security_file_ioctl+0x93/0xc0 [ 2114.873364][T17479] ksys_ioctl+0xab/0xd0 [ 2114.877610][T17479] __x64_sys_ioctl+0x73/0xb0 [ 2114.882296][T17479] do_syscall_64+0x103/0x610 [ 2114.887011][T17479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2114.892905][T17479] RIP: 0033:0x458a97 [ 2114.896887][T17479] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2114.918064][T17479] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 13:43:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$radio(&(0x7f0000001540)='/dev/radio#\x00', 0x3, 0x2) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000001580)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000001c0)=@int=0xffffffffffff8001, 0x4) r3 = accept(r0, &(0x7f0000000080)=@nl, &(0x7f0000000000)=0x80) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="000000000e931b986e799528ead424dbe2cb5e053fa7be02f31db3af217b9a8ee48ebfb66d90b4fc3d49e294cb5b3d41519daaa6351cfd7538e81688f3314aa9fec968a1ccf3136668dfbdeb9ef65b46c9b9d251b92f95987b303eb55c9968f4af508d5fc16727a76a856cbe4e40", @ANYRES16=r4, @ANYBLOB="00012abd7000fddbdf2501000000080004000300000014000100080006006e710000080004004e2300000c00010008000500010000000800050003000000340001000800050002000000080002007e00000008000b0073697000080006006468000008000500080000000800020087000000"], 0x78}, 0x1, 0x0, 0x0, 0x44045}, 0x10) times(&(0x7f0000000440)) mknod$loop(&(0x7f0000000380)='./file0\x00', 0x800, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000003c0), &(0x7f0000000400)=0x23d) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r5, 0x0, 0x0, 0x0) [ 2114.926747][T17479] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 2114.934903][T17479] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2114.942977][T17479] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2114.951394][T17479] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2114.960325][T17479] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:00 executing program 4 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x111000, 0x0) recvfrom$ax25(r1, &(0x7f0000000140)=""/206, 0xce, 0x40000000, &(0x7f0000000240)={{0x3, @default, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) [ 2115.028446][T17486] hfs: unable to parse mount options [ 2115.105451][T17486] hfs: unable to parse mount options 13:43:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x8001, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x8) ioctl(r0, 0x7ff, &(0x7f00000002c0)="0ad1424700002b40c30abb70b33b98d423683787fa3ab7c4bf353eaf9113ae976798ce23e7cd37c94fd0c9c0c2efeebc5b324e47f14a0b8da989e14b5bfaf56a54389f2665d2d61cfdb0967e57a6363fb042ed1fa7ee541e035dd10046e7b376204b57b03709b7ee9e846d") ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000240)=""/92) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) ioctl$RTC_UIE_OFF(r1, 0x7004) bind$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x73, 0x7ff, 0x2, 0x0, @dev={[], 0xe}}, 0x10) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000001c0)={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x307, @dev={[], 0x11}}, 0x10, {0x2, 0x4e21, @empty}, 'bpq0\x00'}) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) 13:43:00 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xffffff7f}) 13:43:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x200202, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x3dbfc04}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000100)={r3, @in6={{0xa, 0x4e22, 0x1, @empty, 0x1000}}, 0xb31b, 0x2}, &(0x7f00000001c0)=0x90) [ 2115.241772][T17502] FAULT_INJECTION: forcing a failure. [ 2115.241772][T17502] name failslab, interval 1, probability 0, space 0, times 0 [ 2115.283581][T17502] CPU: 1 PID: 17502 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2115.291603][T17502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2115.301924][T17502] Call Trace: [ 2115.305335][T17502] dump_stack+0x172/0x1f0 [ 2115.309682][T17502] should_fail.cold+0xa/0x15 [ 2115.314303][T17502] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2115.320411][T17502] ? ___might_sleep+0x163/0x280 [ 2115.325451][T17502] __should_failslab+0x121/0x190 [ 2115.330417][T17502] should_failslab+0x9/0x14 [ 2115.334945][T17502] kmem_cache_alloc+0x2b2/0x6f0 [ 2115.339883][T17502] ? lock_downgrade+0x880/0x880 [ 2115.344749][T17502] ? kasan_check_read+0x11/0x20 [ 2115.349705][T17502] __kernfs_new_node+0xef/0x690 [ 2115.354563][T17502] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2115.360111][T17502] ? wait_for_completion+0x440/0x440 [ 2115.365408][T17502] ? mutex_unlock+0xd/0x10 [ 2115.370610][T17502] ? kernfs_activate+0x192/0x1f0 [ 2115.375903][T17502] kernfs_new_node+0x99/0x130 [ 2115.380673][T17502] __kernfs_create_file+0x51/0x340 [ 2115.385795][T17502] sysfs_add_file_mode_ns+0x222/0x560 [ 2115.391183][T17502] internal_create_group+0x35b/0xc40 [ 2115.396468][T17502] ? bd_set_size+0x89/0xb0 [ 2115.401067][T17502] ? remove_files.isra.0+0x190/0x190 [ 2115.406366][T17502] sysfs_create_group+0x20/0x30 [ 2115.411562][T17502] lo_ioctl+0x10af/0x2150 [ 2115.415895][T17502] ? lo_rw_aio+0x1120/0x1120 [ 2115.420659][T17502] blkdev_ioctl+0x6f2/0x1d10 [ 2115.425691][T17502] ? blkpg_ioctl+0xa90/0xa90 [ 2115.430283][T17502] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2115.436186][T17502] ? __fget+0x35a/0x550 [ 2115.440607][T17502] block_ioctl+0xee/0x130 [ 2115.445112][T17502] ? blkdev_fallocate+0x410/0x410 [ 2115.450168][T17502] do_vfs_ioctl+0xd6e/0x1390 [ 2115.454851][T17502] ? ioctl_preallocate+0x210/0x210 [ 2115.459964][T17502] ? __fget+0x381/0x550 [ 2115.464225][T17502] ? ksys_dup3+0x3e0/0x3e0 [ 2115.468735][T17502] ? do_sys_open+0x31d/0x5d0 [ 2115.473417][T17502] ? tomoyo_file_ioctl+0x23/0x30 [ 2115.478637][T17502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2115.485143][T17502] ? security_file_ioctl+0x93/0xc0 [ 2115.490358][T17502] ksys_ioctl+0xab/0xd0 [ 2115.494527][T17502] __x64_sys_ioctl+0x73/0xb0 [ 2115.499146][T17502] do_syscall_64+0x103/0x610 [ 2115.503746][T17502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2115.509897][T17502] RIP: 0033:0x458a97 [ 2115.513892][T17502] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2115.537364][T17502] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2115.545870][T17502] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 2115.554019][T17502] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2115.562248][T17502] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2115.570566][T17502] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 13:43:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x109100, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x9) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") splice(r1, &(0x7f0000000100), r1, &(0x7f0000000140), 0x5, 0xc) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x80843) getrlimit(0xf, &(0x7f0000000000)) 13:43:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x1e\x00+\x86a\x957s\x16FA\x00'}}) [ 2115.578801][T17502] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000001fc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000890f, &(0x7f0000000080)="000000000000e200000000") syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x40) ioctl$NBD_SET_SIZE(r1, 0xab02, 0xffffffffffff8001) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f00000000c0)=0x4, 0x4) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x802, 0x0) 13:43:01 executing program 4 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2115.772840][T17516] hfs: unable to parse mount options 13:43:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) rt_sigtimedwait(&(0x7f00000000c0)={0x56}, &(0x7f0000000100), &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) accept4$netrom(r1, 0x0, 0x0, 0x80000) nanosleep(&(0x7f0000000280), &(0x7f00000002c0)) [ 2115.930203][T17516] hfs: unable to parse mount options 13:43:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00!\x00+\x86a\x957s\x16FA\x00'}}) 13:43:01 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xffffff8c}) 13:43:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x80a00) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8, 0x12, r1, 0x80000000) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) [ 2116.014486][T17528] FAULT_INJECTION: forcing a failure. [ 2116.014486][T17528] name failslab, interval 1, probability 0, space 0, times 0 [ 2116.045480][T17528] CPU: 1 PID: 17528 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2116.054128][T17528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2116.065144][T17528] Call Trace: [ 2116.068470][T17528] dump_stack+0x172/0x1f0 [ 2116.073629][T17528] should_fail.cold+0xa/0x15 [ 2116.078689][T17528] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2116.084706][T17528] ? ___might_sleep+0x163/0x280 [ 2116.092718][T17528] __should_failslab+0x121/0x190 [ 2116.100014][T17528] should_failslab+0x9/0x14 [ 2116.104938][T17528] kmem_cache_alloc+0x2b2/0x6f0 [ 2116.110242][T17528] ? lock_downgrade+0x880/0x880 [ 2116.115725][T17528] ? kasan_check_read+0x11/0x20 [ 2116.120767][T17528] __kernfs_new_node+0xef/0x690 [ 2116.125629][T17528] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2116.131271][T17528] ? wait_for_completion+0x440/0x440 [ 2116.136571][T17528] ? mutex_unlock+0xd/0x10 [ 2116.141004][T17528] ? kernfs_activate+0x192/0x1f0 [ 2116.145947][T17528] kernfs_new_node+0x99/0x130 [ 2116.150734][T17528] __kernfs_create_file+0x51/0x340 [ 2116.155936][T17528] sysfs_add_file_mode_ns+0x222/0x560 [ 2116.161341][T17528] internal_create_group+0x35b/0xc40 [ 2116.166631][T17528] ? bd_set_size+0x89/0xb0 [ 2116.172545][T17528] ? remove_files.isra.0+0x190/0x190 [ 2116.178016][T17528] sysfs_create_group+0x20/0x30 [ 2116.182873][T17528] lo_ioctl+0x10af/0x2150 [ 2116.187240][T17528] ? lo_rw_aio+0x1120/0x1120 [ 2116.191843][T17528] blkdev_ioctl+0x6f2/0x1d10 [ 2116.197225][T17528] ? blkpg_ioctl+0xa90/0xa90 [ 2116.201829][T17528] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2116.207653][T17528] ? __fget+0x35a/0x550 [ 2116.212700][T17528] block_ioctl+0xee/0x130 [ 2116.217212][T17528] ? blkdev_fallocate+0x410/0x410 [ 2116.223389][T17528] do_vfs_ioctl+0xd6e/0x1390 [ 2116.228614][T17528] ? ioctl_preallocate+0x210/0x210 [ 2116.239643][T17528] ? __fget+0x381/0x550 [ 2116.246847][T17528] ? ksys_dup3+0x3e0/0x3e0 [ 2116.256424][T17528] ? do_sys_open+0x31d/0x5d0 [ 2116.261671][T17528] ? tomoyo_file_ioctl+0x23/0x30 [ 2116.268096][T17528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2116.278381][T17528] ? security_file_ioctl+0x93/0xc0 [ 2116.283593][T17528] ksys_ioctl+0xab/0xd0 [ 2116.288811][T17528] __x64_sys_ioctl+0x73/0xb0 [ 2116.293690][T17528] do_syscall_64+0x103/0x610 [ 2116.300297][T17528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2116.306933][T17528] RIP: 0033:0x458a97 [ 2116.311616][T17528] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2116.334631][T17528] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2116.344853][T17528] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 2116.353105][T17528] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 13:43:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_init_net_socket$netrom(0x6, 0x5, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0x20, 0x4}, {0xd6}]}, 0x14, 0x2) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x4282, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000180)=""/4096) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f0000000140)={0x1f, 0x18, 0x9, 0x7, 0xb, 0x8001}) accept4$netrom(r0, 0x0, 0x0, 0x0) [ 2116.361786][T17528] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2116.370109][T17528] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2116.378095][T17528] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x440082, 0x0) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, @hyper}, 0x10) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) [ 2116.487166][T17539] hfs: unable to parse mount options 13:43:01 executing program 4 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x2000) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000080)={0x9, 0x1, 0x1, 0x100, 0x66eeade4, 0x35a}) getgid() ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000040)={'hwsim0\x00'}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) keyctl$session_to_parent(0x12) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2116.602902][T17539] hfs: unable to parse mount options 13:43:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000020c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\"\x00+\x86a\x957s\x16FA\x00'}}) [ 2116.709731][T17558] FAULT_INJECTION: forcing a failure. [ 2116.709731][T17558] name failslab, interval 1, probability 0, space 0, times 0 [ 2116.736708][T17558] CPU: 0 PID: 17558 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2116.746142][T17558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2116.756554][T17558] Call Trace: [ 2116.760219][T17558] dump_stack+0x172/0x1f0 [ 2116.764653][T17558] should_fail.cold+0xa/0x15 [ 2116.769286][T17558] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2116.775342][T17558] ? ___might_sleep+0x163/0x280 [ 2116.780392][T17558] __should_failslab+0x121/0x190 [ 2116.785874][T17558] should_failslab+0x9/0x14 [ 2116.790763][T17558] __kmalloc+0x2dc/0x740 [ 2116.795707][T17558] ? kobject_uevent_env+0x2fb/0x1030 [ 2116.802898][T17558] ? rcu_read_lock_sched_held+0x110/0x130 [ 2116.811060][T17558] ? kobject_get_path+0xc4/0x1b0 [ 2116.816540][T17558] kobject_get_path+0xc4/0x1b0 [ 2116.821657][T17558] kobject_uevent_env+0x31f/0x1030 [ 2116.827559][T17558] kobject_uevent+0x20/0x26 [ 2116.832240][T17558] lo_ioctl+0x112b/0x2150 [ 2116.837454][T17558] ? lo_rw_aio+0x1120/0x1120 [ 2116.842047][T17558] blkdev_ioctl+0x6f2/0x1d10 [ 2116.846642][T17558] ? blkpg_ioctl+0xa90/0xa90 [ 2116.851842][T17558] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2116.857918][T17558] ? __fget+0x35a/0x550 [ 2116.862081][T17558] block_ioctl+0xee/0x130 [ 2116.866972][T17558] ? blkdev_fallocate+0x410/0x410 [ 2116.872291][T17558] do_vfs_ioctl+0xd6e/0x1390 [ 2116.877233][T17558] ? ioctl_preallocate+0x210/0x210 [ 2116.882432][T17558] ? __fget+0x381/0x550 [ 2116.886598][T17558] ? ksys_dup3+0x3e0/0x3e0 [ 2116.891040][T17558] ? do_sys_open+0x31d/0x5d0 [ 2116.895639][T17558] ? tomoyo_file_ioctl+0x23/0x30 [ 2116.900663][T17558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2116.906991][T17558] ? security_file_ioctl+0x93/0xc0 [ 2116.912116][T17558] ksys_ioctl+0xab/0xd0 [ 2116.916361][T17558] __x64_sys_ioctl+0x73/0xb0 [ 2116.921054][T17558] do_syscall_64+0x103/0x610 [ 2116.925651][T17558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2116.932671][T17558] RIP: 0033:0x458a97 [ 2116.936857][T17558] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:43:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:02 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xfffffff4}) 13:43:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) write(r1, &(0x7f0000000140)="a97fe7a087e4f7baea7ebdb1655a5c6bf8c865df9e56e70432e3ba962bd691bbeb3f5f6749338cfd28f1b28a61b23f3645874725a89e1b4d494bc2b0882b3593069241c25b0c526dac102c9a442784cf01e02d85ff6fade875622ae27fa02059e6504b2c1fde1a97e95cdfe9e8007d53aaa48830fe6e6bf5b42ef8f7ad431b220b6ab94cc0c1594eb157ddfb50afbd89cadbcd45", 0x94) accept4$netrom(r1, 0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) [ 2116.957444][T17558] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2116.966230][T17558] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 2116.974545][T17558] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2116.982785][T17558] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2116.991854][T17558] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2117.000001][T17558] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syncfs(r0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:02 executing program 4 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00#\x00+\x86a\x957s\x16FA\x00'}}) 13:43:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000080)={r0, 0x0, 0x6, 0x1, 0x9}) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2117.227112][T17573] hfs: unable to parse mount options [ 2117.273901][T17573] hfs: unable to parse mount options 13:43:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000000c0)={'raw\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x80000) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xffffffff, 0x42) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000080)=0x8, 0x4) 13:43:02 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xfffffff5}) 13:43:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom(r0, &(0x7f0000000000)=""/24, 0x18, 0x0, &(0x7f0000000080)=@ethernet={0x6, @broadcast}, 0x80) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2117.385089][T17582] FAULT_INJECTION: forcing a failure. [ 2117.385089][T17582] name failslab, interval 1, probability 0, space 0, times 0 [ 2117.426704][T17582] CPU: 0 PID: 17582 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2117.434831][T17582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2117.445426][T17582] Call Trace: [ 2117.448826][T17582] dump_stack+0x172/0x1f0 [ 2117.459025][T17582] should_fail.cold+0xa/0x15 [ 2117.466248][T17582] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2117.473750][T17582] ? ___might_sleep+0x163/0x280 [ 2117.479135][T17582] __should_failslab+0x121/0x190 [ 2117.484084][T17582] should_failslab+0x9/0x14 [ 2117.488612][T17582] kmem_cache_alloc_trace+0x2d1/0x760 [ 2117.495122][T17582] kobject_uevent_env+0x2fb/0x1030 [ 2117.500527][T17582] kobject_uevent+0x20/0x26 [ 2117.505732][T17582] lo_ioctl+0x112b/0x2150 [ 2117.510184][T17582] ? lo_rw_aio+0x1120/0x1120 [ 2117.515038][T17582] blkdev_ioctl+0x6f2/0x1d10 [ 2117.520157][T17582] ? blkpg_ioctl+0xa90/0xa90 [ 2117.529287][T17582] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2117.535607][T17582] ? __fget+0x35a/0x550 [ 2117.540132][T17582] block_ioctl+0xee/0x130 [ 2117.544770][T17582] ? blkdev_fallocate+0x410/0x410 [ 2117.549808][T17582] do_vfs_ioctl+0xd6e/0x1390 [ 2117.554754][T17582] ? ioctl_preallocate+0x210/0x210 [ 2117.559876][T17582] ? __fget+0x381/0x550 [ 2117.564128][T17582] ? ksys_dup3+0x3e0/0x3e0 [ 2117.568549][T17582] ? do_sys_open+0x31d/0x5d0 [ 2117.573231][T17582] ? tomoyo_file_ioctl+0x23/0x30 [ 2117.578364][T17582] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2117.584702][T17582] ? security_file_ioctl+0x93/0xc0 [ 2117.589817][T17582] ksys_ioctl+0xab/0xd0 [ 2117.594151][T17582] __x64_sys_ioctl+0x73/0xb0 [ 2117.598743][T17582] do_syscall_64+0x103/0x610 [ 2117.603355][T17582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2117.609440][T17582] RIP: 0033:0x458a97 [ 2117.613333][T17582] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2117.633133][T17582] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2117.641544][T17582] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 2117.650549][T17582] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2117.658626][T17582] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2117.666778][T17582] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2117.674753][T17582] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2117.759120][T17593] hfs: unable to parse mount options 13:43:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000021c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00$\x00+\x86a\x957s\x16FA\x00'}}) 13:43:03 executing program 4 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$sock_rose_SIOCDELRT(r2, 0x890c, &(0x7f0000000200)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x51, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x8, [@null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 2117.884626][T17593] hfs: unable to parse mount options 13:43:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000003c0)={r2, @in={{0x2, 0x4e20, @broadcast}}, 0x7, 0x9, 0x1, 0xfffffffffffffffb, 0x20}, 0x98) r3 = accept4$netrom(r1, 0x0, 0x0, 0x0) r4 = dup2(r3, r3) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000080)={@dev, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="f40000001100000228bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="0001000002000000cc0012001000010069703665727370616e000000b8000200140007000000000000000000000000000000000114000600fe80000000000000000000000000002608000a0000000000080002006d96000008000100", @ANYRES32=r5, @ANYBLOB="0800160002000000080016000200000008000a0000000000080017000000000008001300010000000800080003000000080011004e2300008034fba771000000080015006b5b0a00080005000600000008000200070000000800130001000000140006000000000000000000000000000000000108002e0003000000cdba0ff1945ae1ba88fb710c7a0bff9fe3376dd336fc1e582d169dae40ca92cfbab6854067d36ae927c81b7ecec35bcad2e390c98d0c0de0b53bf3d67a553e688bfd070f2d"], 0xf4}, 0x1, 0x0, 0x0, 0x1}, 0x4040000) 13:43:03 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xfffffff6}) [ 2117.981479][T17607] FAULT_INJECTION: forcing a failure. [ 2117.981479][T17607] name failslab, interval 1, probability 0, space 0, times 0 [ 2118.027152][T17607] CPU: 0 PID: 17607 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2118.035174][T17607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2118.045230][T17607] Call Trace: [ 2118.048534][T17607] dump_stack+0x172/0x1f0 [ 2118.052876][T17607] should_fail.cold+0xa/0x15 [ 2118.057475][T17607] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2118.063289][T17607] ? ___might_sleep+0x163/0x280 [ 2118.068153][T17607] __should_failslab+0x121/0x190 [ 2118.073095][T17607] should_failslab+0x9/0x14 [ 2118.077596][T17607] __kmalloc+0x2dc/0x740 [ 2118.081841][T17607] ? kobject_uevent_env+0x2fb/0x1030 [ 2118.087128][T17607] ? rcu_read_lock_sched_held+0x110/0x130 [ 2118.092848][T17607] ? kobject_get_path+0xc4/0x1b0 [ 2118.097784][T17607] kobject_get_path+0xc4/0x1b0 [ 2118.102550][T17607] kobject_uevent_env+0x31f/0x1030 [ 2118.107683][T17607] kobject_uevent+0x20/0x26 [ 2118.112189][T17607] lo_ioctl+0x112b/0x2150 [ 2118.116524][T17607] ? lo_rw_aio+0x1120/0x1120 [ 2118.121127][T17607] blkdev_ioctl+0x6f2/0x1d10 [ 2118.125722][T17607] ? blkpg_ioctl+0xa90/0xa90 [ 2118.130420][T17607] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2118.136243][T17607] ? __fget+0x35a/0x550 [ 2118.140414][T17607] block_ioctl+0xee/0x130 [ 2118.144766][T17607] ? blkdev_fallocate+0x410/0x410 [ 2118.149790][T17607] do_vfs_ioctl+0xd6e/0x1390 [ 2118.154388][T17607] ? ioctl_preallocate+0x210/0x210 [ 2118.159503][T17607] ? __fget+0x381/0x550 [ 2118.163662][T17607] ? ksys_dup3+0x3e0/0x3e0 [ 2118.168086][T17607] ? do_sys_open+0x31d/0x5d0 [ 2118.172679][T17607] ? tomoyo_file_ioctl+0x23/0x30 [ 2118.177665][T17607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2118.184638][T17607] ? security_file_ioctl+0x93/0xc0 [ 2118.189750][T17607] ksys_ioctl+0xab/0xd0 [ 2118.193908][T17607] __x64_sys_ioctl+0x73/0xb0 [ 2118.198523][T17607] do_syscall_64+0x103/0x610 [ 2118.203214][T17607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2118.209106][T17607] RIP: 0033:0x458a97 [ 2118.213006][T17607] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2118.232615][T17607] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2118.241115][T17607] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 2118.249203][T17607] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2118.257168][T17607] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2118.265140][T17607] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2118.273137][T17607] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:03 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x1a000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000080), 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000380)=0xe8) getresgid(&(0x7f00000003c0)=0x0, &(0x7f0000000400), &(0x7f0000000440)) write$P9_RGETATTR(r0, &(0x7f0000000480)={0xa0, 0x19, 0x1, {0x10, {0x4, 0x3, 0x1}, 0x50, r2, r3, 0x9, 0x3, 0x6, 0x4, 0x7ff, 0x81, 0x4, 0x0, 0x8, 0x5, 0xce, 0x7, 0x5, 0xfffffffffffffffd, 0x7fffffff}}, 0xa0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") fstatfs(r0, &(0x7f0000000140)=""/243) r4 = pkey_alloc(0x0, 0x2) pkey_free(r4) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x1ff) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r6, 0xc008551b, &(0x7f0000000580)={0x1f, 0x8, [0x101, 0x9]}) accept4$netrom(r5, 0x0, 0x0, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000100)={0x0, 0x3, 0x8, [], &(0x7f00000000c0)=0x1f}) 13:43:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00%\x00+\x86a\x957s\x16FA\x00'}}) 13:43:03 executing program 4 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2118.426175][T17616] hfs: unable to parse mount options 13:43:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x4e22, @rand_addr=0xfffffffffffff000}, {0x307, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x40, {0x2, 0x4e24, @broadcast}, 'veth0\x00'}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2118.536024][T17624] FAULT_INJECTION: forcing a failure. [ 2118.536024][T17624] name failslab, interval 1, probability 0, space 0, times 0 [ 2118.553948][T17624] CPU: 0 PID: 17624 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2118.561983][T17624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2118.572290][T17624] Call Trace: [ 2118.589953][T17624] dump_stack+0x172/0x1f0 [ 2118.594326][T17624] should_fail.cold+0xa/0x15 [ 2118.598941][T17624] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2118.604780][T17624] ? ___might_sleep+0x163/0x280 [ 2118.609647][T17624] __should_failslab+0x121/0x190 [ 2118.614585][T17624] should_failslab+0x9/0x14 [ 2118.619115][T17624] kmem_cache_alloc_node+0x264/0x710 [ 2118.624402][T17624] ? find_held_lock+0x35/0x130 [ 2118.629298][T17624] __alloc_skb+0xd5/0x5e0 [ 2118.633630][T17624] ? skb_trim+0x190/0x190 [ 2118.637969][T17624] ? kasan_check_read+0x11/0x20 [ 2118.642843][T17624] alloc_uevent_skb+0x83/0x1e2 [ 2118.647698][T17624] kobject_uevent_env+0xa63/0x1030 [ 2118.652934][T17624] kobject_uevent+0x20/0x26 [ 2118.657448][T17624] lo_ioctl+0x112b/0x2150 [ 2118.661780][T17624] ? lo_rw_aio+0x1120/0x1120 [ 2118.666375][T17624] blkdev_ioctl+0x6f2/0x1d10 [ 2118.671059][T17624] ? blkpg_ioctl+0xa90/0xa90 [ 2118.675651][T17624] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2118.681475][T17624] ? __fget+0x35a/0x550 [ 2118.685646][T17624] block_ioctl+0xee/0x130 [ 2118.689990][T17624] ? blkdev_fallocate+0x410/0x410 [ 2118.695020][T17624] do_vfs_ioctl+0xd6e/0x1390 [ 2118.699614][T17624] ? ioctl_preallocate+0x210/0x210 [ 2118.704726][T17624] ? __fget+0x381/0x550 [ 2118.709247][T17624] ? ksys_dup3+0x3e0/0x3e0 [ 2118.713662][T17624] ? do_sys_open+0x31d/0x5d0 [ 2118.718260][T17624] ? tomoyo_file_ioctl+0x23/0x30 [ 2118.723376][T17624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2118.729616][T17624] ? security_file_ioctl+0x93/0xc0 [ 2118.734819][T17624] ksys_ioctl+0xab/0xd0 [ 2118.738988][T17624] __x64_sys_ioctl+0x73/0xb0 [ 2118.743583][T17624] do_syscall_64+0x103/0x610 [ 2118.748177][T17624] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2118.754067][T17624] RIP: 0033:0x458a97 [ 2118.758081][T17624] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2118.777858][T17624] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 13:43:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="08a0b3220b00009bff") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000080)={0x10, 0x9, 0x2, 0x80}) [ 2118.786274][T17624] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 2118.794341][T17624] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2118.802606][T17624] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2118.810572][T17624] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2118.818541][T17624] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00&\x00+\x86a\x957s\x16FA\x00'}}) 13:43:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000022c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:04 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xfffffffb}) 13:43:04 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x200801, 0x10) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) fcntl$getflags(r0, 0x408) accept4$netrom(r0, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x4) 13:43:04 executing program 4 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0xffff, 0x20000) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f00000003c0)={0x6b, 0x101, 0x5, 0x5, 0x7ff}) accept4$netrom(r1, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x101200, 0x4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) connect$vsock_stream(r3, &(0x7f0000000340)={0x28, 0x0, 0x2710}, 0x10) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0/file1\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) ioctl$KVM_SET_BOOT_CPU_ID(r3, 0xae78, &(0x7f0000000080)=0x1) ioctl$SIOCX25GSUBSCRIP(r3, 0x89e0, &(0x7f0000000240)={'ip6_vti0\x00', 0x400, 0x3}) setsockopt$RXRPC_SECURITY_KEYRING(r4, 0x110, 0x2, &(0x7f0000000200)='y\x00', 0x2) [ 2119.006013][T17639] hfs: unable to parse mount options [ 2119.070614][T17639] hfs: unable to parse mount options 13:43:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x80000, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) 13:43:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\'\x00+\x86a\x957s\x16FA\x00'}}) [ 2119.206015][T17653] FAULT_INJECTION: forcing a failure. [ 2119.206015][T17653] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2119.219342][T17653] CPU: 1 PID: 17653 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2119.227326][T17653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2119.237390][T17653] Call Trace: [ 2119.241049][T17653] dump_stack+0x172/0x1f0 [ 2119.245494][T17653] should_fail.cold+0xa/0x15 [ 2119.250116][T17653] ? lo_ioctl+0xcf/0x2150 [ 2119.254463][T17653] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2119.260292][T17653] ? __lock_acquire+0x548/0x3fb0 [ 2119.265771][T17653] should_fail_alloc_page+0x50/0x60 [ 2119.270982][T17653] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2119.276450][T17653] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2119.282175][T17653] ? find_held_lock+0x35/0x130 [ 2119.286960][T17653] ? __fget+0x35a/0x550 [ 2119.291287][T17653] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2119.297116][T17653] cache_grow_begin+0x9c/0x860 [ 2119.301888][T17653] ? getname_flags+0xd6/0x5b0 [ 2119.306658][T17653] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2119.312912][T17653] kmem_cache_alloc+0x62d/0x6f0 [ 2119.317763][T17653] ? __fget+0x381/0x550 [ 2119.321933][T17653] getname_flags+0xd6/0x5b0 [ 2119.326436][T17653] do_mkdirat+0xa0/0x2a0 [ 2119.330681][T17653] ? __ia32_sys_mknod+0xb0/0xb0 [ 2119.335534][T17653] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2119.341050][T17653] ? do_syscall_64+0x26/0x610 [ 2119.346627][T17653] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 13:43:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) write$P9_RRENAMEAT(r0, &(0x7f0000000000)={0x7, 0x4b, 0x2}, 0x7) ioctl(r0, 0xfffffffffffff0cd, &(0x7f0000000a40)="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") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1000, 0x8200) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = accept4$netrom(r1, 0x0, 0x0, 0x0) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000100)=0x1f, 0x4) [ 2119.352698][T17653] ? do_syscall_64+0x26/0x610 [ 2119.357912][T17653] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2119.363219][T17653] __x64_sys_mkdir+0x5c/0x80 [ 2119.367925][T17653] do_syscall_64+0x103/0x610 [ 2119.372545][T17653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2119.378484][T17653] RIP: 0033:0x458047 [ 2119.383002][T17653] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:43:04 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x1000000000}) [ 2119.403049][T17653] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2119.411562][T17653] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 2119.419625][T17653] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2119.427600][T17653] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2119.435570][T17653] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2119.443543][T17653] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:04 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x5, 0x82003) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f00000001c0)={0x1, 0x1, 0x676, 0x9a39}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r2, 0x800442d2, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @dev}]}) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f0000000100)={[{0x6, 0x2, 0x60000, 0x9, 0x9b, 0xf0, 0x2, 0x3f, 0x1000, 0x3ff, 0x8, 0x81}, {0xffffffffffff7fff, 0x5, 0x100000000, 0x3f, 0xfffffffffffffffb, 0x8000, 0x5c7, 0x8001, 0x8, 0x4, 0x4, 0x8, 0x401}, {0x8, 0xe17, 0x2, 0x400, 0x1, 0xef, 0x3, 0x7, 0x200, 0x7a5131c1, 0x6, 0x4, 0x5}], 0xc4}) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000040)) 13:43:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000023c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = accept4$netrom(r1, 0x0, 0x0, 0x0) ioctl$TIOCSCTTY(r2, 0x540e, 0x101) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00') ioctl$SIOCRSSL2CALL(r3, 0x89e2, &(0x7f0000000100)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r4, 0x400443c9, &(0x7f0000000080)={{0x9, 0x2, 0xcf, 0x4, 0xaced, 0x3cd}, 0x2}) [ 2119.673410][T17667] hfs: can't find a HFS filesystem on dev loop5 13:43:05 executing program 4 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00(\x00+\x86a\x957s\x16FA\x00'}}) 13:43:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0x6, &(0x7f0000000080)=0x10000, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:05 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180), 0x84000) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xc00000000000000, 0x10000) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000080)={{0x22ddba479d585f5d, 0x2, 0x6, 0x3, 0x3}, 0x4f0, 0x401, 'id1\x00', 'timer0\x00', 0x0, 0x3, 0x8, 0x200, 0x4}) [ 2119.789768][T17667] hfs: can't find a HFS filesystem on dev loop5 13:43:05 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xedc000000000}) [ 2119.879225][T17682] FAULT_INJECTION: forcing a failure. [ 2119.879225][T17682] name failslab, interval 1, probability 0, space 0, times 0 [ 2119.936147][T17682] CPU: 1 PID: 17682 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2119.944355][T17682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2119.956421][T17682] Call Trace: [ 2119.959736][T17682] dump_stack+0x172/0x1f0 [ 2119.964088][T17682] should_fail.cold+0xa/0x15 [ 2119.968882][T17682] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2119.974711][T17682] ? ___might_sleep+0x163/0x280 [ 2119.979578][T17682] __should_failslab+0x121/0x190 [ 2119.984522][T17682] should_failslab+0x9/0x14 [ 2119.989030][T17682] kmem_cache_alloc+0x2b2/0x6f0 [ 2119.993889][T17682] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 2119.999694][T17682] ? lock_downgrade+0x880/0x880 [ 2120.004732][T17682] skb_clone+0x150/0x3b0 [ 2120.008984][T17682] netlink_broadcast_filtered+0x870/0xb20 [ 2120.014802][T17682] netlink_broadcast+0x3a/0x50 [ 2120.019578][T17682] kobject_uevent_env+0xa94/0x1030 [ 2120.024697][T17682] kobject_uevent+0x20/0x26 [ 2120.029208][T17682] lo_ioctl+0x112b/0x2150 [ 2120.033653][T17682] ? lo_rw_aio+0x1120/0x1120 [ 2120.038248][T17682] blkdev_ioctl+0x6f2/0x1d10 [ 2120.042851][T17682] ? blkpg_ioctl+0xa90/0xa90 [ 2120.047443][T17682] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2120.053266][T17682] ? __fget+0x35a/0x550 [ 2120.057431][T17682] block_ioctl+0xee/0x130 [ 2120.061858][T17682] ? blkdev_fallocate+0x410/0x410 [ 2120.066975][T17682] do_vfs_ioctl+0xd6e/0x1390 [ 2120.071574][T17682] ? ioctl_preallocate+0x210/0x210 [ 2120.076686][T17682] ? __fget+0x381/0x550 [ 2120.081458][T17682] ? ksys_dup3+0x3e0/0x3e0 [ 2120.085878][T17682] ? do_sys_open+0x31d/0x5d0 [ 2120.090469][T17682] ? tomoyo_file_ioctl+0x23/0x30 [ 2120.095405][T17682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2120.101653][T17682] ? security_file_ioctl+0x93/0xc0 [ 2120.106875][T17682] ksys_ioctl+0xab/0xd0 [ 2120.111056][T17682] __x64_sys_ioctl+0x73/0xb0 [ 2120.115666][T17682] do_syscall_64+0x103/0x610 [ 2120.120259][T17682] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2120.126149][T17682] RIP: 0033:0x458a97 [ 2120.130040][T17682] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2120.149816][T17682] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2120.158236][T17682] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 2120.166215][T17682] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2120.174360][T17682] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 13:43:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc944d9f224e659fe679689cca4500247cc698ba75875d50d0d301bacfcc170000d627000000") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00)\x00+\x86a\x957s\x16FA\x00'}}) [ 2120.182333][T17682] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2120.190355][T17682] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000080)={{0x1, 0xfffffffffffffff7, 0x7, 0x1, 0x5, 0xfffffffffffffff7}, 0x80000001, 0x3, 0x2}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x60000, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x800, 0x0) write$evdev(r2, &(0x7f0000000080)=[{{0x0, 0x7530}, 0x0, 0x5, 0x5}, {{0x0, 0x7530}, 0x16, 0x3}, {{0x77359400}, 0x3, 0xf767, 0x1}, {{0x77359400}, 0x4, 0x8, 0x1000}], 0x60) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000140)) accept4$netrom(r3, 0x0, 0x0, 0x0) 13:43:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000024c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:05 executing program 4 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2120.358312][T17699] hfs: can't find a HFS filesystem on dev loop5 [ 2120.411673][T17699] hfs: can't find a HFS filesystem on dev loop5 13:43:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)='wlan1![\x00', 0xffffffffffffffff}, 0x30) get_robust_list(r2, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f0000000100)={&(0x7f00000000c0)}, 0x0, &(0x7f0000000140)}, &(0x7f0000000200)=0x18) accept4$netrom(r1, 0x0, 0x0, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000240)) 13:43:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x80800) 13:43:05 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x1000000000000}) [ 2120.558706][T17714] FAULT_INJECTION: forcing a failure. [ 2120.558706][T17714] name failslab, interval 1, probability 0, space 0, times 0 13:43:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000025c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2120.622715][T17714] CPU: 0 PID: 17714 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2120.630838][T17714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2120.640995][T17714] Call Trace: [ 2120.644315][T17714] dump_stack+0x172/0x1f0 [ 2120.648664][T17714] should_fail.cold+0xa/0x15 [ 2120.653432][T17714] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2120.659265][T17714] ? ___might_sleep+0x163/0x280 [ 2120.664219][T17714] __should_failslab+0x121/0x190 13:43:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00*\x00+\x86a\x957s\x16FA\x00'}}) [ 2120.669778][T17714] should_failslab+0x9/0x14 [ 2120.675087][T17714] kmem_cache_alloc+0x2b2/0x6f0 [ 2120.680055][T17714] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 2120.685887][T17714] ? lock_downgrade+0x880/0x880 [ 2120.690844][T17714] skb_clone+0x150/0x3b0 [ 2120.695148][T17714] netlink_broadcast_filtered+0x870/0xb20 [ 2120.701002][T17714] netlink_broadcast+0x3a/0x50 [ 2120.706051][T17714] kobject_uevent_env+0xa94/0x1030 [ 2120.711219][T17714] kobject_uevent+0x20/0x26 [ 2120.715899][T17714] lo_ioctl+0x112b/0x2150 [ 2120.720309][T17714] ? lo_rw_aio+0x1120/0x1120 [ 2120.724944][T17714] blkdev_ioctl+0x6f2/0x1d10 [ 2120.729545][T17714] ? blkpg_ioctl+0xa90/0xa90 [ 2120.734149][T17714] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2120.740003][T17714] ? __fget+0x35a/0x550 [ 2120.744209][T17714] block_ioctl+0xee/0x130 [ 2120.748555][T17714] ? blkdev_fallocate+0x410/0x410 [ 2120.753780][T17714] do_vfs_ioctl+0xd6e/0x1390 [ 2120.758366][T17714] ? ioctl_preallocate+0x210/0x210 [ 2120.763460][T17714] ? __fget+0x381/0x550 [ 2120.767598][T17714] ? ksys_dup3+0x3e0/0x3e0 [ 2120.772003][T17714] ? do_sys_open+0x31d/0x5d0 [ 2120.776581][T17714] ? tomoyo_file_ioctl+0x23/0x30 [ 2120.781524][T17714] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2120.787786][T17714] ? security_file_ioctl+0x93/0xc0 [ 2120.792895][T17714] ksys_ioctl+0xab/0xd0 [ 2120.797044][T17714] __x64_sys_ioctl+0x73/0xb0 [ 2120.801894][T17714] do_syscall_64+0x103/0x610 [ 2120.806472][T17714] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2120.812796][T17714] RIP: 0033:0x458a97 [ 2120.816675][T17714] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2120.836368][T17714] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2120.844900][T17714] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 2120.852872][T17714] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2120.860843][T17714] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 13:43:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xffff, 0x80000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000080)={0x2, 0x2, 0x5699}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x80000) 13:43:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2120.868940][T17714] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2120.876905][T17714] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x7fffd) 13:43:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = dup(r0) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:06 executing program 4 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2121.028775][T17731] hfs: can't find a HFS filesystem on dev loop5 13:43:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000026c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) flock(r0, 0x4) [ 2121.162069][T17746] FAULT_INJECTION: forcing a failure. [ 2121.162069][T17746] name failslab, interval 1, probability 0, space 0, times 0 [ 2121.175758][T17746] CPU: 0 PID: 17746 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2121.183918][T17746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2121.193986][T17746] Call Trace: [ 2121.197293][T17746] dump_stack+0x172/0x1f0 [ 2121.201907][T17746] should_fail.cold+0xa/0x15 [ 2121.206519][T17746] ? fault_create_debugfs_attr+0x1e0/0x1e0 13:43:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00+\x00+\x86a\x957s\x16FA\x00'}}) [ 2121.212434][T17746] ? __es_tree_search.isra.0+0x1bf/0x230 [ 2121.218183][T17746] __should_failslab+0x121/0x190 [ 2121.223145][T17746] should_failslab+0x9/0x14 [ 2121.227762][T17746] kmem_cache_alloc+0x47/0x6f0 [ 2121.232712][T17746] ? ext4_es_scan+0x730/0x730 [ 2121.237402][T17746] ? do_raw_write_lock+0x124/0x290 [ 2121.242534][T17746] __es_insert_extent+0x2cc/0xf20 [ 2121.247584][T17746] ext4_es_insert_extent+0x2b7/0xa40 [ 2121.252898][T17746] ? ext4_es_scan_clu+0x50/0x50 13:43:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x0, 0x2f8, 0x0, 0x0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xd0}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x8, @dev={0xac, 0x14, 0x14, 0x28}, @loopback, @port=0x4e22, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x3}}, @common=@ttl={0x28, 'ttl\x00', 0x0, {0x3, 0x80000001}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="0faf3d28d9c2", 0x10001, 0x10, [0x3b, 0x8, 0x29, 0x27, 0x8, 0x3d, 0x36, 0xd, 0x39, 0x3d, 0x35, 0x19, 0x11, 0x2f, 0x1d, 0x39], 0x2, 0x1, 0x5}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x18}, @broadcast, 0xffffff00, 0xffffffff, 'ip6gre0\x00', 'caif0\x00', {}, {0xff}, 0x2e, 0x2, 0x4}, 0x0, 0x98, 0xe0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x4, @ipv4=@dev={0xac, 0x14, 0x14, 0x2a}, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x9}}}, {{@ip={@rand_addr=0x3, @empty, 0xffffff00, 0x0, 'veth1_to_bridge\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0xdd, 0xb5ff8e5178d9988e, 0x8}, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x10, 0x0, 0xfff, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @multicast2, @local, @port=0x4e20, @icmp_id=0x64}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 2121.257780][T17746] ? rcu_read_lock_sched_held+0x110/0x130 [ 2121.263522][T17746] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2121.269787][T17746] ? ext4_es_find_extent_range+0xff/0x600 [ 2121.275870][T17746] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 2121.275888][T17746] ? ext4_rereserve_cluster+0x240/0x240 [ 2121.275902][T17746] ? ext4_find_extent+0x76e/0x9d0 [ 2121.275917][T17746] ? ext4_find_extent+0x6a6/0x9d0 [ 2121.275934][T17746] ext4_ext_map_blocks+0x20a8/0x5260 [ 2121.275954][T17746] ? ext4_ext_release+0x10/0x10 [ 2121.275978][T17746] ? lock_acquire+0x16f/0x3f0 [ 2121.275993][T17746] ? ext4_map_blocks+0x3fd/0x18e0 [ 2121.276017][T17746] ext4_map_blocks+0xec7/0x18e0 [ 2121.276037][T17746] ? ext4_issue_zeroout+0x190/0x190 [ 2121.287291][T17746] ? kasan_check_write+0x14/0x20 [ 2121.287305][T17746] ? __brelse+0x95/0xb0 [ 2121.287327][T17746] ext4_getblk+0xc4/0x510 [ 2121.287342][T17746] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2121.287359][T17746] ? ext4_free_inode+0x1450/0x1450 [ 2121.287375][T17746] ext4_bread+0x8f/0x230 [ 2121.287387][T17746] ? ext4_getblk+0x510/0x510 [ 2121.287408][T17746] ext4_append+0x155/0x370 [ 2121.287425][T17746] ext4_mkdir+0x61b/0xdf0 [ 2121.287446][T17746] ? ext4_init_dot_dotdot+0x520/0x520 [ 2121.287462][T17746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2121.287477][T17746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2121.287499][T17746] ? security_inode_permission+0xd5/0x110 [ 2121.297675][T17746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2121.297692][T17746] ? security_inode_mkdir+0xee/0x120 [ 2121.297710][T17746] vfs_mkdir+0x433/0x690 [ 2121.297733][T17746] do_mkdirat+0x234/0x2a0 [ 2121.297749][T17746] ? __ia32_sys_mknod+0xb0/0xb0 [ 2121.297763][T17746] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2121.297780][T17746] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2121.297793][T17746] ? do_syscall_64+0x26/0x610 [ 2121.297808][T17746] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2121.297826][T17746] __x64_sys_mkdir+0x5c/0x80 [ 2121.297842][T17746] do_syscall_64+0x103/0x610 [ 2121.297857][T17746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2121.297872][T17746] RIP: 0033:0x458047 [ 2121.308064][T17746] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2121.308073][T17746] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2121.308088][T17746] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 2121.308096][T17746] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2121.308105][T17746] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2121.308117][T17746] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2121.308124][T17746] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2121.316364][T17731] hfs: can't find a HFS filesystem on dev loop5 13:43:07 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x2000000000000}) 13:43:07 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000300)={0x81, {{0x2, 0x4e21, @multicast2}}}, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") munlockall() r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x8000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000280)={@ipv4={[], [], @broadcast}, @remote, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x40, 0x1, 0x20000000009, 0x400, 0xfffffffffffffffc, 0x0, r3}) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000080)) accept4$netrom(r4, 0x0, 0x0, 0x0) 13:43:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00,\x00+\x86a\x957s\x16FA\x00'}}) 13:43:07 executing program 4 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:07 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000080)={0x3, 0x914}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'erspan0\x00', 0x10}) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000027c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2121.785811][T17769] FAULT_INJECTION: forcing a failure. [ 2121.785811][T17769] name failslab, interval 1, probability 0, space 0, times 0 [ 2121.813129][T17772] hfs: can't find a HFS filesystem on dev loop5 [ 2121.822997][T17769] CPU: 1 PID: 17769 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2121.831132][T17769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2121.841231][T17769] Call Trace: [ 2121.844552][T17769] dump_stack+0x172/0x1f0 [ 2121.849024][T17769] should_fail.cold+0xa/0x15 [ 2121.853739][T17769] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2121.859572][T17769] ? ___might_sleep+0x163/0x280 [ 2121.864441][T17769] __should_failslab+0x121/0x190 [ 2121.869746][T17769] ? ratelimit_state_init+0xb0/0xb0 [ 2121.874949][T17769] should_failslab+0x9/0x14 [ 2121.879507][T17769] kmem_cache_alloc+0x2b2/0x6f0 [ 2121.884359][T17769] ? __save_stack_trace+0x99/0x100 [ 2121.889488][T17769] ? ratelimit_state_init+0xb0/0xb0 [ 2121.895905][T17769] ext4_alloc_inode+0x1f/0x640 [ 2121.900797][T17769] ? ratelimit_state_init+0xb0/0xb0 [ 2121.905993][T17769] alloc_inode+0x66/0x190 [ 2121.910341][T17769] new_inode_pseudo+0x19/0xf0 [ 2121.915020][T17769] new_inode+0x1f/0x40 [ 2121.919092][T17769] __ext4_new_inode+0x37e/0x5450 [ 2121.924302][T17769] ? debug_check_no_obj_freed+0x200/0x464 [ 2121.930031][T17769] ? ext4_free_inode+0x1450/0x1450 13:43:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = accept4$netrom(r1, 0x0, 0x0, 0x0) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000000)=0xdf, &(0x7f0000000080)=0x4) 13:43:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101000) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x100000000, 0x4) [ 2121.935153][T17769] ? dqget+0x10d0/0x10d0 [ 2121.939409][T17769] ext4_mkdir+0x3d5/0xdf0 [ 2121.943751][T17769] ? ext4_init_dot_dotdot+0x520/0x520 [ 2121.949125][T17769] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2121.955362][T17769] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2121.961615][T17769] ? security_inode_permission+0xd5/0x110 [ 2121.967342][T17769] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2121.973605][T17769] ? security_inode_mkdir+0xee/0x120 [ 2121.979083][T17769] vfs_mkdir+0x433/0x690 [ 2121.983423][T17769] do_mkdirat+0x234/0x2a0 [ 2121.988191][T17769] ? __ia32_sys_mknod+0xb0/0xb0 [ 2121.993041][T17769] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2121.998498][T17769] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2122.004571][T17769] ? do_syscall_64+0x26/0x610 [ 2122.009246][T17769] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2122.014534][T17769] __x64_sys_mkdir+0x5c/0x80 [ 2122.019140][T17769] do_syscall_64+0x103/0x610 [ 2122.023837][T17769] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2122.029734][T17769] RIP: 0033:0x458047 [ 2122.033632][T17769] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2122.053243][T17769] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2122.061657][T17769] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 2122.069720][T17769] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2122.077697][T17769] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 13:43:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00-\x00+\x86a\x957s\x16FA\x00'}}) [ 2122.085676][T17769] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2122.093747][T17769] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:07 executing program 4 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2122.163614][T17772] hfs: can't find a HFS filesystem on dev loop5 13:43:07 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, 0x0, 0x0) 13:43:07 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x7ffffffffffff}) 13:43:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00G\x00+\x86a\x957s\x16FA\x00'}}) 13:43:07 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x20400, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x800001000008912, &(0x7f0000000200)="0adc1f123c123f319bd070c5ba2da5843743304c14c0320fa07d916814ad2ea0439ceedb70587eeaf3473a4acfd1c48d2061a068f88eb46d43f1dc73cde7ad4d1081b905a5031818612bbc3f8d721a02da336504f596c65af21ea0a130466b482b8a7789815c369db05e3408fbaa460743b2c020c5c43a3786eeedf9d6") r2 = dup3(r1, r1, 0x80000) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) accept4$netrom(r3, 0x0, 0x0, 0x0) [ 2122.338815][T17794] FAULT_INJECTION: forcing a failure. [ 2122.338815][T17794] name failslab, interval 1, probability 0, space 0, times 0 [ 2122.376628][T17794] CPU: 1 PID: 17794 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2122.384656][T17794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2122.394714][T17794] Call Trace: [ 2122.398107][T17794] dump_stack+0x172/0x1f0 [ 2122.402447][T17794] should_fail.cold+0xa/0x15 [ 2122.407051][T17794] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2122.412859][T17794] ? ___might_sleep+0x163/0x280 [ 2122.417717][T17794] __should_failslab+0x121/0x190 [ 2122.422665][T17794] should_failslab+0x9/0x14 [ 2122.427169][T17794] __kmalloc+0x2dc/0x740 [ 2122.431408][T17794] ? mark_held_locks+0xa4/0xf0 [ 2122.436169][T17794] ? kfree+0x173/0x230 [ 2122.440246][T17794] ? ext4_find_extent+0x76e/0x9d0 [ 2122.445270][T17794] ext4_find_extent+0x76e/0x9d0 [ 2122.450213][T17794] ext4_ext_map_blocks+0x1c3/0x5260 [ 2122.455415][T17794] ? ext4_ext_release+0x10/0x10 [ 2122.460529][T17794] ? find_held_lock+0x35/0x130 [ 2122.465298][T17794] ? lock_acquire+0x16f/0x3f0 [ 2122.469972][T17794] ? ext4_map_blocks+0x85d/0x18e0 [ 2122.475089][T17794] ext4_map_blocks+0x8c5/0x18e0 [ 2122.480123][T17794] ? ext4_issue_zeroout+0x190/0x190 [ 2122.485344][T17794] ? kasan_check_write+0x14/0x20 [ 2122.490296][T17794] ? __brelse+0x95/0xb0 [ 2122.494461][T17794] ext4_getblk+0xc4/0x510 [ 2122.498786][T17794] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2122.503889][T17794] ? ext4_free_inode+0x1450/0x1450 [ 2122.509087][T17794] ext4_bread+0x8f/0x230 [ 2122.513331][T17794] ? ext4_getblk+0x510/0x510 [ 2122.517934][T17794] ext4_append+0x155/0x370 [ 2122.522346][T17794] ext4_mkdir+0x61b/0xdf0 [ 2122.526664][T17794] ? ext4_init_dot_dotdot+0x520/0x520 [ 2122.532201][T17794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2122.538422][T17794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2122.544709][T17794] ? security_inode_permission+0xd5/0x110 [ 2122.550410][T17794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2122.556738][T17794] ? security_inode_mkdir+0xee/0x120 [ 2122.562443][T17794] vfs_mkdir+0x433/0x690 [ 2122.566671][T17794] do_mkdirat+0x234/0x2a0 [ 2122.570983][T17794] ? __ia32_sys_mknod+0xb0/0xb0 [ 2122.575816][T17794] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2122.581868][T17794] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2122.588021][T17794] ? do_syscall_64+0x26/0x610 [ 2122.592699][T17794] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2122.598327][T17794] __x64_sys_mkdir+0x5c/0x80 [ 2122.602916][T17794] do_syscall_64+0x103/0x610 [ 2122.607499][T17794] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2122.613372][T17794] RIP: 0033:0x458047 [ 2122.617270][T17794] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:43:08 executing program 1: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bind$unix(r1, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) write$P9_RRENAME(r1, &(0x7f0000000000)={0x7, 0x15, 0x2}, 0x7) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x3, @empty, 0x6ad}}, 0xfffffffffffffffc, 0x7fffffff, 0x8, 0x0, 0x8}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000240)={r4, @in={{0x2, 0x4e22, @empty}}, [0x1f, 0x0, 0x4, 0xffffffff, 0x4, 0x31b9, 0x51, 0xa4b, 0x1, 0x6, 0x3, 0x1, 0x9, 0x2, 0xfffffffffffffff8]}, &(0x7f0000000340)=0x100) accept4$netrom(r3, 0x0, 0x0, 0x0) [ 2122.636852][T17794] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2122.645254][T17794] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 2122.653214][T17794] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2122.661180][T17794] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2122.669246][T17794] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2122.677206][T17794] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10000000000, 0x0) ioctl$VIDIOC_S_FBUF(r1, 0x4030560b, &(0x7f00000001c0)={0x84, 0x4, &(0x7f00000000c0)="a49271aa7b829e2f3c31f8d72626ed794d004fe91d4df362e32970af8db577565a1bdf599636f69fb91ec14140671cb5627e685a7376111fac019317c9126323ad27265817549a523895e786a4050a97528e9305cb6e7bf95c692fe765837f01e6f12e67b661fd010bd32ad7863a007ceaaa6bf4613004e585ff314034d076aad1b875726fceb6702d0a84160d1d768da4d1b82163cc361c99d149e554a11fda9603f3d49f076130035a6b35facfb831f8567a63ef1eb6e88212b63e464d48d358efa5431f1c6ac0b5971bd88e62a237075c5220d88c2f45d61ed1de82e1562cd16c0e4f9ab035cb0daa132f625a92f50de5", {0x2, 0x5, 0x3136355b, 0x7, 0xe524, 0x9, 0xa, 0x9b}}) setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000080)=0x3, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000028c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2122.777997][T17800] hfs: unable to parse mount options [ 2122.809415][T17810] Unknown ioctl 1076909579 13:43:08 executing program 4 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2122.833423][T17812] Unknown ioctl 1076909579 13:43:08 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) timerfd_gettime(r0, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00y\x00+\x86a\x957s\x16FA\x00'}}) 13:43:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008914, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f0000000080)={0xc4, 0x88d, 0x4, 0x7, 0x2, 0x62}) write$FUSE_STATFS(r2, &(0x7f00000000c0)={0x60, 0xfffffffffffffffe, 0x1, {{0x1, 0x8001, 0x2, 0x80000000, 0x8, 0x20, 0x6, 0x3}}}, 0x60) [ 2122.868837][T17800] hfs: unable to parse mount options 13:43:08 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xe000000000000}) [ 2123.024177][T17827] FAULT_INJECTION: forcing a failure. [ 2123.024177][T17827] name failslab, interval 1, probability 0, space 0, times 0 [ 2123.037065][T17827] CPU: 0 PID: 17827 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2123.045143][T17827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2123.055208][T17827] Call Trace: [ 2123.058529][T17827] dump_stack+0x172/0x1f0 [ 2123.062886][T17827] should_fail.cold+0xa/0x15 [ 2123.067498][T17827] ? fault_create_debugfs_attr+0x1e0/0x1e0 13:43:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x6d82, 0x10940) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000180)=0x3, 0x4) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x9, 0x1) setsockopt$inet6_int(r3, 0x29, 0x1, &(0x7f0000000100)=0x9, 0x4) r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x19f, 0x200000) setsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000080)={0x0, 0x8, 0x52, 0x8001, 0x7fff, 0x4, 0x8, 0x8, 0x1, 0x5, 0x100}, 0xb) 13:43:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000029c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2123.073597][T17827] ? __es_tree_search.isra.0+0x1bf/0x230 [ 2123.079257][T17827] __should_failslab+0x121/0x190 [ 2123.084298][T17827] should_failslab+0x9/0x14 [ 2123.088814][T17827] kmem_cache_alloc+0x47/0x6f0 [ 2123.093607][T17827] ? ext4_es_scan+0x730/0x730 [ 2123.098293][T17827] ? do_raw_write_lock+0x124/0x290 [ 2123.103414][T17827] __es_insert_extent+0x2cc/0xf20 [ 2123.108627][T17827] ext4_es_insert_extent+0x2b7/0xa40 [ 2123.113922][T17827] ? ext4_es_scan_clu+0x50/0x50 [ 2123.118793][T17827] ? rcu_read_lock_sched_held+0x110/0x130 [ 2123.124531][T17827] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2123.130791][T17827] ? ext4_es_find_extent_range+0xff/0x600 [ 2123.136527][T17827] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 2123.142081][T17827] ? ext4_rereserve_cluster+0x240/0x240 [ 2123.142098][T17827] ? ext4_find_extent+0x76e/0x9d0 [ 2123.142117][T17827] ? ext4_find_extent+0x6a6/0x9d0 [ 2123.142136][T17827] ext4_ext_map_blocks+0x20a8/0x5260 [ 2123.142155][T17827] ? ext4_ext_release+0x10/0x10 [ 2123.142181][T17827] ? lock_acquire+0x16f/0x3f0 [ 2123.142195][T17827] ? ext4_map_blocks+0x3fd/0x18e0 [ 2123.142219][T17827] ext4_map_blocks+0xec7/0x18e0 [ 2123.153037][T17827] ? ext4_issue_zeroout+0x190/0x190 [ 2123.153062][T17827] ? kasan_check_write+0x14/0x20 [ 2123.153074][T17827] ? __brelse+0x95/0xb0 [ 2123.153092][T17827] ext4_getblk+0xc4/0x510 [ 2123.153107][T17827] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2123.153125][T17827] ? ext4_free_inode+0x1450/0x1450 [ 2123.153142][T17827] ext4_bread+0x8f/0x230 [ 2123.153156][T17827] ? ext4_getblk+0x510/0x510 13:43:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9921, 0x800) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0x1, 0x4) ioctl(r0, 0x5, &(0x7f0000000040)="0adc1f123c123f319bd070") execveat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000200)='^wlan1\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='/dev/vcsa#\x00', &(0x7f00000002c0)='*bdevppp1\x00', &(0x7f0000000300)='/dev/vcsa#\x00'], &(0x7f0000000400)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='/dev/vcsa#\x00'], 0x800) open_by_handle_at(r0, &(0x7f00000000c0)={0xd6, 0x5, "22f5a0c93d7280b328c175fdf686d81b0c6c69bd0948375d05d9fc50977da0bf040e02430b03444307e311f77e03b316edcb3564a86af0207d155e62308560e198d93bd82314c47a5b1e28016d7f8dcc4f3e217211ca9de632d8d9dc38558ea8f5358bd66f99efc68625dd988d1a6493b7c7c4602aeb8b97b829bcceb4935cad473b8f74598c7cf07d69fba13030528c82115a22fc7a34c14c83c9f227a76544cb2e9be23019e280a5167daaa46abf0bc3e5d16c3061b0ee2346e1259256fb04744d14896f195ee65f9dabc6e2e0"}, 0xa000) syz_init_net_socket$netrom(0x6, 0x5, 0x0) [ 2123.153178][T17827] ext4_append+0x155/0x370 [ 2123.153199][T17827] ext4_mkdir+0x61b/0xdf0 [ 2123.178156][T17827] ? ext4_init_dot_dotdot+0x520/0x520 [ 2123.178173][T17827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2123.178185][T17827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2123.178201][T17827] ? security_inode_permission+0xd5/0x110 [ 2123.178216][T17827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2123.178227][T17827] ? security_inode_mkdir+0xee/0x120 [ 2123.178246][T17827] vfs_mkdir+0x433/0x690 13:43:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\xe4\x00+\x86a\x957s\x16FA\x00'}}) 13:43:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") accept4$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @default}, [@null, @remote, @default, @netrom, @netrom, @rose, @bcast, @rose]}, &(0x7f0000000140)=0x48, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x10000) accept4$netrom(r1, 0x0, 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x101000, 0x0) syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8e8, 0x240) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x1f) [ 2123.227018][T17827] do_mkdirat+0x234/0x2a0 [ 2123.227035][T17827] ? __ia32_sys_mknod+0xb0/0xb0 [ 2123.227051][T17827] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2123.227069][T17827] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2123.227083][T17827] ? do_syscall_64+0x26/0x610 [ 2123.227099][T17827] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2123.227116][T17827] __x64_sys_mkdir+0x5c/0x80 [ 2123.227131][T17827] do_syscall_64+0x103/0x610 [ 2123.227146][T17827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2123.227161][T17827] RIP: 0033:0x458047 [ 2123.237641][T17832] hfs: can't find a HFS filesystem on dev loop5 [ 2123.243069][T17827] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2123.243077][T17827] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2123.243093][T17827] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 2123.243101][T17827] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2123.243110][T17827] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2123.243118][T17827] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2123.243125][T17827] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80802) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000400)={'vcan0\x00', r3}) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x62000, 0x0) ioctl$VIDIOC_CREATE_BUFS(r4, 0xc100565c, &(0x7f0000000300)={0x6f64, 0x0, 0x3, {0xf, @win={{0x8, 0x2800000000000000, 0x0, 0x5}, 0x4, 0x5, &(0x7f00000001c0)={{0x2, 0xbc10, 0x4, 0x9}, &(0x7f0000000180)={{0x8, 0x20, 0xfffffffffffffffb, 0x7ff}}}, 0xfb, &(0x7f0000000200)="ea8e27e31ed96f3689618788d57dda7b55ca685ce1907253001e437416357b9f624975a7bcf5cc2f698519e04a79820f97fa22416cfd42b3855ac3890013e2abebec1de6ce0f18f3e3c9cfd7cdb3267a0a4c0a27bdefccdf1a7865432aabb07f3b57a3d84a6a1e9cce9e418ef63f0c2c5241fea3106d76a7244687a4c47aed61898e4e53b2d81bc2e26543df5c4b35217df9726dff6b905b74b8c00248b0e080e6214daa8f711b5653cae4267c0203d0f3dcd7a5a420e5352720a343995df924c046c0c3d19bca34fc6610cfd51683bd2db27a037c2f9ad6fe12bf4995fe5b2ae97b3e5de1", 0xfff}}}) 13:43:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000080)=0x8) 13:43:08 executing program 4 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:08 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x40000000000000}) 13:43:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000002ac000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2123.636680][T17857] FAULT_INJECTION: forcing a failure. [ 2123.636680][T17857] name failslab, interval 1, probability 0, space 0, times 0 13:43:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8001000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x9c, r2, 0x10, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb45a}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) ioctl(r0, 0x100000008912, &(0x7f00000001c0)="0adc1f1283d7263518805000003f319bf070851a2235beda6bab867b7d0452d88f81b82a335a8cc03217947f88d61f7207bd84b2a64c02269137fde2bef5673e4503417ed63602b6099740abdb56a3da716a11c315f516c4fcf962ee0898644b83a7ed1a6607677b74cdb96d4d17e7533a6f4ac1fe4c254c3466848239c8451484623fa0af3385c839357f37") r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r3, &(0x7f0000000080)={{}, [@null, @bcast, @default, @default, @netrom, @null, @rose]}, &(0x7f0000000000)=0x48, 0x80800) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xf, 0x400400) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000140)={0x2, 0x7, 0x100, 0x1, 0xeb8, 0xff80000000000000, 0x7, 0xffffffff80000001, 0xe9d, 0x9, 0x3}, 0xb) accept4$netrom(r3, 0x0, 0x0, 0x0) [ 2123.688899][T17863] hfs: can't find a HFS filesystem on dev loop5 [ 2123.710013][T17857] CPU: 0 PID: 17857 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2123.718472][T17857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2123.728550][T17857] Call Trace: [ 2123.731855][T17857] dump_stack+0x172/0x1f0 [ 2123.736289][T17857] should_fail.cold+0xa/0x15 [ 2123.740985][T17857] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2123.746807][T17857] ? ___might_sleep+0x163/0x280 [ 2123.751670][T17857] __should_failslab+0x121/0x190 [ 2123.756618][T17857] should_failslab+0x9/0x14 [ 2123.761124][T17857] __kmalloc+0x2dc/0x740 [ 2123.761149][T17857] ? ext4_find_extent+0x76e/0x9d0 [ 2123.761170][T17857] ext4_find_extent+0x76e/0x9d0 [ 2123.761193][T17857] ext4_ext_map_blocks+0x1c3/0x5260 [ 2123.770439][T17857] ? ext4_ext_release+0x10/0x10 [ 2123.770469][T17857] ? lock_acquire+0x16f/0x3f0 [ 2123.770485][T17857] ? ext4_map_blocks+0x3fd/0x18e0 [ 2123.770507][T17857] ext4_map_blocks+0xec7/0x18e0 [ 2123.770536][T17857] ? ext4_issue_zeroout+0x190/0x190 [ 2123.805275][T17857] ? kasan_check_write+0x14/0x20 [ 2123.810222][T17857] ? __brelse+0x95/0xb0 [ 2123.814394][T17857] ext4_getblk+0xc4/0x510 [ 2123.818740][T17857] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2123.823775][T17857] ? ext4_free_inode+0x1450/0x1450 [ 2123.828900][T17857] ext4_bread+0x8f/0x230 [ 2123.833151][T17857] ? ext4_getblk+0x510/0x510 [ 2123.837758][T17857] ext4_append+0x155/0x370 [ 2123.842181][T17857] ext4_mkdir+0x61b/0xdf0 [ 2123.846538][T17857] ? ext4_init_dot_dotdot+0x520/0x520 [ 2123.851923][T17857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2123.858174][T17857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2123.864452][T17857] ? security_inode_permission+0xd5/0x110 [ 2123.870184][T17857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2123.876441][T17857] ? security_inode_mkdir+0xee/0x120 [ 2123.881740][T17857] vfs_mkdir+0x433/0x690 [ 2123.885998][T17857] do_mkdirat+0x234/0x2a0 [ 2123.890340][T17857] ? __ia32_sys_mknod+0xb0/0xb0 [ 2123.895196][T17857] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2123.900691][T17857] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2123.906827][T17857] ? do_syscall_64+0x26/0x610 [ 2123.911527][T17857] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2123.916816][T17857] __x64_sys_mkdir+0x5c/0x80 [ 2123.921408][T17857] do_syscall_64+0x103/0x610 [ 2123.926040][T17857] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2123.931929][T17857] RIP: 0033:0x458047 [ 2123.935823][T17857] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2123.955422][T17857] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2123.963830][T17857] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 2123.971999][T17857] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2123.979980][T17857] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 13:43:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x280, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000080)=0x7, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0xffffffffffffff40, @empty, 0x1000}}, 0x9}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000001c0)={r3, 0xb5f, 0x20}, &(0x7f0000000200)=0xc) [ 2123.987969][T17857] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2123.996038][T17857] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f0000123f319bd070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r3 = accept4$netrom(r2, 0x0, 0x0, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000280)=0x7fff) getresuid(&(0x7f0000000200), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) r5 = getuid() fstat(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000004c0)=0x0, &(0x7f0000000500), &(0x7f0000000540)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000680)=0xe8) fstat(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000740), &(0x7f0000000780)=0x0, &(0x7f00000007c0)) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f00000009c0)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, &(0x7f0000000a40)=0xc) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000b80)={0x3, r1}) getgroups(0x5, &(0x7f0000000a80)=[0xee00, 0x0, 0xee01, 0xee00, 0xee00]) r16 = getegid() setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000bc0)={0x6}, 0x4) r17 = getegid() lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000ac0)={{}, {0x1, 0x1}, [{0x2, 0x7, r4}, {0x2, 0xcbc8b5516356bf2, r5}, {0x2, 0x1, r6}, {0x2, 0x6, r7}, {0x2, 0x4, r8}, {0x2, 0x0, r9}, {0x2, 0x0, r10}, {0x2, 0x1, r11}, {0x2, 0x2, r12}, {0x2, 0x4, r13}], {0x4, 0x1}, [{0x8, 0x4, r14}, {0x8, 0x5, r15}, {0x8, 0x0, r16}, {0x8, 0x1, r17}], {0x10, 0x2}, {0x20, 0x2}}, 0x94, 0x2) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x1ad081) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000000)=0x8, &(0x7f0000000080)=0x4) name_to_handle_at(r1, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="930000000900000031d0a3264184968d2e0de7f71fe4fc1cde826bf6ed03c1ef4cb2e7c793d7e6dda285fd184a656f4df5d60ef596c96128384f45ddb053981f912f77aef5f237ef49b2b77829613c6c67617df70be6aca76f7809f5977ce1eebaf2bca4fcea46fa4baee1f614a330ba1cbd147f2fed47b65b22a1daf5b0ecdd83002eb4618d59605739a0c9fc94074174cc357cd4e0607a502ffc2f3aa6824f062032fb79083598022a1436c647f300dd9d548b0c99db94bde373b234020000003f163a8dd1a7c2156db484b876ff30544b8276a844e09b818b693c475becb35a6b08a7f0749c"], &(0x7f0000000240), 0x400) 13:43:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x03+\x86a\x957s\x16FA\x00'}}) 13:43:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.thre\xa4\xe1\xf617ads\x00', 0x2, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000080)={0x0, @bt={0x0, 0x8, 0x1, 0x0, 0x7, 0xf3, 0x2, 0x2, 0x3f, 0x4, 0x6, 0x1, 0xf84a, 0xffff, 0x8, 0x8}}) accept4$netrom(r1, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000140)={0x7f, 0x0, 0x10003, 0x101}) ioctl$DRM_IOCTL_AGP_BIND(r2, 0x40106436, &(0x7f0000000180)={r3}) [ 2124.094602][T17863] hfs: can't find a HFS filesystem on dev loop5 13:43:09 executing program 4 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:09 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x100000000000000}) 13:43:09 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000200)=0x1000, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000000)=0x44) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000100)={0x1, {{0x2, 0x4e21, @broadcast}}}, 0x88) 13:43:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x97ad, 0x2000) connect$unix(r1, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e24}, 0x6e) ioctl(r0, 0x1000008912, &(0x7f0000000100)='N') r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, [], [{0x9, 0xaf8, 0xc0c, 0x3, 0x100, 0x8c}, {0xfe2, 0x6, 0x0, 0x0, 0x8, 0x8}]}) 13:43:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x90\x03+\x86a\x957s\x16FA\x00'}}) [ 2124.389042][T17888] FAULT_INJECTION: forcing a failure. [ 2124.389042][T17888] name failslab, interval 1, probability 0, space 0, times 0 [ 2124.401942][T17888] CPU: 1 PID: 17888 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2124.409921][T17888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2124.420266][T17888] Call Trace: [ 2124.423670][T17888] dump_stack+0x172/0x1f0 [ 2124.428008][T17888] should_fail.cold+0xa/0x15 [ 2124.432606][T17888] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2124.438513][T17888] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2124.444679][T17888] ? __es_tree_search.isra.0+0x1bf/0x230 [ 2124.450344][T17888] __should_failslab+0x121/0x190 [ 2124.455290][T17888] should_failslab+0x9/0x14 [ 2124.459822][T17888] kmem_cache_alloc+0x47/0x6f0 [ 2124.464593][T17888] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2124.470330][T17888] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 2124.475796][T17888] ? ext4_es_scan+0x730/0x730 [ 2124.480481][T17888] ? do_raw_write_lock+0x124/0x290 13:43:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000002bc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2124.485604][T17888] __es_insert_extent+0x2cc/0xf20 [ 2124.490639][T17888] ext4_es_insert_extent+0x2b7/0xa40 [ 2124.495934][T17888] ? ext4_es_scan_clu+0x50/0x50 [ 2124.500802][T17888] ext4_map_blocks+0xb87/0x18e0 [ 2124.505669][T17888] ? ext4_issue_zeroout+0x190/0x190 [ 2124.510873][T17888] ? kasan_check_write+0x14/0x20 [ 2124.515842][T17888] ? __brelse+0x95/0xb0 [ 2124.520009][T17888] ext4_getblk+0xc4/0x510 [ 2124.524348][T17888] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2124.529382][T17888] ? ext4_free_inode+0x1450/0x1450 [ 2124.534598][T17888] ext4_bread+0x8f/0x230 [ 2124.538942][T17888] ? ext4_getblk+0x510/0x510 [ 2124.543546][T17888] ext4_append+0x155/0x370 [ 2124.548152][T17888] ext4_mkdir+0x61b/0xdf0 [ 2124.552527][T17888] ? ext4_init_dot_dotdot+0x520/0x520 [ 2124.557991][T17888] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2124.564316][T17888] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2124.570564][T17888] ? security_inode_permission+0xd5/0x110 [ 2124.576390][T17888] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2124.582631][T17888] ? security_inode_mkdir+0xee/0x120 [ 2124.587923][T17888] vfs_mkdir+0x433/0x690 [ 2124.592182][T17888] do_mkdirat+0x234/0x2a0 [ 2124.596518][T17888] ? __ia32_sys_mknod+0xb0/0xb0 [ 2124.601368][T17888] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2124.606838][T17888] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2124.613185][T17888] ? do_syscall_64+0x26/0x610 [ 2124.617873][T17888] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2124.623163][T17888] __x64_sys_mkdir+0x5c/0x80 [ 2124.627760][T17888] do_syscall_64+0x103/0x610 [ 2124.632366][T17888] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2124.638258][T17888] RIP: 0033:0x458047 [ 2124.642237][T17888] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2124.661844][T17888] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2124.670381][T17888] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 2124.678376][T17888] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2124.686375][T17888] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2124.694404][T17888] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2124.702386][T17888] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2124.713904][T17887] hfs: can't find a HFS filesystem on dev loop5 13:43:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) r2 = geteuid() stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000280)=[0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee01]) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001300)=@nat={'nat\x00', 0x19, 0x6, 0x1020, [0x200002c0, 0x0, 0x0, 0x20000410, 0x200006d0], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x809b, 'ip6_vti0\x00', 'bond0\x00', 'bridge_slave_0\x00', 'ip_vti0\x00', @broadcast, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], @remote, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], 0xb0, 0xe8, 0x120, [@owner={'owner\x00', 0x18, {{r1, r2, r3, r4, 0x2, 0x2}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0x10}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x15, 0x33, 0xa01, 'eql\x00', 'tunl0\x00', 'syz_tun\x00', 'team_slave_1\x00', @link_local, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @remote, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], 0x130, 0x130, 0x160, [@rateest={'rateest\x00', 0x48, {{'yam0\x00', 'ip_vti0\x00', 0x23, 0x3, 0x4, 0x5, 0x1, 0x9, 0x3, 0xfffffffffffffffe}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x5}}}]}}, @common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}}, {{{0x0, 0x4, 0x7b, 'gre0\x00', 'caif0\x00', 'dummy0\x00', 'caif0\x00', @remote, [0xff, 0xff, 0xff, 0x0, 0xff], @remote, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], 0x70, 0xf8, 0x130}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7, 'syz0\x00', 0x80000001}}}, @common=@mark={'mark\x00', 0x10, {{0xffffffd0, 0xffffffffffffffff}}}]}, @snat={'snat\x00', 0x10, {{@dev={[], 0x13}, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x3, 0x0, 0x2, [{{{0x3, 0x4, 0x0, 'bpq0\x00', 'sit0\x00', 'netdevsim0\x00', 'veth1_to_bridge\x00', @dev={[], 0xa}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], 0x920, 0x920, 0x958, [@cluster={'cluster\x00', 0x10, {{0x80000000, 0x4, 0x3, 0x1}}}, @among={'among\x00', 0x850, {{0x4, 0x100000000, 0x2, {[0x4, 0x8, 0x100000001, 0x1, 0x3, 0x6, 0x1, 0x8, 0x1, 0x7, 0xdeee, 0x9f2, 0x1, 0x400, 0x1, 0xffffffff, 0x7, 0xf4, 0x186, 0x0, 0x27c7, 0x7, 0x2, 0x101, 0x0, 0xfffffffffffff7c6, 0x10000, 0x80000001, 0x101, 0x9, 0x9, 0x10000, 0x80000001, 0x3, 0x36ec, 0x0, 0x0, 0x200, 0x456, 0x400000000, 0x5, 0xffffffffffff15d9, 0x3ff, 0x0, 0x1, 0x1, 0x0, 0x5, 0x9, 0x20, 0x9, 0x2, 0x4, 0x1, 0x0, 0x5, 0x5, 0x8, 0x100000001, 0x80000000, 0x101, 0x0, 0x8000, 0xffffffffffffcb6a, 0x8, 0x17, 0x5, 0x101, 0xe86, 0x1f, 0x8, 0xecc, 0x2, 0x759985ed, 0x101, 0xffff, 0x432, 0x1ff, 0x9, 0x1, 0x6, 0x340f, 0x4650, 0x9, 0xd4, 0x3, 0x4, 0x7ff, 0x10000, 0x4252, 0x4, 0x100000000, 0x4, 0x0, 0x6, 0x400, 0x8, 0x81, 0x2, 0x800, 0xec, 0x6, 0x9, 0x1, 0x8, 0x3, 0x0, 0x9, 0x7fff, 0x7f, 0xa000000000000000, 0x0, 0x5, 0x8000, 0x1, 0x100000001, 0x497f, 0x3f, 0x1, 0x9, 0xc4e, 0x679, 0x1, 0x8, 0xf850, 0x0, 0x92e, 0x9, 0x10001, 0x8, 0x0, 0x10001, 0x1, 0x1cf, 0x7, 0x100, 0xada, 0x65, 0x8, 0x37, 0x100000000, 0x5, 0x20, 0x1, 0x20, 0xfffffffffffffffe, 0x9b2, 0x0, 0x80000000, 0xfff, 0x1, 0xaf, 0x100000000000000, 0x80000001, 0x0, 0x1, 0x8, 0xf6, 0xa5, 0x80000001, 0x0, 0x3, 0x3ff, 0x1, 0x100000001, 0x3, 0x0, 0x1, 0x1, 0xffff, 0xffffffffffffff81, 0x7, 0xc7, 0x8001, 0x1a, 0xdd7d, 0x100000000, 0x9, 0x0, 0x100, 0x2, 0x0, 0x0, 0x9, 0x3, 0xfffffffffffffffb, 0x10001, 0x400, 0xa86d, 0x4, 0x6, 0xaf9, 0xfff, 0x5, 0x0, 0x9, 0x4, 0x9, 0x400, 0xceb, 0x6, 0x7, 0x200, 0x1f, 0x4, 0x1000100000, 0x5, 0x9, 0xdf2, 0x3, 0x7, 0x2, 0x1, 0x8, 0xc9, 0x7ff, 0x8, 0x8, 0x100000000, 0x40, 0x8af, 0x6, 0x893, 0x1, 0x3, 0x2000000, 0x3, 0x2, 0xfffffffffffffffa, 0x10000, 0x2, 0x400, 0x100, 0x7, 0x1ff, 0x3ff, 0x8, 0x6, 0x1, 0xe, 0xfffffffffffffffc, 0x1, 0x5, 0x9, 0x401, 0x2f, 0x6, 0xffffffffffffff2f, 0x0, 0x611, 0x4, 0x8, 0x9, 0x800, 0x2, 0x7d0b, 0xfffffffffffffff7], 0x3, [{[0x0, 0x5], @remote}, {[0x2, 0xcfd8], @remote}, {[0x9, 0x3ff], @loopback}]}, {[0x7, 0x7, 0xd1ec, 0x2, 0x20, 0x5, 0x8, 0x2, 0xf3, 0x9, 0x100000001, 0x8, 0x8, 0x8, 0x1, 0x2b, 0x9, 0x5, 0x100000000, 0x100000001, 0x6, 0xff3, 0xe6e, 0x80000001, 0x1ff, 0x10000, 0x9, 0x0, 0x80000000, 0x2, 0x3, 0x800, 0x7, 0xfffffffffffffff7, 0x81, 0x80, 0x3, 0x5, 0x3000, 0x4fa1, 0x401, 0x8, 0x2, 0x7f, 0x54e, 0x6, 0xeefa, 0x2, 0xf6, 0x4, 0x9, 0x81, 0x7f, 0x8000, 0x9, 0x4, 0x4, 0x6, 0x0, 0x2, 0x7f, 0x200, 0x0, 0x0, 0x7, 0x6, 0xff, 0xfffffffffffffcc7, 0xd74, 0x2, 0x1, 0x6, 0x3, 0xfffffffffffffff9, 0x100000000, 0x1, 0x80000000, 0x3, 0x9, 0xfffffffffffffe01, 0x8, 0x3, 0x9, 0x734b, 0x8, 0x3ff, 0x2, 0x5, 0x3f, 0x3, 0x0, 0x9, 0x1, 0x7, 0x9, 0x7, 0xc3, 0x7, 0x0, 0x40, 0x3a, 0xffffffffb6f4b7ba, 0x77, 0x3, 0x100, 0x800, 0x1, 0x0, 0x6, 0x7fff, 0xfffffffffffffffe, 0x5, 0x7ff, 0x1fffffffc000000, 0x9, 0x20, 0x5, 0x1, 0x1, 0x9, 0x0, 0x6, 0xfff, 0x20, 0x1f, 0xc, 0x6, 0x22, 0x40, 0x0, 0x7fffffff, 0x1f, 0x7, 0x5, 0xd0, 0xffffffff, 0x501a, 0x3f, 0xffffffff, 0xfffffffffffffbe0, 0x101, 0x0, 0x0, 0x5, 0x5, 0x6e, 0x80000000, 0x0, 0xdf5, 0x9, 0x1, 0x100, 0x3, 0x8, 0x1, 0x1, 0x6, 0x200000000000, 0xd8ce, 0x1, 0x1000, 0x200, 0x4, 0x100, 0x2, 0xffff, 0x3, 0x4, 0x3ff, 0x200, 0x80, 0x7, 0x8, 0xbd, 0x2, 0x7, 0x8, 0xffffffffffffffee, 0x101, 0xa3, 0x1, 0xa19, 0x9, 0x2, 0x2a3, 0x1, 0x1, 0x6, 0x6, 0x9, 0x81, 0x3ff, 0xffffffffffff88b5, 0xfffffffffffffc00, 0x8, 0x6, 0x0, 0x3f, 0x0, 0x7, 0x7, 0x7, 0x6, 0x5, 0xce0, 0x7f, 0x1f, 0x3f, 0x5, 0x3, 0x9, 0x5b865bfc, 0x6, 0x3, 0x0, 0x80000001, 0x1000, 0xa63, 0x4, 0x800, 0x0, 0x2, 0x46d3, 0x9, 0x3ff, 0x80000001, 0x1ff, 0x9, 0x1, 0x100, 0x80, 0x8, 0xff7, 0x0, 0x3, 0x8, 0x7, 0x1, 0x2, 0x3ff, 0x1ff, 0x3b, 0x3, 0x7, 0xffffffffffffff80, 0x0, 0x3, 0x2, 0x1, 0x0, 0x7, 0xffff, 0x300000, 0x7, 0x100000000, 0x0, 0x3], 0x1, [{[0x9, 0x10000], @local}]}}}}]}}, @snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}, {{{0x1b, 0x0, 0x21c, 'veth1_to_hsr\x00', 'veth0_to_bond\x00', 'irlan0\x00', 'bridge_slave_1\x00', @link_local, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], @remote, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="0d78afeb2053", 0xffffffffffffffff}}}]}, @arpreply={'arpreply\x00', 0x10, {{@local, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x5, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x30, 0x1e, 'nr0\x00', 'bridge_slave_1\x00', 'gre0\x00', 'veth1_to_team\x00', @broadcast, [0xff, 0xff, 0xff, 0xff], @random="23eb555dec6f", [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], 0xb0, 0x128, 0x178, [@time={'time\x00', 0x18, {{0x40, 0x80000001, 0x5b9b, 0xdee8, 0x0, 0xfffffffffffffff8, 0x3}}}]}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x3, 0x6, 0x8}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7ff, 'syz1\x00', 0xfff}}}}]}]}, 0x1098) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r5, 0x0, 0x0, 0x0) 13:43:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x40880) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r3, 0x800, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x3ff}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) [ 2124.820068][T17887] hfs: can't find a HFS filesystem on dev loop5 13:43:10 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x200000000000000}) 13:43:10 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x422040, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f00000000c0)={0x0, 0x3, 0x428f, 'queue0\x00', 0x4}) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x101000, 0x0) mmap$perf(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000000, 0x10032, r3, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000180)={0x1, 'veth1_to_bond\x00', 0x2}, 0x18) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r4, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r2, 0x0, 0x10, &(0x7f0000000240)='/dev/cachefiles\x00'}, 0x30) rt_sigqueueinfo(r5, 0x18, &(0x7f00000002c0)={0x27, 0x3ff, 0x2}) 13:43:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x05+\x86a\x957s\x16FA\x00'}}) 13:43:10 executing program 4 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:10 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x101800, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @random="fdd0adaceeea", 'team0\x00'}}, 0x1e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) 13:43:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x74, &(0x7f00000000c0)=[@in6={0xa, 0x4e20, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffffffffffc}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e21, 0x9, @remote, 0x9}, @in6={0xa, 0x4e22, 0xffffffffffffffff, @mcast2, 0x7}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000001c0)={0xffffffffffffff00, 0xfffffffffffff000, 0x8008, 0xbc, 0x80, 0x3, 0x4, 0x5, r3}, 0x20) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2125.076887][T17910] hfs: can't find a HFS filesystem on dev loop5 13:43:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000002cc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2125.177978][T17920] FAULT_INJECTION: forcing a failure. [ 2125.177978][T17920] name failslab, interval 1, probability 0, space 0, times 0 [ 2125.190832][T17920] CPU: 0 PID: 17920 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2125.198994][T17920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2125.209063][T17920] Call Trace: [ 2125.212379][T17920] dump_stack+0x172/0x1f0 [ 2125.216740][T17920] should_fail.cold+0xa/0x15 [ 2125.221350][T17920] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2125.227177][T17920] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2125.232939][T17920] ? __es_tree_search.isra.0+0x1bf/0x230 [ 2125.238587][T17920] __should_failslab+0x121/0x190 [ 2125.243531][T17920] should_failslab+0x9/0x14 [ 2125.248035][T17920] kmem_cache_alloc+0x47/0x6f0 [ 2125.248051][T17920] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2125.248064][T17920] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 2125.248075][T17920] ? ext4_es_scan+0x730/0x730 [ 2125.248095][T17920] ? do_raw_write_lock+0x124/0x290 [ 2125.263998][T17920] __es_insert_extent+0x2cc/0xf20 [ 2125.264018][T17920] ext4_es_insert_extent+0x2b7/0xa40 [ 2125.284462][T17920] ? ext4_es_scan_clu+0x50/0x50 [ 2125.289346][T17920] ext4_map_blocks+0xb87/0x18e0 [ 2125.294223][T17920] ? ext4_issue_zeroout+0x190/0x190 [ 2125.299427][T17920] ? kasan_check_write+0x14/0x20 [ 2125.304359][T17920] ? __brelse+0x95/0xb0 [ 2125.308515][T17920] ext4_getblk+0xc4/0x510 [ 2125.312830][T17920] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2125.317856][T17920] ? ext4_free_inode+0x1450/0x1450 [ 2125.322962][T17920] ext4_bread+0x8f/0x230 [ 2125.327797][T17920] ? ext4_getblk+0x510/0x510 [ 2125.332401][T17920] ext4_append+0x155/0x370 [ 2125.337062][T17920] ext4_mkdir+0x61b/0xdf0 [ 2125.341399][T17920] ? ext4_init_dot_dotdot+0x520/0x520 [ 2125.346753][T17920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2125.352979][T17920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2125.359213][T17920] ? security_inode_permission+0xd5/0x110 [ 2125.364913][T17920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2125.371402][T17920] ? security_inode_mkdir+0xee/0x120 [ 2125.376708][T17920] vfs_mkdir+0x433/0x690 [ 2125.380957][T17920] do_mkdirat+0x234/0x2a0 [ 2125.385269][T17920] ? __ia32_sys_mknod+0xb0/0xb0 [ 2125.390102][T17920] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2125.395578][T17920] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2125.401829][T17920] ? do_syscall_64+0x26/0x610 [ 2125.406489][T17920] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2125.411759][T17920] __x64_sys_mkdir+0x5c/0x80 [ 2125.416331][T17920] do_syscall_64+0x103/0x610 [ 2125.420915][T17920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2125.426784][T17920] RIP: 0033:0x458047 [ 2125.430663][T17920] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2125.450450][T17920] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2125.458847][T17920] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 2125.466804][T17920] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 13:43:10 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x300000000000000}) 13:43:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0xfffffffffffffffd, 0x6, 0x200}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x8}, &(0x7f0000000140)=0x8) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r3, 0x0, 0x0, 0x0) 13:43:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x06+\x86a\x957s\x16FA\x00'}}) [ 2125.474758][T17920] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2125.482886][T17920] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2125.491327][T17920] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10000) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) r2 = accept(r0, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000280)=0xffffffffffffff9d) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x0) ioctl$KDSETLED(r3, 0x4b32, 0x7fffffffffe) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x81, @ipv4={[], [], @remote}, 0x1000}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e22, 0x5, @empty, 0x98}, @in6={0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, [], 0x1e}}], 0x64) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r4, 0x0, 0x0, 0x0) [ 2125.589138][T17932] hfs: can't find a HFS filesystem on dev loop5 13:43:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$void(r0, 0xc0045c79) accept4$netrom(r1, 0x0, 0x0, 0x80800) 13:43:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00=\x06+\x86a\x957s\x16FA\x00'}}) 13:43:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x6c9d1b5073686ebe}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0xa00, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4008080) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r3, 0x0, 0x0, 0x0) [ 2125.703695][T17932] hfs: can't find a HFS filesystem on dev loop5 13:43:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000002dc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:11 executing program 4 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x107) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000080)={0x3, 0x3, 0x40}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:11 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x400000000000000}) 13:43:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x2) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x6, @mcast2, 0x3}, 0x1c) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f00000000c0)) 13:43:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) finit_module(r1, &(0x7f0000000000)='}\x00', 0x2) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x20c00) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f00000000c0)={0x0, 0xfffffffffffffffb, 0x81, 0x875}) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2126.126277][T17961] FAULT_INJECTION: forcing a failure. [ 2126.126277][T17961] name failslab, interval 1, probability 0, space 0, times 0 [ 2126.139279][T17961] CPU: 1 PID: 17961 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2126.147276][T17961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2126.157445][T17961] Call Trace: [ 2126.160759][T17961] dump_stack+0x172/0x1f0 [ 2126.160782][T17961] should_fail.cold+0xa/0x15 [ 2126.160803][T17961] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2126.160818][T17961] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2126.160836][T17961] ? __es_tree_search.isra.0+0x1bf/0x230 [ 2126.175538][T17961] __should_failslab+0x121/0x190 [ 2126.175554][T17961] should_failslab+0x9/0x14 [ 2126.175571][T17961] kmem_cache_alloc+0x47/0x6f0 [ 2126.175587][T17961] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2126.175605][T17961] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 2126.212651][T17961] ? ext4_es_scan+0x730/0x730 [ 2126.217338][T17961] ? do_raw_write_lock+0x124/0x290 [ 2126.222463][T17961] __es_insert_extent+0x2cc/0xf20 [ 2126.227500][T17961] ext4_es_insert_extent+0x2b7/0xa40 [ 2126.232789][T17961] ? ext4_es_scan_clu+0x50/0x50 [ 2126.237657][T17961] ext4_map_blocks+0xb87/0x18e0 [ 2126.242521][T17961] ? ext4_issue_zeroout+0x190/0x190 [ 2126.247833][T17961] ? kasan_check_write+0x14/0x20 [ 2126.252784][T17961] ? __brelse+0x95/0xb0 [ 2126.256946][T17961] ext4_getblk+0xc4/0x510 [ 2126.261280][T17961] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2126.266323][T17961] ? ext4_free_inode+0x1450/0x1450 [ 2126.271441][T17961] ext4_bread+0x8f/0x230 13:43:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x91\x06+\x86a\x957s\x16FA\x00'}}) [ 2126.275687][T17961] ? ext4_getblk+0x510/0x510 [ 2126.280284][T17961] ext4_append+0x155/0x370 [ 2126.284711][T17961] ext4_mkdir+0x61b/0xdf0 [ 2126.289051][T17961] ? ext4_init_dot_dotdot+0x520/0x520 [ 2126.294451][T17961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2126.300703][T17961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2126.306952][T17961] ? security_inode_permission+0xd5/0x110 [ 2126.312677][T17961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2126.318921][T17961] ? security_inode_mkdir+0xee/0x120 [ 2126.324214][T17961] vfs_mkdir+0x433/0x690 [ 2126.328461][T17961] do_mkdirat+0x234/0x2a0 [ 2126.332802][T17961] ? __ia32_sys_mknod+0xb0/0xb0 [ 2126.337649][T17961] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2126.343114][T17961] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2126.349190][T17961] ? do_syscall_64+0x26/0x610 [ 2126.353869][T17961] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2126.359336][T17961] __x64_sys_mkdir+0x5c/0x80 [ 2126.364029][T17961] do_syscall_64+0x103/0x610 [ 2126.364052][T17961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2126.364064][T17961] RIP: 0033:0x458047 [ 2126.364076][T17961] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2126.364090][T17961] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2126.374549][T17961] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 2126.374558][T17961] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2126.374566][T17961] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2126.374575][T17961] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2126.374584][T17961] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x800) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000140)=0x8080, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f00000000c0)='\x00', 0x1, 0x2) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x20) r3 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) r4 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x5, 0x20000) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000240)={0x1, 0x5, [{r3, 0x0, 0x12000}, {r4, 0x0, 0xfffffffffffff000}, {r5, 0x0, 0x1000000004000, 0xfffffffffffff000}, {r0, 0x0, 0xfffffffffffff000, 0xfffffffff0000000}, {r6, 0x0, 0xfffffffff0000000, 0x1000000000000}]}) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000002ec000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2126.500946][T17962] hfs: can't find a HFS filesystem on dev loop5 13:43:12 executing program 4 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) r1 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2002}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00012dbd7000fcdbdf251000000014000300080001004467926402ef57b135c803730000000008000400060000b9c8b9c7b6000800"], 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x8000) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000000)=0x100) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000200)) accept4$netrom(r3, 0x0, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r4, 0x800455d1, &(0x7f00000000c0)) 13:43:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = accept4$netrom(r1, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) r4 = gettid() kcmp(r3, r4, 0x0, r2, r1) 13:43:12 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x500000000000000}) 13:43:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40, 0x0) write$vhci(r1, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, "09d3b507abd3d245a41e969c4e0417f9b3ebce387d8bb488494d0dde81b69ec74d146d7dd8"}, 0x26) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@empty, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x1, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000080)) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f00000000c0)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={'rose', 0x0}, 0x3, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x243, 0x4, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 13:43:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000080)) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2126.820448][T17989] FAULT_INJECTION: forcing a failure. [ 2126.820448][T17989] name failslab, interval 1, probability 0, space 0, times 0 [ 2126.864395][T17989] CPU: 0 PID: 17989 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2126.872409][T17989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2126.872416][T17989] Call Trace: [ 2126.872442][T17989] dump_stack+0x172/0x1f0 [ 2126.872462][T17989] should_fail.cold+0xa/0x15 [ 2126.872480][T17989] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2126.872495][T17989] ? finish_task_switch+0x1f0/0x780 [ 2126.872506][T17989] ? __switch_to_asm+0x34/0x70 [ 2126.872518][T17989] ? __switch_to_asm+0x40/0x70 [ 2126.872541][T17989] __should_failslab+0x121/0x190 [ 2126.872560][T17989] should_failslab+0x9/0x14 [ 2126.900583][T17989] kmem_cache_alloc+0x47/0x6f0 [ 2126.900606][T17989] ? ___might_sleep+0x163/0x280 [ 2126.934298][T17989] ? mempool_alloc+0x380/0x380 [ 2126.939078][T17989] mempool_alloc_slab+0x47/0x60 [ 2126.943943][T17989] mempool_alloc+0x16b/0x380 [ 2126.948541][T17989] ? io_schedule+0x1c/0x70 [ 2126.952971][T17989] ? mempool_destroy+0x40/0x40 [ 2126.957735][T17989] ? mark_held_locks+0xf0/0xf0 [ 2126.962497][T17989] ? __unlock_page_memcg+0x53/0x100 [ 2126.967697][T17989] ? find_held_lock+0x35/0x130 [ 2126.972466][T17989] bio_alloc_bioset+0x3bf/0x680 [ 2126.977329][T17989] ? bvec_alloc+0x2f0/0x2f0 [ 2126.981835][T17989] ? kasan_check_read+0x11/0x20 [ 2126.986691][T17989] submit_bh_wbc+0x133/0x7f0 [ 2126.991292][T17989] __sync_dirty_buffer+0x111/0x2e0 [ 2126.996408][T17989] sync_dirty_buffer+0x1b/0x20 [ 2127.001175][T17989] __ext4_handle_dirty_metadata+0x237/0x570 [ 2127.007071][T17989] ext4_handle_dirty_dirent_node+0x3cf/0x4f0 [ 2127.013051][T17989] ? __might_sleep+0x95/0x190 [ 2127.017730][T17989] ? ext4_rename_dir_prepare+0x460/0x460 [ 2127.023455][T17989] ? memcpy+0x46/0x50 [ 2127.027616][T17989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2127.033876][T17989] ? ext4_init_dot_dotdot+0x39c/0x520 [ 2127.039265][T17989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2127.045862][T17989] ext4_mkdir+0x6c9/0xdf0 [ 2127.050216][T17989] ? ext4_init_dot_dotdot+0x520/0x520 [ 2127.055944][T17989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2127.062181][T17989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2127.068514][T17989] ? security_inode_permission+0xd5/0x110 [ 2127.074244][T17989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2127.080685][T17989] ? security_inode_mkdir+0xee/0x120 [ 2127.085984][T17989] vfs_mkdir+0x433/0x690 [ 2127.090237][T17989] do_mkdirat+0x234/0x2a0 [ 2127.094566][T17989] ? __ia32_sys_mknod+0xb0/0xb0 [ 2127.099416][T17989] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2127.104876][T17989] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2127.111047][T17989] ? do_syscall_64+0x26/0x610 [ 2127.115725][T17989] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2127.121103][T17989] __x64_sys_mkdir+0x5c/0x80 [ 2127.125800][T17989] do_syscall_64+0x103/0x610 [ 2127.130392][T17989] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2127.136291][T17989] RIP: 0033:0x458047 [ 2127.140288][T17989] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:43:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\a+\x86a\x957s\x16FA\x00'}}) 13:43:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000002fc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2127.159891][T17989] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2127.168303][T17989] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 2127.176347][T17989] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2127.184321][T17989] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2127.192383][T17989] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2127.200438][T17989] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:12 executing program 4 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2127.271288][T18002] hfs: can't find a HFS filesystem on dev loop5 13:43:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x14400, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x800, 0x70bd26, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x73}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000080}, 0xc800) 13:43:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\t+\x86a\x957s\x16FA\x00'}}) [ 2127.350098][T18002] hfs: can't find a HFS filesystem on dev loop5 [ 2127.474471][T18016] FAULT_INJECTION: forcing a failure. [ 2127.474471][T18016] name failslab, interval 1, probability 0, space 0, times 0 [ 2127.510532][T18016] CPU: 1 PID: 18016 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2127.518554][T18016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2127.531957][T18016] Call Trace: [ 2127.535258][T18016] dump_stack+0x172/0x1f0 [ 2127.539604][T18016] should_fail.cold+0xa/0x15 [ 2127.544213][T18016] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2127.550029][T18016] ? finish_task_switch+0x118/0x780 [ 2127.555235][T18016] ? __switch_to_asm+0x34/0x70 [ 2127.560003][T18016] ? __switch_to_asm+0x40/0x70 [ 2127.564773][T18016] __should_failslab+0x121/0x190 [ 2127.569711][T18016] should_failslab+0x9/0x14 [ 2127.574250][T18016] kmem_cache_alloc+0x47/0x6f0 [ 2127.579024][T18016] ? ___might_sleep+0x163/0x280 [ 2127.583907][T18016] ? mempool_alloc+0x380/0x380 [ 2127.588684][T18016] mempool_alloc_slab+0x47/0x60 [ 2127.593545][T18016] mempool_alloc+0x16b/0x380 [ 2127.598138][T18016] ? io_schedule+0x1c/0x70 [ 2127.602562][T18016] ? mempool_destroy+0x40/0x40 [ 2127.607334][T18016] ? mark_held_locks+0xf0/0xf0 [ 2127.612098][T18016] ? __unlock_page_memcg+0x53/0x100 [ 2127.617387][T18016] ? find_held_lock+0x35/0x130 [ 2127.622154][T18016] bio_alloc_bioset+0x3bf/0x680 [ 2127.627018][T18016] ? bvec_alloc+0x2f0/0x2f0 [ 2127.631525][T18016] ? kasan_check_read+0x11/0x20 [ 2127.636478][T18016] submit_bh_wbc+0x133/0x7f0 [ 2127.641163][T18016] __sync_dirty_buffer+0x111/0x2e0 [ 2127.646283][T18016] sync_dirty_buffer+0x1b/0x20 [ 2127.651214][T18016] __ext4_handle_dirty_metadata+0x237/0x570 [ 2127.657115][T18016] ext4_handle_dirty_dirent_node+0x3cf/0x4f0 [ 2127.663097][T18016] ? __might_sleep+0x95/0x190 [ 2127.667776][T18016] ? ext4_rename_dir_prepare+0x460/0x460 [ 2127.673419][T18016] ? memcpy+0x46/0x50 [ 2127.677930][T18016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2127.684185][T18016] ? ext4_init_dot_dotdot+0x39c/0x520 [ 2127.689567][T18016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2127.695905][T18016] ext4_mkdir+0x6c9/0xdf0 [ 2127.700252][T18016] ? ext4_init_dot_dotdot+0x520/0x520 [ 2127.705619][T18016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2127.711857][T18016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2127.718099][T18016] ? security_inode_permission+0xd5/0x110 [ 2127.723828][T18016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2127.730081][T18016] ? security_inode_mkdir+0xee/0x120 [ 2127.735368][T18016] vfs_mkdir+0x433/0x690 [ 2127.739618][T18016] do_mkdirat+0x234/0x2a0 [ 2127.743950][T18016] ? __ia32_sys_mknod+0xb0/0xb0 [ 2127.748891][T18016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2127.754353][T18016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2127.760415][T18016] ? do_syscall_64+0x26/0x610 [ 2127.765088][T18016] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2127.770374][T18016] __x64_sys_mkdir+0x5c/0x80 13:43:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") accept4$netrom(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:43:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\n+\x86a\x957s\x16FA\x00'}}) [ 2127.774962][T18016] do_syscall_64+0x103/0x610 [ 2127.779551][T18016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2127.785535][T18016] RIP: 0033:0x458047 [ 2127.789428][T18016] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2127.809117][T18016] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2127.817536][T18016] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 13:43:13 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x600000000000000}) 13:43:13 executing program 1: r0 = socket(0x10, 0x803, 0x0) capset(&(0x7f0000000000)={0x400019980330}, &(0x7f0000000080)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000030c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2127.825512][T18016] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2127.833826][T18016] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2127.841988][T18016] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2127.850061][T18016] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:13 executing program 4 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x13, r1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x157) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f0000000100)={'syzkaller1\x00', 0x3, 0x2}) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x40, 0x400000) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000200)={0x1f, 0x2, 0x80000000}) read$rfkill(r2, &(0x7f0000000080), 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r3, 0x0, 0x0, 0x0) [ 2128.066335][T18035] FAULT_INJECTION: forcing a failure. [ 2128.066335][T18035] name failslab, interval 1, probability 0, space 0, times 0 [ 2128.093757][T18035] CPU: 0 PID: 18035 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2128.101874][T18035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2128.112149][T18035] Call Trace: 13:43:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000100)={r0}) recvmsg$kcm(r1, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, &(0x7f0000001180)=""/129, 0x81}, 0x10040) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000001280)='./file0\x00', 0x4000, 0x62) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000080)=ANY=[@ANYBLOB="0300000001fcff7f00ee"], &(0x7f00000000c0)=0xa) accept4$netrom(r2, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="12ca30742f3d1d2fc82e5cac85ca844739f1a8473615354ec54ce975ec21f4dfd72ba0495b39c68409d0e53c47466006039693b1b1792fa9b551f87ab4073897e319fffcaf58b83c98a6717c456c0be6b7435aca14d19969083402cdb578336bc5c104d66611e247aeb94db1f078c6f44343152ac8eecf370d6250c19b806ab7f76054b455a42d5de2964c7a634178686d8ee936193fcb5d08b3d2a4003ece4026e91d8b697dfde1e195c55d60bd8fea2d234f88aa5370c24f83c106acb0fb61684b604423703b946d403f74", 0xcc, 0x200000c1, &(0x7f0000000000)={0x2, 0x4e21, @rand_addr=0x6}, 0x10) [ 2128.115470][T18035] dump_stack+0x172/0x1f0 [ 2128.119848][T18035] should_fail.cold+0xa/0x15 [ 2128.124479][T18035] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2128.130302][T18035] ? finish_task_switch+0x1f0/0x780 [ 2128.135523][T18035] ? __switch_to_asm+0x34/0x70 [ 2128.140390][T18035] ? __switch_to_asm+0x40/0x70 [ 2128.145177][T18035] __should_failslab+0x121/0x190 [ 2128.150145][T18035] should_failslab+0x9/0x14 [ 2128.154664][T18035] kmem_cache_alloc+0x47/0x6f0 [ 2128.159436][T18035] ? ___might_sleep+0x163/0x280 [ 2128.164541][T18035] ? mempool_alloc+0x380/0x380 [ 2128.169321][T18035] mempool_alloc_slab+0x47/0x60 [ 2128.174179][T18035] mempool_alloc+0x16b/0x380 [ 2128.178760][T18035] ? io_schedule+0x1c/0x70 [ 2128.183370][T18035] ? mempool_destroy+0x40/0x40 [ 2128.188122][T18035] ? mark_held_locks+0xf0/0xf0 [ 2128.192881][T18035] ? __unlock_page_memcg+0x53/0x100 [ 2128.198066][T18035] ? find_held_lock+0x35/0x130 [ 2128.202836][T18035] bio_alloc_bioset+0x3bf/0x680 [ 2128.207676][T18035] ? bvec_alloc+0x2f0/0x2f0 [ 2128.212358][T18035] ? kasan_check_read+0x11/0x20 [ 2128.217216][T18035] submit_bh_wbc+0x133/0x7f0 [ 2128.221814][T18035] __sync_dirty_buffer+0x111/0x2e0 [ 2128.226921][T18035] sync_dirty_buffer+0x1b/0x20 [ 2128.231681][T18035] __ext4_handle_dirty_metadata+0x237/0x570 [ 2128.237576][T18035] ext4_handle_dirty_dirent_node+0x3cf/0x4f0 [ 2128.243634][T18035] ? __might_sleep+0x95/0x190 [ 2128.248397][T18035] ? ext4_rename_dir_prepare+0x460/0x460 [ 2128.254018][T18035] ? memcpy+0x46/0x50 [ 2128.257986][T18035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2128.264217][T18035] ? ext4_init_dot_dotdot+0x39c/0x520 [ 2128.269598][T18035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2128.275842][T18035] ext4_mkdir+0x6c9/0xdf0 [ 2128.280199][T18035] ? ext4_init_dot_dotdot+0x520/0x520 [ 2128.285572][T18035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2128.291889][T18035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2128.298140][T18035] ? security_inode_permission+0xd5/0x110 [ 2128.303864][T18035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2128.310094][T18035] ? security_inode_mkdir+0xee/0x120 [ 2128.315457][T18035] vfs_mkdir+0x433/0x690 [ 2128.319689][T18035] do_mkdirat+0x234/0x2a0 [ 2128.324011][T18035] ? __ia32_sys_mknod+0xb0/0xb0 [ 2128.328844][T18035] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2128.334308][T18035] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2128.340374][T18035] ? do_syscall_64+0x26/0x610 [ 2128.345246][T18035] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2128.350540][T18035] __x64_sys_mkdir+0x5c/0x80 [ 2128.355136][T18035] do_syscall_64+0x103/0x610 [ 2128.359734][T18035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2128.365729][T18035] RIP: 0033:0x458047 [ 2128.369615][T18035] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2128.389289][T18035] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2128.397700][T18035] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 2128.405745][T18035] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2128.413801][T18035] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2128.422013][T18035] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2128.429971][T18035] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200040, 0x0) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000100)) accept4$netrom(r1, 0x0, 0x0, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x60000, 0x0) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000080)={0x0, 0xfff, 0x80000001, 0x1, 0xe, 0x5, 0x0, 0x101, 0x9, 0x6b}) sendmmsg$alg(r3, &(0x7f0000001d00)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="aa4a9794a72c4a6838d542a1e4344a06fd6d167b9b89a0ed347e88bb999aa253c10b24f32de2bc2d87a84505827923973b807fb00d0b746c59ee5b6cc58ebfcbb8d532c77c4d764038afef47a050aef8a18275f82891f1e17e8eb0b04492d99fb7d3ed4b2a", 0x65}], 0x1, &(0x7f0000000200)=[@op={0x18}, @iv={0x80, 0x117, 0x2, 0x68, "ab29557051fd26460526fec337d3796ca3bc4ef4453d6a6928fede230a5244354cdb6b3db98b518f58d90ab9e1b3ce9bb137491121bc6fc69b8b0adfad64fca0ca8a390edd099eb3a2c3337fd9ead8d2253f780a86d81aa15d6d6dba765fd846ccd1a208c2684d49"}], 0x98, 0x4}, {0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000002c0)="db162f12c025a6c92f9d09c775a1000bdc8fb200b2ea2683c56af0a271bf11949c1c23a6abe633ab347fda7120b3749307f71d5e2b748459e11d78b619821053e6e2029c8f687718d4c8e4f45f1eab24a7476b398de8bfc31b5af77eb223d8e834fa33b845a2578558ea0ac57eca58722952773388342e84937a041839b9b62da34f2a715cfdb6a3826416c126d987590485dec3f0c7d4dc5d5155ad4dac3c69b96dc4d6da08f5879bb97ca2f195b50fb91d208f6dadabf9525e181dee685af808f0dc", 0xc3}, {&(0x7f00000003c0)="b23bace34287b7c29563610f9807a00cea931624365d5070b38062d136ea0a3f71e913e7e7a3bb6e5818119a911dcd11729682b673b45242c096483c9816fda9e01e84f0ff3dcc4309a2533b88931e899a260bb2f95d6267ef2978ee27e41af4564d89f0e90dd9c8a7bf0940b99afad4c6ca1cd22659f9a7d80574b5a3f02eb10659fa2dba2be7ff12a119fc8cf33c5916f44064cc31ed4632cf000bfd28798a51a843e791b989e0669fda0a874dda26a662318ced8e71e375a309bef9a47ef06d03c6345e386240b723431eeab3114931342c3efeb0647a9b937df8b2c07f1e4e7c2262d3ced1e5e8bce86a7acf4a4762e3e2077f0a62bd4d", 0xf9}], 0x2, &(0x7f0000000500)=[@op={0x18}], 0x18, 0x20000000}, {0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000540)="9aee7840eb5c27d46157796951ac3a6b973a531020d6a2ab8c56d95fa9b84188e73185761011ab1e7635dbfbd5608ed65a387a9a9560d97d0797780c71b47951a14e3839f78ea9e0f19bdfbbda9c4daa508d4f36b21591a6c15f07bab3b2fd04edb9a7f810bc6fc2f8b19acdff81", 0x6e}, {&(0x7f00000005c0)="147524388a8c9cb8d2eda5d616bd65587cfafe92bfcf2fc8bcc3edb7490e4c18e3224592492b41d2ee520f5fb30bb012a00e1613338a02789a7402bcfdb133340dd2dae20bfd0d42e5777c9a261c2519024a4e203feb77bb73939e0646bb7a1c896106fd10325dce0f9e42dae93240a93fe26a", 0x73}, {&(0x7f0000000640)="85f1aace1cb71c23c071a2cdbacdedcdfed4ba2f77ddb9b423a2353179d5edb238228215ad2c9773756b5191fba5011e4eaee8b07eee2f6f2a326b17b0617584ef57c8c092cd6d8f1c91ddb820308cb49cb42c449419f5effc840631cdf8ae7ec8e6618f81fd4e5e864b538ae51c3a1661a287ff40ca72a4eeb63a20665ae873e11775df6a8bea9c08435ea2bae0f8602b3050caab67919f1850e5abf8daab3edfde786836e16e2cbb0f399a7fee91fd9c73d15f162940dc2cd6b2092df78ca78ea8c217cafd869726a469ed9706fc4063ca1f5a7e437598ab07fad8eead0964", 0xe0}, {&(0x7f0000000740)="eaeb313e174bd6205c457cda6bd277cd14ad9a9339f8d4327ea16a", 0x1b}, {&(0x7f0000000780)="a301df9f4ed812abcafae7255267d36965584aa8263f6afde71705fe47ba7c3e", 0x20}, {&(0x7f00000007c0)="3835d75e32131038f8ae33251579d9a659cc174b84bf9c86bd39a3b282c8497b2e77a0f0ee4981e73a12344355d53f85a9fd473cda63f3c09a28b097165a02b78615b363f6a96a611a66f7174aaff03efc8216bcf974c3947542440e77", 0x5d}, {&(0x7f0000000840)="50ed04de3b28094a403cfd93ff38f0d58823cd738439c9d5b3cc8b17d6600b4ca00bf668fa51cb7f4158b42945765685daea5bc0ce0a4872910e9871ee37528c39b376ea2cba25e9bb43883369edb07ccb7dfb8b84df4c62fe5476bf381564ec5a008eb40bc07d1e107839a61cc9a1c1c102efa470c7d11eee044b0a338f3bbbccf6a8df51dbf67710eb960a140ef6103e525a88244bd811fb58dc6a4b04da5b06a6d8729e0bb9f2e80944c8bf2358c6f85e52fc78355e5f593899abe0880d77ac9f8891670e21a383cd6b018092678b5617a9e0992d2bebbe54f3ba35ffa35b3dc52008ae7c31ae8e87f5ae6bd18979", 0xf0}, {&(0x7f0000000940)="d7062bdbe43607183039cdc49e6b94f58c274a05be39776192bd60689bde805c2f10a740b9acb5c0ecebc8f883a2f5b2ea0561f2ea06408028cb03a5a06695fbf2ec00839978efd77c0fa705d7822948e10b21942d8ecc24f91476379357ac5764a066db8b44a4b6694adecc1b07b61904cfe3820642f6b4a2f089e01054eb9fa705f16b75f9bcb619849532d7a2302eabb3a962500c7f02e77d05ee52e40cd3d5b504e4246f9c9324b2d625c10ec5e9802d8d397018f89840346a5e589e7b3e837a99e3a89ff16e3c7d", 0xca}], 0x8, &(0x7f0000000ac0)=[@op={0x18}, @assoc={0x18, 0x117, 0x4, 0x7}, @iv={0x80, 0x117, 0x2, 0x6c, "23ae9dba1240d880669a8cc30d4c0f8ca4827106d92f2954ab9415503e25275d1f8e4a4c827c2f1eefc6822ff548043390b52fc1af6b9ffdea1764d3926a2d2da913731d6b82df7a4cc4d0c2f7dd29e35a06dc96127f704b78928f7acbe1f915c22b4ea280ea328c4df9218c"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x78, 0x117, 0x2, 0x61, "9dff6f06212cffe6025a99e54155cfb50970d3da9cb2316687805c8a938da9b11bc84138b6a23ab3543ed4299e3d98b936d2cd0d8b02fbd6801c4b5399f8d170acceade5fc90db1a0dc2fef0fdb5fb1bf45ea5f1f11fcf9228055af6008fdbeea0"}, @op={0x18}], 0x170, 0x40000}, {0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000c40)="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", 0x1000}, {&(0x7f0000001c40)="56918346f57e20356604887404e7487d2074fc2b58d06cb57444f49c50571b423ce5b7dd96920ae92e6b34b86c49fe37d1df8df0cd3b30b96262b2bed547e2b8e6044d08ca904c21267f98d5f5285a82f9af18", 0x53}], 0x2}], 0x4, 0x4000000) 13:43:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000031c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\v+\x86a\x957s\x16FA\x00'}}) 13:43:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2128.545253][T18043] hfs: can't find a HFS filesystem on dev loop5 13:43:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x80800) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) socket$inet(0x2, 0x804, 0x6) r3 = socket(0x8, 0x6, 0xfffffffffffffff8) ioctl$IMGETCOUNT(r3, 0x80044943, &(0x7f00000000c0)) setsockopt$inet_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000000000), 0xffffffffffffffbd) 13:43:14 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x700000000000000}) [ 2128.790986][T18066] hfs: can't find a HFS filesystem on dev loop5 13:43:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000032c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2128.844546][T18066] hfs: can't find a HFS filesystem on dev loop5 13:43:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) setrlimit(0x8, &(0x7f0000000040)) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000000c0)={0x7, 0x800, 0x5, 0x4, 0x8, [{0x5, 0xc2b, 0xc162, 0x0, 0x0, 0x1000}, {0x7d7, 0xf19, 0xff, 0x0, 0x0, 0x408}, {0x7, 0x8, 0x9, 0x0, 0x0, 0x400}, {0x1, 0x1, 0x7, 0x0, 0x0, 0x3008}, {0xfffffffffffffffc, 0x9, 0x80, 0x0, 0x0, 0x1000}, {0x0, 0x57d926a4, 0x8, 0x0, 0x0, 0x4}, {0x3, 0x2, 0xdf, 0x0, 0x0, 0x2}, {0x80000000, 0x7, 0x3, 0x0, 0x0, 0x909}]}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x2d, 'pids'}, {0x2f, 'io'}, {0x2d, 'rdma'}, {0x2d, 'memory'}, {0x2d, 'memory'}, {0x2d, 'rdma'}, {0x2d, 'rdma'}, {0x2d, 'pids'}, {0x2f, 'pids'}]}, 0x38) 13:43:14 executing program 4 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:14 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x800000000000000}) 13:43:14 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) pselect6(0x40, &(0x7f0000000000)={0xe4, 0x2238e814, 0x7fff, 0x8, 0x4945, 0x10001, 0xca46, 0x2}, &(0x7f0000000080)={0x2, 0x3, 0x8, 0x10001, 0x4, 0x1, 0x8001, 0x9e32}, &(0x7f0000000040)={0x3ff, 0x1, 0x0, 0x3, 0x5, 0xffffffffffffffff, 0x5, 0xfffffffffffffff8}, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={0x80000000}, 0x8}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000002080)='/dev/vcs\x00', 0x402000, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f00000020c0)={0x0, 0x7, 0xfa, 0x3, 0x1, 0x9}, &(0x7f0000002100)=0x14) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000002140)={r2, 0x9, 0x1, [0xfffffffffffffff8]}, &(0x7f0000002180)=0xa) accept4$netrom(r0, 0x0, 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x5, 0x4000) ioctl$SIOCRSSL2CALL(r3, 0x89e2, &(0x7f0000000200)=@null) 13:43:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\f+\x86a\x957s\x16FA\x00'}}) 13:43:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_setaffinity(r2, 0x8, &(0x7f0000000080)=0x6) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000033c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffff9c, 0x10, &(0x7f0000000000)={&(0x7f0000000080)=""/125, 0x7d, 0x0}}, 0x10) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x100) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000001c0)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r1, 0x4) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r3, 0x0, 0x0, 0x0) [ 2129.131445][T18088] hfs: can't find a HFS filesystem on dev loop5 13:43:14 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl(r0, 0x7f, &(0x7f0000000080)="4f2e442653471cb17ca35a434d7f2a52d1b18745ac20b8f54f665a0a256c86cc618dc615bee9e8bbf4e885822b98585ffca7c095d8b13dd3f472fa3740d958654c77b9b5d580d32b4f966fe04d572b536b51343308daa4e765123ff3acfbdcf1f670a7df360faae8f3a4ccd5396c1ff4175f8ad8bc4761aea51e5385e064a2f0f861e7b18599afe316771a30ffbd5e172539294f220708b72595010a0b804b92300d63bf3ac07609d3") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") connect$l2tp(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @loopback}, 0x1, 0x4, 0x2, 0x2}}, 0x26) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) [ 2129.248200][T18088] hfs: can't find a HFS filesystem on dev loop5 [ 2129.259148][T18096] FAULT_INJECTION: forcing a failure. [ 2129.259148][T18096] name failslab, interval 1, probability 0, space 0, times 0 [ 2129.288857][T18096] CPU: 1 PID: 18096 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2129.296884][T18096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2129.307036][T18096] Call Trace: [ 2129.310336][T18096] dump_stack+0x172/0x1f0 [ 2129.314687][T18096] should_fail.cold+0xa/0x15 [ 2129.319404][T18096] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2129.325217][T18096] ? ___might_sleep+0x163/0x280 [ 2129.330072][T18096] __should_failslab+0x121/0x190 [ 2129.335061][T18096] should_failslab+0x9/0x14 [ 2129.339561][T18096] __kmalloc_track_caller+0x2d8/0x740 [ 2129.344933][T18096] ? setup_sigcontext+0x7d0/0x7d0 [ 2129.349959][T18096] ? __bad_area_nosemaphore+0xb3/0x420 [ 2129.355412][T18096] ? strndup_user+0x77/0xd0 [ 2129.359919][T18096] memdup_user+0x26/0xb0 [ 2129.364243][T18096] strndup_user+0x77/0xd0 [ 2129.368569][T18096] ksys_mount+0x3c/0x150 [ 2129.372810][T18096] __x64_sys_mount+0xbe/0x150 [ 2129.377486][T18096] do_syscall_64+0x103/0x610 [ 2129.382081][T18096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2129.388140][T18096] RIP: 0033:0x45b69a [ 2129.392036][T18096] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2129.411809][T18096] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2129.420213][T18096] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2129.428188][T18096] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 13:43:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\r+\x86a\x957s\x16FA\x00'}}) [ 2129.436174][T18096] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2129.444138][T18096] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2129.452107][T18096] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'hwsim0\x00', 0xf}) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:14 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x900000000000000}) 13:43:14 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000000c0)=""/241) bind$x25(r0, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readlinkat(r0, &(0x7f0000001980)='./file0\x00', &(0x7f0000001c80)=""/220, 0xdc) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendto$netrom(r2, &(0x7f0000001d80)="ac102d5a6afc35d8baef893c0ec5e1354b4588e62b93603037db3ff983603a8c2469cb28dca482c09082df405ef724a9bb691c686571e58450ee09a08e8e06520afa34c2b7457738e89d2f759fb73726718c23752db5889904a3091976d570b857040b34f77fed7969f4718ceaa13c8820064144a21788e22b9a63ad085a50618b8c3fe6b2e02ee1527f9e33a7fe92b3155638cdb6211722e7b1839b6383dbac5b1fde9151e611801cd4546b7966764e9aee31bcfb5b200db8abce1f6e9641ad2e72a3633e201cd5d8b30da9f5917ac5f948111448c8ec713e613c38a964c97de35c78f935b77a44dc08a6", 0xeb, 0xc0, &(0x7f00000019c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast]}, 0x48) accept4$netrom(r2, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000001e80)=""/49) sendto$unix(r0, &(0x7f00000016c0)="d00cf67f564fa35a9914dd4f82f8c23ea0db9c7e789b0bfd289c04fa2909cb41f9ca917786b459efb57c0a18dc7267e38672855fdec877b675a61ea473a05b81c85f5eb336052d89cc4c327facf88043cd7055b7ba3dca995ae93a82b81e4eed05fc1e6eabc3e018b5c8c9c77fcd9a26babb10044405b8d85696047d76cac4d42f03c9e61ac5f7a15731965ea420d059333712014b8be6102c21dfda79471c9f822e4bc6525d08cb1a4796b41c28", 0xae, 0x0, &(0x7f0000001780)=@abs={0x0, 0x0, 0x4e20}, 0x6e) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000001b40)) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000001a40)=0x7) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000001b80)={0x0, @in6={{0xa, 0x4e20, 0x8000, @mcast2, 0xfa4}}, [0x1, 0x9606, 0x80000001, 0x400, 0x400, 0x9, 0x89, 0x9, 0x10000, 0x2, 0x0, 0x40, 0xe4, 0x8, 0x9]}, &(0x7f0000001a80)=0x100) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000001ac0)={r3, 0x20}, &(0x7f0000001b00)=0x8) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f00000001c0)="27337551827ac1e21f38b102a6e07652aecf28ecb59bf2ef11cf20cac249af7f478a9ca0269f1c09e1097b4165e509f86a92ae6a6f5d27adccbf9b29d1f81564f294df584a60ac3990410a36ec4f491fd8d4d74663c27a8a15cef73dcf4061829dd8b7076da0bf4e066283f9c54153c5ccdf38c76a40a479f17156c5e49c37c1f03ef5e24fd9d703db6cfc51c43ade6f2e0e15d870cbdc37c93a75a31c03a239d2f131a4e6cec9970dcd9095fe3534edf9d0713133", 0xb5}, {&(0x7f0000000280)="6d199ffcda9f2853cc78e3d0eb3bd7a95381233824c4417566012796abf77edbe3a217ac11c580f84c79c428229474b06948a7eb2c32420f5cc532722135821f004841f8996c3d30445d1d3287bf629eb8be27077e91f1569adf110ce38c63f0", 0x60}, {&(0x7f0000000300)="1e4ca41747323cc0f628e6555552c48df611a50195839492663172c042897ade7069bf6803a782af4bd856f27dcd338a464db7cd8503c71268e352fa24fdad7d1474d01285e37037245ae77e119e1818065dc573137065128f53719295138bfee60a972e37ce715bd2dc85ab027b9878b7a52fcd8067c4b8004bf6c6f8af6f183680ae74e1d4b184c36a2fc30c8f8822e919962ce2c7a0cb7b2ed355f10d8185a264fabb240c9d9eb2a42228b27d8e89c00c84ac85769faa8a70d4b4ddb9961c02f92a419a6bbe7e38b248dde7f299efd2db10680bb6cc5429eb90112d095ae800840b46c66ebd4a9da9914d9094f3a2", 0xf0}, {&(0x7f0000000400)="7af65538acb8a30477136b143a99397f883a30c68a8ab83e7b1ac64e3428b56dd427af7eb4b3a0238cbf0f1c0f22e5ca7144810037a7b3e96d800f7d2c02307a8fcaf4823903f802cabc08855a01f4676cf5b8791894e2a534195cafaf24f4ea23c1550c5dedbf4dd690e0bfe3db4f0c44ba9d0d06382e707a749e8ecc63cc138f98ca7cdbcb30043277c216c14ab0ba93c014461d0360f72f5739b9a60585cace4cb6acf7e885e4b9d8da86c5f1297a18cabb7fa8391cee225b53917b4ae4b8bf8704446509f3499c1a24d3546e5d44469dc36c82fa6347d78f4ab6e8e03cd79a6fa88197ee048e80a721673c0b", 0xee}, {&(0x7f0000000500)="3bfce7713af8b5281efa99efe736b8f84096dfef7d2c04f1bbaa33ef7cc7a841466f380897f47aadca958f4d5e5d7af4ee3c575d3682371a5fbdddfa46ed366620a074a7d64815d3f6", 0x49}, {&(0x7f0000000580)="3c5528dace0ab37359dc35096ec85075c66e6eaad42812b5c0c35ba1837b308dd893e6bd07d5c985fc214696826e4dcefbc90c3155fe160286d315a228546db5f58151a1c84f307337aaeeb303ee7dfe36223517371b7ac7b321228200ab4d5c0f017e3f978826af01555a1c2d04b7ce1ad5974fb2bdedd052cf04f558f1f38c23b69c8e892fcd0efcaaae8335e6517885e112f08df86017418e9e4c17b39c8bf99e2bc5ae617c6ccdf0293f87fe62ec698fb0b96e212d44011ec79a0f2f445055a1026111dcc8639f0e4da636a0803c54e1f1dd05de359294a055b76f4a33f4fc00732db8e61ac2786ba8576661b19146889f155fadbb900f7f5f1e0cf8acafd65656411cecf49e93665942dc50efb88c479bee488b54501dea2ac69d616b78f5b4e865ff0cd4cb58c43a6e0d98b6c9c6581b21edce60533e3b9d605cd0a27684699d33e1d3b2c9a2a95fd4b24563909bbff29522c987d72721186fc3801b802fb0b2ff0cb9557dbfb6ecdf8b85054f51776e73f811a1bb91a68a7479dcb3dbc204f859a5be1ada90a0a694d517d4cfdc2ffb572b9636053c6d242222c3b3b5459871abba09d32b4845c0150f2e75e63bb431ebd9f57f80cdc51f807940a46771335dfc6f1a1916c9e6d7a07595f5357ad0bacc1c9084017f8d31a8fac71bca200da079e24a433e85dd3d6fdb429ea251414711f125681426c04338a21c4992cd1e230ebee045a9949dff063f7435b88555a0923e045e2f96488f773d763fd6ee443fdb84287bd27c21dce670d051e73f9df62fd438156cbfd37205049ce51527414c0a5d452b96d67555fc1d39cbe963bacfbdd3567a8811b87d56db6a4d9fe5c39ac0a0d63de0b45d2a863813f6e1ef9e5b87281e6f16401b58705bbb12dee238347549c1979ddcd73c0ce2c6abafa4ce364d57bbc1a1aea542cfe843cdc9502dd0c4a65b0a6db02b2028109fc2e9d87aafa8c734d1874d6ac8c0c05c8a84e7b9f4c97400a480d527e14d85300fbe3c098310ba5deb6ce5cedc2f91682118ec175e44fcea9f80ab2d11668f4c40a0ac33fd2d71426284cc232a552377ce98407d06f5726e9235055000ca370408b2217dd89130eb2547c85c380e3684c58a5987b6b26e0667fe3ee3efc518bdb294b7e02245b9baba0f72d2d94b30a4c44de8b3cbaf16effb8ed8682bd866b62e2c9dc656acb818d63a15359462f4cae9a240bafceba9c8f40def6bfa59a6ca22d9e681b2e24cf4265acbde23c7e8a38cec95d8035b94fce9c7db7a8966081185d836fe592243a915d6d8793798dd853d2f18410217210985644a0d79f5144cd4688943c3f38d2d33318ec99ae3a92c1ff29a8b7abb621db1903e39495346c6abdcfc562decdb15bb35265f9c5b29380bd2c3356228cfd4387b0c8c62b2476537fd47e86e8ada32f0dcedd050332a420185391ddeb737456eaaca8c393983985e0a4d7268dfeaf2ee5ffb25d0790bdc6c7ae67e7a47ac4a02ef2d9ffcaea32bb93f5b1453d243f208e78c6f8be98d3388d2a15859058ffdf83fedb042b48ecf47168e2fc4bcd47e04214f1ba1cdf5b048fc4bc0d5158dfdc26ad8153cd4d629826ef7e04c3aef08f78b567ee238cfe6a1101e265d370bc8c7a37ca7c49498398acb898c07d893aa68a89a4d7f8e02ee26ad1a8208b6676f40eb4b2e7555d2a96ea0eae7fed56e9b92971cc764555f61ecb92c230363c9ca0de78fb950d2f7a00d0e90f512a2dad133f2ab97a9a40e58a48e1430cb77ae72b2980d636c7e22d5e8b0a0f982bae49076e6214f5b4bf6142f882b18ac14e6e49fa0070ef961d3ec2cdaffe9c6a6ec08cdbb14924dfa950e1d46c4413cdde08e72c487dd7256aa1a9ba983698f34a598b6e7bd0acf8e17c543a657ba584fbde273b3159dd51b36cdd334059e86cb48f181c4631705652c5c6887939424372b67b409714fe5d8d1fe63697a23520601b2448ac7112372589bb4dcf5ad93ba415706356e4544fbf5817a59f0416c17f1c5d8397655f2f5385c86727e543b1ec78e394011c526e644311bc474712fc1cf3ea95621e0906a1fbb4bae5be6d3a89d63a9810216210a1f813bd33adf065058f025d8c6b3803875848ca3e69450a79fc3980e6d35fdb2b69431da8c6d530f21c3488b1145fb49035f0400f1a311a3c36af4c0f49b446f97ca7db8cbee0c394219162e69a1f2a28df2dfc6657aa528c39e990cf55ee594c041ea199cf22e17f29bc4992323389c8eb5ec5edee5925e09de13c3731fbc16f44ec38b8ec5443382adbf618365d0005d38520c52e456bd10b69c4c519d5088fd8b67b5fafc740e2919c7af2f42c9f1b53e7849e8f46bff5003a1722ac3bfc79e12db10f04980d6ac493e92a4fa2fd22e7d541bb14a46fb14e905c5eab80a81c47f7315a14211109dcbb0885cb2931b968c2d66854a86bcbe92a8826b5eb46794a12a438fa721c3b095eeff00e54ff0f1c09259fa971611191f94a1808b471872ff4f152fee6ce451086c335cedc400a0dd414b5d9524bb7e61ae94b9879acef27200efe8f0787f3f5602108858f0a4d18483a9dccf52d6044f01a5e7b974e9439b0170bb781d7ffaf69045a39f03f4ec65d0fe4a6869dc8aa533d1fc90a25a7177668d5761a077ee7fc43512cf6ab22a23d7eea43bda2a18224ec66f7cc6a3ed8a1252f5188a42c6de71b1df9f98e6961bd12bf636d9549d9bdd4f8ca198730b50e7fbb27729119707eb5f7cf952d68ce2b832ca49993db920fd532f7a15669f02b25aba37158fed96ad69ddef1d37de2c0707aac5793c7751d522d7428b6419f9f6a78ad850876f021c6f938ed00c02497d1ff12262621ab6ca5c4545e044726b1a839b66ae07d7f1590af772807f75f971ce6a6b0d34728a497df982d30831bba1b6bc8c56f3f928b8d0744af1ba893e215bd5bc9816e2e9d80427a9630f250d57be88e31faac72928c75868f2e96dcf3fe8040c1fbc429305fe7ba051ba881e3f5c6c9d778b9fd3304516f8d9a6b976785730690563e1e240b9d0573f027da7dca2ddb0751c442e50b768611f5396cc5077cd9b414ee060ea670fc533592881346d1d244eccf061350173c53d2729f8afc5e145d533efabca5f7e390f4625506e47f70e7d1beb788180b8007a739ef20e043e10f526458ae2ff062e781bc245e101041fd4a3563e010464a13340a29142de9cf6d7a18a1175463353556f1ede596e6971f80fac58496f5774170ec2c787cbcde161c2f1dcb743c201f445ffe90e13117b7baaff2313a52f8c9d6a955f22270043491485a2aa232e28b2865bb381b003f67f49abd0e8d9ea769a54d0b86651559ff438c95bcba853a08164e8bde56fd771f071c5aec661eb3fa1f297ca699df29059f6ed4e68eaccb1c6cc18b9656147a9e844bae3f3c811c0fb11860051b9712f87796c45d43871dc4b62ef983c0cf0ea1a3c4471a68d0613b91fbef9807fd68701d87124333191151faf9e8f86072781bcc3b3b4e0dd2ee9ec396afc3e1283d239953d393ef0fd7fa467fdb145041dc953bb04b73bc29e9e150e369370d838de74723f338d8ea6fd143f918a8cf555c5076fa87570f13f862ae251d61024b802afb22fa9ac78e96ddbb71074214202e2704f599f459432e039d27206f1b9d98bb8f2fcd545eae8bbf1b6638b07adff50cab817a2123eb2ff35b4d0d9d373d3655999ff762d2e1ecabb0dc0ea3b02b704a7cb2a2266c21bd320f75e5a8c4fdae4a563fb0e2cc0e3be48d3ae388026294884521ea51edc35be6b4f0b3a153b1de0c0cb2d92e81b7275cf211eddbeda9c91da4ea3950d2da164c5b9322e8141180fa75ccf4a6f212e58cd423dfe56ec1c4d12a0aba26a49296bbcd92617e6b7702ce59ea6f36db0356deb69e1469f1cc3f8ef7dc38ef0a7521dd23a344e29129f5f17341cee1e4a87d1f83d906b018efd86aa64d474350054e4253d38404f6e3a2af9f61b73d4ee2a4fcc4f32c01e0833351e9a2ab02a657964e179a91f786053f809b6d93b9e4cc2aafbfb175408f5d8ad2e0e31fedaaa8b1bfb9448a669a3a3d7f155c98ce94691086e539329483de4cc7405f249e585a336d97dd447b609e319c798a8e16528c410191fe06c6e9dcb558fa5870eb45c4c8129de32d1608169735d0af5c9c94c05e745c7038cea18319d296b9c166bd2920cc9a0d9852f147990caa3a96f3e60cd23c9ae77179d58b209806c0b96ab5b61cf4a640da79b487d7644ffee138c37fbef38d5938b782e6158719f829abc7f71307e716932ff114c4a725cc398c762839e7fc1d3715a19fcba9b5ca5c27c245d40f0b63610ead716fe5f1c8907a5c7167393c4ccbe4776f0f6eeacabfb5103d81688374c71d2a1da6cca5cd368a127e41dccde2aef249529a6b40d6d14fe3cebd7b9328f882c41d34c206d42be8d80a8a05b8c1ed59bbf69aa469acb3a7e29ccbbebc02aa34e003f947ea3ae9fc1cff27eedeaf1f589b8ec54692037ee769809fde28b26d126472883478b7accf99c173e388c69397e5fd1342c75ad07077c4b3b9c15a0d700be7d8a3729e1c9448a9d4d1a898b1587e719205cf4c60f315a34ed1a27090366773d576d7c7a37578f1aaaa3f99d8ecec59001c962a50df0c2f5663f430fa8c6950f21239f316ab52ef441519d4f280d9ba2269815f1d1c569c74957b1f054b27329a4176ba615e4aa7d2a832eb48cfc0725289f0abef451ce33d24dbadbb376b7a3d594949f18ac8670c37f6a7deb8e9699caea8eebc410f444b758002d5301c4f541dad0fc8c5f850de315499d90172ac77eb1f4e177bfe164cddd93cc6d43d5e962a1620da029a978980b1e8049ab81355e2fa854d8043b33d3f7970a6a55dcb1f50b435cd53b384304f9fadf2fc7fef557917989547785b713d28032d3dd2136c389f602964d9984ba8e2f3fe814e48af1902972c64fe7c077caeed1411f6b00e0b805d62c38f66a4d0dfb9477a131ccccfcf48b2f94a3104388d5cafd0f3738ee0cbe2b6e59f6a93a2d42d0fac0f833388cc0b59d3d473bbee12b227f3d862c6dca42853032938c90f8cfc88dad647da91023025270467ac78f90d650d57a7d69288e1e4b2b4cbe6ba7e04554e2d70f1474162e5c971db6ef35e99d7dfcdae00c26ad26b3279392c4792b71876dfe7e909d809278b1bdc6fe9a4c5a87672d29269a3bfb873ed555f892a95214e433ccd80e4c5d5fa301bf01cf589053ea86ed00bb0211f600e858ffb222862eff7f83650379585a122610fc3688830c709a4a15c4d33716d51f25129ff056ce9346cc7d5d553080c01954707ab9d28de8547908953ec934964165ae61bce45bfa0bc06a01f0f44cc441f44cd834cdbabfcab5145777c085cbabe149cff20f485de06b6463b9c533eaa5314550ce19d0b83e836a626e8afa27db9555476d41a96656a789619051b68a6680a6b802d22f04ebbcea268b5b59e18bf01dc02c1fa415667b46cccd9b0f0d21b3fdafb6890ceaf1f833b3a681e48b8c5f088d8512aa199f017922187feb1cefddea76698023fb96a296fc449677232ee8492d4fd9568e8d56c831582f4d5671a7a2b26e5cc8cb8809616cae650ae514c53f6b4d441ee98451d88ea6c721ea459fb000df7688f3f5c15e35ff05b7e01f0a2646d4199a363819fb09a64bf7f73aed03a66c5e9aa47ca86ee06bf6592938b2608efb027e0e1eb3a8b1ea17cd6fc9155d466b263a38ab01cbad5ec62f850846ed47b86394b8b421468de1cc380b83beb3ca02c6ec6a94", 0x1000}, {&(0x7f0000001580)="655012cc6f5fc0748fb62eb542301394d435d9e1e7525f4419ae601566375f8f38bd8aadf4b48ea24c7a7461d1b7b8deb2baeffdf2ce79f38b2a2edc4e548804f83cf505b65be0407fb04a041d2a85f36944bf2bc64a4034af044f", 0x5b}, {&(0x7f0000001600)="cbbba748b17ea87fd6b93ff6", 0xc}], 0x8, 0x1) mq_notify(r0, &(0x7f0000001940)={0x0, 0x22, 0x2, @thr={&(0x7f0000001800)="fcabae5a50688887878cf37d636b9ac01c92ae75596aa6d8d06e5b0d5ed218ff4f38d88c6efb184462673f14577892adbbb6a4faa8b415", &(0x7f0000001840)="4df25fb17b4c118c050b05ac30980e4f25f97f968987a4917f3bb3e5e0fa44b38f05a076de926780815c956279290882a3743f9be45df04cf44df7ea0e1f28900c665283fb74efe5ee09c14bcbd7d2c1662048afae1f29a5d0fd3d387256d5ac1572e4ca5d5479caa7f6558e1b7b19460349bd98f860bd4a518f65fb0c49fed38c65bcefdb45343ccb02ba75d6dca5f26c41e40f49de826dd57cc62bbd35d7fdb0692a78952fa4dc204262ac546da17e9716b20a8a119088452604bfed5f5d73f0fcd7"}}) 13:43:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000034c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x80, 0x200) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@md5={0x1, "62ff1b1f22ca7e14ece79be4abed7f83"}, 0x11, 0x1) fcntl$setlease(r0, 0x400, 0x2) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:15 executing program 4 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000080)=0x240, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x0e+\x86a\x957s\x16FA\x00'}}) [ 2129.779522][T18118] hfs: can't find a HFS filesystem on dev loop5 13:43:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000000c0)) 13:43:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) timer_create(0x7, &(0x7f00000001c0)={0x0, 0x10, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timer_settime(r2, 0x1, &(0x7f0000000280)={{r3, r4+30000000}, {0x0, 0x1c9c380}}, &(0x7f00000002c0)) accept4$netrom(r1, 0x0, 0x0, 0x0) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x3, 0x8, 0xffffffff, 0x3, 0x5, 0x9002, 0x9, {0x0, @in6={{0xa, 0x4e22, 0x2, @loopback, 0x81}}, 0x5, 0x0, 0x2, 0xfffffffffffffffc, 0x5}}, &(0x7f0000000140)=0xb0) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={r6, 0x20}, 0x8) [ 2129.894477][T18130] FAULT_INJECTION: forcing a failure. [ 2129.894477][T18130] name failslab, interval 1, probability 0, space 0, times 0 [ 2129.927168][T18118] hfs: can't find a HFS filesystem on dev loop5 [ 2129.949948][T18130] CPU: 1 PID: 18130 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2129.957986][T18130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2129.968045][T18130] Call Trace: [ 2129.971346][T18130] dump_stack+0x172/0x1f0 [ 2129.975799][T18130] should_fail.cold+0xa/0x15 [ 2129.980417][T18130] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2129.986240][T18130] ? __lock_acquire+0x548/0x3fb0 [ 2129.991197][T18130] __should_failslab+0x121/0x190 [ 2129.996151][T18130] should_failslab+0x9/0x14 [ 2130.000757][T18130] kmem_cache_alloc+0x47/0x6f0 [ 2130.005609][T18130] ? ___might_sleep+0x163/0x280 [ 2130.010470][T18130] ? mempool_alloc+0x380/0x380 [ 2130.015329][T18130] mempool_alloc_slab+0x47/0x60 [ 2130.020214][T18130] mempool_alloc+0x16b/0x380 [ 2130.024828][T18130] ? mempool_destroy+0x40/0x40 [ 2130.029609][T18130] ? mark_held_locks+0xf0/0xf0 [ 2130.034559][T18130] ? __unlock_page_memcg+0x53/0x100 [ 2130.039755][T18130] ? find_held_lock+0x35/0x130 [ 2130.044520][T18130] bio_alloc_bioset+0x3bf/0x680 [ 2130.049546][T18130] ? bvec_alloc+0x2f0/0x2f0 [ 2130.054053][T18130] ? kasan_check_read+0x11/0x20 [ 2130.058913][T18130] submit_bh_wbc+0x133/0x7f0 [ 2130.063507][T18130] __sync_dirty_buffer+0x111/0x2e0 [ 2130.068634][T18130] sync_dirty_buffer+0x1b/0x20 [ 2130.073491][T18130] __ext4_handle_dirty_metadata+0x237/0x570 [ 2130.079392][T18130] ? add_dirent_to_buf+0x402/0x680 [ 2130.084637][T18130] ext4_handle_dirty_dirent_node+0x3cf/0x4f0 [ 2130.090792][T18130] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2130.096510][T18130] ? ext4_rename_dir_prepare+0x460/0x460 [ 2130.102695][T18130] ? current_time+0xd8/0x140 [ 2130.107389][T18130] ? timespec64_trunc+0x180/0x180 [ 2130.112607][T18130] ? ext4_insert_dentry+0x3c3/0x490 [ 2130.117818][T18130] add_dirent_to_buf+0x410/0x680 [ 2130.122796][T18130] ? ext4_insert_dentry+0x490/0x490 [ 2130.128001][T18130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2130.134247][T18130] ? __ext4_read_dirblock+0x3b1/0x980 [ 2130.139615][T18130] ? __ext4_journal_get_write_access+0x70/0xa0 [ 2130.145770][T18130] ext4_add_entry+0x52d/0xbd0 13:43:15 executing program 2: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x7, 0x200040) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000100), &(0x7f0000000180)=0x60) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000000)='veth1_to_hsr\x00'}) 13:43:15 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@loopback, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) r2 = getegid() write$FUSE_CREATE_OPEN(r0, &(0x7f00000001c0)={0xa0, 0x0, 0x6, {{0x6, 0x3, 0x4, 0x0, 0x4, 0x25, {0x4, 0x80, 0x7, 0x7, 0x4, 0x9, 0x3, 0x8, 0x8, 0x7ff, 0xf2b7, r1, r2, 0x1, 0x9}}, {0x0, 0x4}}}, 0xa0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r4 = getpid() syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x80, 0x101000) syz_open_procfs(r4, &(0x7f0000000280)='net/mcfilter\x00') r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r5, 0x0, 0x0, 0x80000) [ 2130.150454][T18130] ? make_indexed_dir+0x1310/0x1310 [ 2130.155658][T18130] ? memcpy+0x46/0x50 [ 2130.159646][T18130] ext4_mkdir+0x73f/0xdf0 [ 2130.163988][T18130] ? ext4_init_dot_dotdot+0x520/0x520 [ 2130.169371][T18130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2130.175609][T18130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2130.181859][T18130] ? security_inode_permission+0xd5/0x110 [ 2130.187665][T18130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2130.193989][T18130] ? security_inode_mkdir+0xee/0x120 [ 2130.199274][T18130] vfs_mkdir+0x433/0x690 [ 2130.203521][T18130] do_mkdirat+0x234/0x2a0 [ 2130.208128][T18130] ? __ia32_sys_mknod+0xb0/0xb0 [ 2130.213065][T18130] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2130.218528][T18130] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2130.224596][T18130] ? do_syscall_64+0x26/0x610 [ 2130.229269][T18130] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2130.235510][T18130] __x64_sys_mkdir+0x5c/0x80 [ 2130.240103][T18130] do_syscall_64+0x103/0x610 [ 2130.244692][T18130] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2130.250666][T18130] RIP: 0033:0x458047 [ 2130.254570][T18130] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2130.274261][T18130] RSP: 002b:00007fe511882a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2130.282682][T18130] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 2130.290669][T18130] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 13:43:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000035c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2130.298640][T18130] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2130.306617][T18130] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2130.314592][T18130] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:15 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xa00000000000000}) 13:43:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00!\x0e+\x86a\x957s\x16FA\x00'}}) 13:43:15 executing program 4 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x10001, 0x0) 13:43:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) setsockopt$rose(r1, 0x104, 0x7, &(0x7f0000000080)=0x8001, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x7fffe) 13:43:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000500)=[{&(0x7f00000002c0)="ab56a7cbde4e919972bc1f45cad19c4d40c5d754aba760a3e2e1a1008b73c5cc89fdd1a478a3c781b7c3120df49c76997e2c63318c9ba637888f191e132413f8a9cea841baef885abb428ad704751db5424b016132524ec6f6201ac64dc7ac5fb4ba67c4d6ba07770c7da55ee3ff79f3c56d243ce69dae3515cb5e3df9ef3adca6b48e2bd51eb6e16f2c16c724b3e06594fcb23242a4e7617b4eed42f07f3b", 0x9f}, {&(0x7f0000000380)="53cacee27c511e99e2eb43afb35031e9b69e4abba85d33a7e899b4f2151f1994d3706048bdf2c64415e09e07efe44a4a5c30a9e2ab42e084360403ca9c8ae26c420d576eca7e1b2ff21533307fdca8da8ebd88d762b701c37831", 0x5a}, {&(0x7f0000000400)="808f46cdf9c994795bb6ad695d8abc85e4245ab0c7b03a886eca6a0a6b1738219b1ffb2034c753bd816fde9f1c13a3cfb7fa6f90afe817634a0f5fdba74165e5d77523616cde08dbfdbdc4a34d54f56f0a43a967e14d6f4783338759c23b1c1c2d67ddec79835b5b4c45b62edd15e71339508eae45bc1a98a6b7b5e0fbf4d217f7782a6da709f0f637e545a448e3b76173cde31b768daf6ed7efeb020dab79c9cab2", 0xa2}, {&(0x7f00000004c0)="ba299a81065292328ffc9803191c1a21b83884682bc9", 0x16}], 0x4) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r4, 0x2, 0x70bd26, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080), &(0x7f0000000740)=0x8) fdatasync(r2) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e23, @multicast2}}, 0x8, 0x8001}, &(0x7f0000000640)=0x90) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000680)={r5, @in6={{0xa, 0x4e23, 0x7, @mcast1, 0x6}}, 0x78e, 0x3, 0xff, 0x7, 0x2}, 0x98) ioctl$DRM_IOCTL_GET_UNIQUE(r3, 0xc0106401, &(0x7f0000000280)={0x7f, &(0x7f0000000200)=""/127}) accept4$netrom(r1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000540)) [ 2130.542602][T18154] hfs: can't find a HFS filesystem on dev loop5 13:43:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000036c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/prev\x00') write$apparmor_exec(r1, &(0x7f0000000080)={'exec ', '\x00'}, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000140)=0xec) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f00000000c0)) accept4$netrom(r2, 0x0, 0x0, 0x0) [ 2130.613659][T18164] FAULT_INJECTION: forcing a failure. [ 2130.613659][T18164] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2130.626905][T18164] CPU: 1 PID: 18164 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2130.626923][T18164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2130.626928][T18164] Call Trace: [ 2130.626954][T18164] dump_stack+0x172/0x1f0 [ 2130.626973][T18164] should_fail.cold+0xa/0x15 [ 2130.626991][T18164] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2130.627007][T18164] ? __lock_acquire+0x548/0x3fb0 [ 2130.627019][T18164] ? __save_stack_trace+0x99/0x100 [ 2130.627040][T18164] should_fail_alloc_page+0x50/0x60 [ 2130.627054][T18164] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2130.627074][T18164] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2130.645129][T18164] ? find_held_lock+0x35/0x130 [ 2130.645152][T18164] ? __x64_sys_mount+0xbe/0x150 [ 2130.645170][T18164] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2130.645188][T18164] cache_grow_begin+0x9c/0x860 [ 2130.645202][T18164] ? getname_flags+0xd6/0x5b0 [ 2130.645215][T18164] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2130.645235][T18164] kmem_cache_alloc+0x62d/0x6f0 [ 2130.726800][T18164] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2130.732527][T18164] ? find_held_lock+0x35/0x130 [ 2130.737293][T18164] getname_flags+0xd6/0x5b0 [ 2130.741807][T18164] user_path_at_empty+0x2f/0x50 [ 2130.746671][T18164] do_mount+0x150/0x2c40 [ 2130.750923][T18164] ? copy_mount_options+0x5c/0x3a0 [ 2130.756411][T18164] ? copy_mount_string+0x40/0x40 [ 2130.761486][T18164] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2130.767732][T18164] ? _copy_from_user+0xdd/0x150 [ 2130.772586][T18164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2130.778828][T18164] ? copy_mount_options+0x280/0x3a0 [ 2130.784237][T18164] ksys_mount+0xdb/0x150 [ 2130.788770][T18164] __x64_sys_mount+0xbe/0x150 [ 2130.793454][T18164] do_syscall_64+0x103/0x610 [ 2130.798062][T18164] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2130.803947][T18164] RIP: 0033:0x45b69a [ 2130.807840][T18164] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2130.827470][T18164] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2130.835918][T18164] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2130.843902][T18164] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2130.852061][T18164] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 13:43:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x0f+\x86a\x957s\x16FA\x00'}}) [ 2130.860037][T18164] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2130.868009][T18164] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r0}) ioctl$sock_x25_SIOCADDRT(r2, 0x890b, &(0x7f0000000080)={@remote={[], 0x3}, 0xf, 'bpq0\x00'}) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2130.912986][T18154] hfs: can't find a HFS filesystem on dev loop5 13:43:16 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x1f00000000000000}) 13:43:16 executing program 2: r0 = request_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0xffffffffffffffff) r1 = add_key(&(0x7f0000000380)='.dead\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)="aa386b12ce475844a665306b064a0cb59f83754921315634f535fe29d4a87138ac83f4f03fe4c300ca70e576df82022f451e24491b79c207b2b3e92520f9c9442eafd58f6cc91bc42c61c5c9b292d9dbf476491925e5a1792f807441972402ffcf77ea94f6", 0x65, 0xfffffffffffffff8) keyctl$unlink(0x9, r0, r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x2000, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000700)=0x0) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x2, 0x101, 0xf6b, 0x7f7fffff, 0x0, 0x200, 0x2000, 0x6, 0x1000, 0x8001, 0x400, 0x7f, 0x4, 0x1, 0x20, 0x3, 0x9, 0x2, 0x6, 0x4fa, 0xffffffffffffff00, 0xffffffffffffffff, 0x7, 0xb1f, 0x2, 0x6, 0x8, 0x1, 0xec26, 0x9, 0x100000001, 0x4, 0x7, 0x2, 0x836, 0x41, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x8}, 0x4008, 0x2, 0xc09d, 0x0, 0x8d, 0x3}, r3, 0xa, r2, 0x9) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r6, 0x0, 0x0, 0xfffffffeffffffff) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f00000004c0)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x3000, 0x1}) r7 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000580)={0x15, 0x110, 0xfa00, {r8, 0xfffffffffffffffa, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x7, @empty, 0xfff}, @ib={0x1b, 0x7, 0xfd, {"ccf99447b5f3531658ad0e1e4fe64385"}, 0xd9, 0x100000000, 0x80000000}}}, 0x118) ioctl$VIDIOC_S_FBUF(r7, 0x4030560b, &(0x7f0000000180)={0x10, 0x5, &(0x7f0000000080)="307428fe6f8dc48ca6e560707af6638ccd7e14873a8b10ce7f69cc8e937b4f59a5be0d7048d670cf564bab9ee48eb4c0d98322e89956707ce80835c020cba5ff8d9ed5b30444e4aa709b0d31e4bb5eb9c8e80b27affdd40f51c7ca9fa1935e444d08f9be54038d16453f96c2161ae5b02e49ed12e2c96232d9654e62267c3d2dd409717bf5fdc2a720eee5f1538f618d957760c66c6358e99f264b029c01c26b28dc3f2c9742a7cc9fb27e77ba29b88cb952f3dee13817210d4a03a8671654c9e1e6407134d67dd6d9e0548a2efea07c6bf6f44551dfc0add68abfd5ecd974191b995080288b1bb4c0ac51f43030472774", {0x9, 0xd11d, 0x7b7f4f5f, 0x3, 0x1, 0x6, 0xf, 0x2}}) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000480)) 13:43:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = shmget(0x3, 0x1000, 0x800, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000080)=""/233) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:16 executing program 4 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000037c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2131.157819][T18187] Unknown ioctl 35076 [ 2131.170963][T18183] hfs: can't find a HFS filesystem on dev loop5 [ 2131.215191][T18191] FAULT_INJECTION: forcing a failure. [ 2131.215191][T18191] name failslab, interval 1, probability 0, space 0, times 0 [ 2131.265326][T18183] hfs: can't find a HFS filesystem on dev loop5 [ 2131.277582][T18191] CPU: 0 PID: 18191 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2131.285604][T18191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2131.295695][T18191] Call Trace: [ 2131.298998][T18191] dump_stack+0x172/0x1f0 [ 2131.303330][T18191] should_fail.cold+0xa/0x15 [ 2131.307913][T18191] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2131.313990][T18191] ? ___might_sleep+0x163/0x280 [ 2131.318838][T18191] __should_failslab+0x121/0x190 [ 2131.324036][T18191] should_failslab+0x9/0x14 [ 2131.328615][T18191] kmem_cache_alloc_trace+0x2d1/0x760 [ 2131.333980][T18191] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2131.340219][T18191] ? _copy_from_user+0xdd/0x150 [ 2131.345319][T18191] copy_mount_options+0x5c/0x3a0 [ 2131.350414][T18191] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2131.356767][T18191] ksys_mount+0xa7/0x150 [ 2131.360995][T18191] __x64_sys_mount+0xbe/0x150 [ 2131.365749][T18191] do_syscall_64+0x103/0x610 [ 2131.370426][T18191] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2131.376310][T18191] RIP: 0033:0x45b69a [ 2131.380201][T18191] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2131.400918][T18191] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:43:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f00000000c0)) 13:43:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/anycast6\x00') ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{}, {}, {}]}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') 13:43:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x11+\x86a\x957s\x16FA\x00'}}) [ 2131.409398][T18191] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2131.417350][T18191] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2131.425426][T18191] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2131.433379][T18191] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2131.441428][T18191] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000038c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:17 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x2000000000000000}) 13:43:17 executing program 4 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000109112, &(0x7f0000000000)="a7e422cd008519c75f31c6dc51b73ee806ce139b7cff9415ebcc413bf6751aaf2a236f93e841570cc07da7718b39fdba393a54b941ca83e83232ffebd636149e2c0d874d72c2eeef14bbfc4749271d3e35ad9d3ed5e6a3f8d51946d9c2149d489c3a85fadec62d8fb98e1b4f328c09e4a8032d0adf6fa36c01ef7e") ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000030000000000000000000000000000000000000000000000000000000000007f0000000000000000000000000000000000000000000000007f000000010000000100000000000000facfffffffffffff00000000000000000900000000000000000000000000000000000000000000000000000000000000010000000104000002000000000000000700000000000000ff7f00"/377]) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101100, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f00000000c0)) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000100)={0x7, 0x200000001fffd, 0xcd}) accept4$netrom(r2, 0x0, 0x0, 0x4000) 13:43:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f0000000080)={0x7ff, "0ba7c1255a3f6c91215fadb028267945a369118f27c6c5d3294f3cf7807a80a7", 0xc00, 0x8, 0x5, 0x1d, 0x7}) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.stat\x00', 0x0, 0x0) ioctl$KVM_SET_XSAVE(r2, 0x5000aea5, &(0x7f0000000140)={"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"}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r3, 0x0, 0x0, 0x7fffc) 13:43:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000039c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x12+\x86a\x957s\x16FA\x00'}}) 13:43:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@broadcast, @in=@empty}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000000)=0xe8) [ 2131.854818][T18218] FAULT_INJECTION: forcing a failure. [ 2131.854818][T18218] name failslab, interval 1, probability 0, space 0, times 0 13:43:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x610100, 0x0) fremovexattr(r1, &(0x7f0000000100)=@known='system.posix_acl_default\x00') ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f00000000c0)) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000140)={0x0, 0x0, [], @raw_data=[0xba, 0x286, 0x0, 0xab9c, 0xfffffffffffffff9, 0x9, 0x400, 0x4, 0x10001, 0x4, 0x100000000, 0x92a8, 0xfffffffffffffe01, 0x8001, 0x6, 0xaba, 0x200, 0x4, 0x6, 0xfffffffffffffffd, 0x8, 0x3, 0x9, 0x200, 0x5, 0x5, 0x1, 0x200, 0x7fff, 0x6ccf, 0x3, 0xc3a]}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40000, 0x0) ioctl$PPPIOCGNPMODE(r2, 0xc008744c, &(0x7f0000000080)={0xc023, 0x3}) accept4$netrom(r0, 0x0, 0x0, 0x0) [ 2131.926931][T18218] CPU: 0 PID: 18218 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2131.934954][T18218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2131.945019][T18218] Call Trace: [ 2131.948364][T18218] dump_stack+0x172/0x1f0 [ 2131.952712][T18218] should_fail.cold+0xa/0x15 [ 2131.952734][T18218] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2131.952754][T18218] ? ___might_sleep+0x163/0x280 [ 2131.952773][T18218] __should_failslab+0x121/0x190 [ 2131.952788][T18218] should_failslab+0x9/0x14 [ 2131.952813][T18218] __kmalloc_track_caller+0x2d8/0x740 [ 2131.952834][T18218] ? vfs_parse_fs_string+0xe8/0x170 [ 2131.988137][T18218] kmemdup_nul+0x31/0xa0 [ 2131.988154][T18218] vfs_parse_fs_string+0xe8/0x170 [ 2131.988168][T18218] ? vfs_parse_fs_param+0x510/0x510 [ 2131.988195][T18218] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2131.988206][T18218] ? alloc_fs_context+0x3bb/0x640 [ 2131.988225][T18218] do_mount+0x6e9/0x2c40 [ 2132.018396][T18218] ? copy_mount_string+0x40/0x40 13:43:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") timer_create(0x3, &(0x7f0000000000)={0x0, 0x23, 0x7}, &(0x7f0000000080)=0x0) timer_gettime(r1, &(0x7f00000000c0)) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x602800) ioctl$KDDISABIO(r3, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000200)=0xe8) ioprio_get$uid(0x0, r4) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x2000, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) [ 2132.023460][T18218] ? _copy_from_user+0xdd/0x150 [ 2132.028410][T18218] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2132.034670][T18218] ? copy_mount_options+0x280/0x3a0 [ 2132.034692][T18218] ksys_mount+0xdb/0x150 [ 2132.044154][T18218] __x64_sys_mount+0xbe/0x150 [ 2132.048944][T18218] do_syscall_64+0x103/0x610 [ 2132.053640][T18218] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2132.059626][T18218] RIP: 0033:0x45b69a [ 2132.063526][T18218] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2132.083224][T18218] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2132.083240][T18218] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2132.083249][T18218] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2132.083258][T18218] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2132.083266][T18218] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 13:43:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/99) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/psched\x00') ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000180)={0x0, 0x5, 0x1ff, &(0x7f0000000140)=0x4}) 13:43:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x13+\x86a\x957s\x16FA\x00'}}) [ 2132.083274][T18218] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2132.133134][T18224] hfs: can't find a HFS filesystem on dev loop5 13:43:17 executing program 4 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2132.259916][T18224] hfs: can't find a HFS filesystem on dev loop5 13:43:17 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x2010000000000000}) 13:43:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xf912528, 0x420000) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000140)) getsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000100)='/dev/dsp#\x00') r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x20882) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mISDNtimer\x00', 0x400, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000080)={0x1ff, 0x3ff, 0x5, 0x9}, 0x6) accept4$netrom(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f00000001c0)={0x5c, @local, 0x4e24, 0x4, 'sed\x00', 0x2, 0xff, 0x60}, 0x2c) ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f0000000280)=0x4) 13:43:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000003ac000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2132.415065][T18251] FAULT_INJECTION: forcing a failure. [ 2132.415065][T18251] name failslab, interval 1, probability 0, space 0, times 0 13:43:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2132.459600][T18251] CPU: 1 PID: 18251 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2132.467634][T18251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2132.477702][T18251] Call Trace: [ 2132.481036][T18251] dump_stack+0x172/0x1f0 [ 2132.485495][T18251] should_fail.cold+0xa/0x15 [ 2132.490214][T18251] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2132.496135][T18251] ? ___might_sleep+0x163/0x280 [ 2132.501093][T18251] __should_failslab+0x121/0x190 [ 2132.506565][T18251] should_failslab+0x9/0x14 [ 2132.511100][T18251] kmem_cache_alloc_trace+0x2d1/0x760 [ 2132.516574][T18251] alloc_fs_context+0x5a/0x640 [ 2132.521438][T18251] fs_context_for_mount+0x25/0x30 [ 2132.526470][T18251] do_mount+0x13d7/0x2c40 [ 2132.530824][T18251] ? copy_mount_string+0x40/0x40 [ 2132.535805][T18251] ? _copy_from_user+0xdd/0x150 [ 2132.540760][T18251] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2132.547001][T18251] ? copy_mount_options+0x280/0x3a0 [ 2132.552307][T18251] ksys_mount+0xdb/0x150 [ 2132.556663][T18251] __x64_sys_mount+0xbe/0x150 [ 2132.561361][T18251] do_syscall_64+0x103/0x610 [ 2132.566056][T18251] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2132.572034][T18251] RIP: 0033:0x45b69a [ 2132.575954][T18251] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2132.595568][T18251] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:43:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x14+\x86a\x957s\x16FA\x00'}}) [ 2132.604155][T18251] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2132.612312][T18251] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2132.620372][T18251] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2132.628381][T18251] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2132.636528][T18251] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:18 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, 0x0, 0x0) fsync(r0) [ 2132.676375][T18258] IPVS: set_ctl: invalid protocol: 92 172.20.20.170:20004 13:43:18 executing program 4 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2132.744998][T18263] hfs: can't find a HFS filesystem on dev loop5 13:43:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) accept$packet(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x14) [ 2132.835001][T18263] hfs: can't find a HFS filesystem on dev loop5 13:43:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x1) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x80000010001) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20000, 0x0) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f00000000c0)={0x3, 0x0, [{0x7, 0x5, 0x0, 0x0, @irqchip={0x1, 0x7}}, {0x0, 0x3, 0x0, 0x0, @irqchip={0x7, 0x5}}, {0x6026db06, 0x0, 0x0, 0x0, @irqchip={0xbc8, 0x8000}}]}) fstat(r0, &(0x7f0000000180)) 13:43:18 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x220f000000000000}) [ 2132.920987][T18279] FAULT_INJECTION: forcing a failure. [ 2132.920987][T18279] name failslab, interval 1, probability 0, space 0, times 0 13:43:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000003bc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = dup(r0) ioctl$VIDIOC_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000080)={0x0, @reserved}) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2132.971052][T18279] CPU: 1 PID: 18279 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2132.979276][T18279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2132.989348][T18279] Call Trace: [ 2132.992852][T18279] dump_stack+0x172/0x1f0 [ 2132.997205][T18279] should_fail.cold+0xa/0x15 [ 2133.001819][T18279] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2133.007651][T18279] ? ___might_sleep+0x163/0x280 [ 2133.012615][T18279] __should_failslab+0x121/0x190 [ 2133.017609][T18279] should_failslab+0x9/0x14 [ 2133.022152][T18279] __kmalloc_track_caller+0x2d8/0x740 [ 2133.027547][T18279] ? kasan_kmalloc+0x9/0x10 [ 2133.032058][T18279] ? kmem_cache_alloc_trace+0x151/0x760 [ 2133.037611][T18279] ? legacy_init_fs_context+0x48/0xe0 [ 2133.043099][T18279] ? alloc_fs_context+0x365/0x640 [ 2133.048139][T18279] ? fs_context_for_mount+0x25/0x30 [ 2133.053339][T18279] ? do_mount+0x13d7/0x2c40 [ 2133.057928][T18279] ? ksys_mount+0xdb/0x150 [ 2133.062368][T18279] ? btrfs_mount+0xdc/0x15e2 [ 2133.066968][T18279] kstrdup+0x3a/0x70 [ 2133.070872][T18279] ? btrfs_remount+0x11f0/0x11f0 [ 2133.075817][T18279] btrfs_mount+0xdc/0x15e2 [ 2133.080327][T18279] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2133.085994][T18279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2133.092241][T18279] ? should_fail+0x1de/0x852 [ 2133.096840][T18279] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2133.102649][T18279] ? btrfs_remount+0x11f0/0x11f0 [ 2133.107620][T18279] ? rcu_read_lock_sched_held+0x110/0x130 [ 2133.113337][T18279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2133.119586][T18279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2133.125913][T18279] ? vfs_parse_fs_string+0x111/0x170 [ 2133.131198][T18279] ? vfs_parse_fs_string+0x111/0x170 [ 2133.136516][T18279] ? rcu_read_lock_sched_held+0x110/0x130 [ 2133.142359][T18279] ? kfree+0x1fa/0x230 [ 2133.146473][T18279] ? vfs_parse_fs_string+0x116/0x170 [ 2133.151769][T18279] ? btrfs_remount+0x11f0/0x11f0 [ 2133.156731][T18279] legacy_get_tree+0xf2/0x200 [ 2133.161412][T18279] ? btrfs_remount+0x11f0/0x11f0 [ 2133.166351][T18279] ? legacy_get_tree+0xf2/0x200 [ 2133.171205][T18279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2133.177994][T18279] vfs_get_tree+0x123/0x450 [ 2133.182697][T18279] do_mount+0x1436/0x2c40 [ 2133.187034][T18279] ? copy_mount_string+0x40/0x40 [ 2133.191981][T18279] ? _copy_from_user+0xdd/0x150 [ 2133.196838][T18279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2133.203103][T18279] ? copy_mount_options+0x280/0x3a0 [ 2133.208398][T18279] ksys_mount+0xdb/0x150 [ 2133.212645][T18279] __x64_sys_mount+0xbe/0x150 [ 2133.217330][T18279] do_syscall_64+0x103/0x610 [ 2133.221930][T18279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2133.228011][T18279] RIP: 0033:0x45b69a [ 2133.232014][T18279] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2133.251616][T18279] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2133.260288][T18279] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a 13:43:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x15+\x86a\x957s\x16FA\x00'}}) [ 2133.268431][T18279] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2133.276414][T18279] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2133.284392][T18279] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2133.292386][T18279] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:18 executing program 4 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2133.394834][T18289] hfs: can't find a HFS filesystem on dev loop5 [ 2133.492422][T18289] hfs: can't find a HFS filesystem on dev loop5 13:43:18 executing program 2: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl(r0, 0xb6db, &(0x7f0000000080)="7188c9e27834598eb85674a349bd2dbe5a6286f7c3af37f7842bcbc0b8863498c14f310ac52783dea3ecae53fb78445405a6c7d25208fca119e90fd30ff3b6bf8e8b061e68db92d9c122a3382cf117e277d1f88aceaf4f683021c53b06d1badd2eb5a57be7") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) [ 2133.559709][T18304] FAULT_INJECTION: forcing a failure. [ 2133.559709][T18304] name failslab, interval 1, probability 0, space 0, times 0 13:43:19 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x2300000000000000}) 13:43:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000640)=@filter={'filter\x00', 0xe, 0x3, 0x598, [0x0, 0x20000080, 0x20000368, 0x200005b8], 0x0, &(0x7f0000000000), &(0x7f0000000080)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{{{0x5, 0x0, 0xa07, 'veth0_to_hsr\x00', 'bcsf0\x00', 'veth1_to_hsr\x00', 'vxcan1\x00', @broadcast, [0xff, 0xff, 0x0, 0xff, 0xff], @empty, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], 0xb0, 0x130, 0x160, [@mark_m={'mark_m\x00', 0x18, {{0x8, 0x1620, 0x2, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x2, 0x800}}}, @common=@AUDIT={'AUDIT\x00', 0x8}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}, {{{0xb, 0x4d, 0x6a04, 'veth1_to_bond\x00', 'dummy0\x00', '\x00', 'veth0\x00', @local, [0xff, 0xff, 0xff, 0xff, 0xff], @remote, [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], 0xc0, 0x110, 0x158, [@ipvs={'ipvs\x00', 0x28, {{@ipv4=@multicast2, [0x0, 0xff], 0x4e24, 0x3b, 0x5, 0x4e22, 0x1, 0x3a}}}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x9, 'syz1\x00', 0x7fffffff}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"accb02bef64668900f6e4dcca2560f302777bba5098f3541631c7dfe3a84"}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x11, 0x43, 0xa00, 'vcan0\x00', 'bridge_slave_1\x00', 'ip6tnl0\x00', 'hwsim0\x00', @remote, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @local, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], 0x138, 0x1d8, 0x220, [@physdev={'physdev\x00', 0x70, {{'ip6_vti0\x00', {0xff}, 'bridge_slave_1\x00', {0xff}, 0x1}}}, @m802_3={'802_3\x00', 0x8, {{0x1, 0x5, 0x5, 0x4}}}]}, [@common=@log={'log\x00', 0x28, {{0x1, "b64da6c25600adb6f335dc00f1db8a582a57c888aa8d03190121c86f4762", 0xc}}}, @common=@log={'log\x00', 0x28, {{0xffffffff00000000, "7dd3669926b0584c9eafd2a93592a7708419b362e7fa6b57e1dfdb67a67b"}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"c273022e2b144a1980d9de3c4cc860c4434cf1cca72f045f59dbe815f9d6"}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xfffffffffffffffe}]}, 0x610) timer_create(0x6, &(0x7f0000000800)={0x0, 0x3e, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000840)=0x0) timer_gettime(r1, &(0x7f0000000880)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") openat$vcs(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vcs\x00', 0x4002, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e22, 0x9f, @mcast1, 0x1ff}}, 0x101, 0xe39, 0x77, 0x3, 0x8000}, &(0x7f00000007c0)=0x98) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000003cc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2133.654859][T18304] CPU: 0 PID: 18304 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2133.663193][T18304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2133.673279][T18304] Call Trace: [ 2133.676693][T18304] dump_stack+0x172/0x1f0 [ 2133.681076][T18304] should_fail.cold+0xa/0x15 [ 2133.685744][T18304] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2133.695145][T18304] ? ___might_sleep+0x163/0x280 [ 2133.700233][T18304] __should_failslab+0x121/0x190 [ 2133.705366][T18304] should_failslab+0x9/0x14 [ 2133.710136][T18304] kmem_cache_alloc_trace+0x2d1/0x760 [ 2133.715519][T18304] alloc_fs_context+0x5a/0x640 [ 2133.720311][T18304] fs_context_for_mount+0x25/0x30 [ 2133.725339][T18304] do_mount+0x13d7/0x2c40 [ 2133.729846][T18304] ? copy_mount_string+0x40/0x40 [ 2133.734905][T18304] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2133.741195][T18304] ? copy_mount_options+0x280/0x3a0 [ 2133.746392][T18304] ksys_mount+0xdb/0x150 [ 2133.750636][T18304] __x64_sys_mount+0xbe/0x150 [ 2133.755633][T18304] do_syscall_64+0x103/0x610 [ 2133.760244][T18304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2133.766141][T18304] RIP: 0033:0x45b69a [ 2133.770134][T18304] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2133.790782][T18304] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:43:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x16+\x86a\x957s\x16FA\x00'}}) [ 2133.799377][T18304] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2133.807615][T18304] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2133.815591][T18304] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2133.823741][T18304] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2133.832067][T18304] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) accept4$netrom(r1, 0x0, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) execveat(r2, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000140)='y\x00', &(0x7f0000000180)='$ppp0\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='em1nodev^\'\x00', &(0x7f00000002c0)='y\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)=')\x00', &(0x7f0000000380)='y\x00', &(0x7f00000003c0)='trusted.overlay.opaque\x00'], 0x1800) 13:43:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sysfs$3(0x3) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x80000000, 0x0, 0x0, 0x15, 0x8, "f9dad21eb59a82f0a92ede512ee20236cfa24aafacee94a20f03643f339f691ef2899277839bd631b654c2bfeb585acf15d64f16eaae0f37f23a388ffd88f78f", "53be93c709c292fc8405ed34753e1edd81912f3bef5f10ddd53e677b57d538bd680a560774fbfa826298dec53640910436fe08a5fd8b4b12b83fec1fc218933f", "be768c19a1f6cdf4fa0923734d041cffec24e8527827bfedca4bf813cfb44c99", [0xa3, 0x1]}) 13:43:19 executing program 4 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2133.981658][T18316] hfs: can't find a HFS filesystem on dev loop5 13:43:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000003dc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2134.094535][T18316] hfs: can't find a HFS filesystem on dev loop5 [ 2134.139368][T18329] FAULT_INJECTION: forcing a failure. [ 2134.139368][T18329] name failslab, interval 1, probability 0, space 0, times 0 [ 2134.160848][T18329] CPU: 1 PID: 18329 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2134.169130][T18329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2134.180005][T18329] Call Trace: [ 2134.183304][T18329] dump_stack+0x172/0x1f0 [ 2134.187653][T18329] should_fail.cold+0xa/0x15 [ 2134.192254][T18329] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2134.198069][T18329] ? ___might_sleep+0x163/0x280 [ 2134.202965][T18329] __should_failslab+0x121/0x190 [ 2134.207920][T18329] should_failslab+0x9/0x14 [ 2134.212561][T18329] __kmalloc_track_caller+0x2d8/0x740 [ 2134.217936][T18329] ? vfs_parse_fs_string+0xe8/0x170 [ 2134.223224][T18329] kmemdup_nul+0x31/0xa0 [ 2134.227465][T18329] vfs_parse_fs_string+0xe8/0x170 [ 2134.232494][T18329] ? vfs_parse_fs_param+0x510/0x510 [ 2134.237702][T18329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2134.244376][T18329] ? alloc_fs_context+0x3bb/0x640 [ 2134.249407][T18329] do_mount+0x6e9/0x2c40 [ 2134.253656][T18329] ? copy_mount_string+0x40/0x40 [ 2134.258610][T18329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2134.264843][T18329] ? copy_mount_options+0x280/0x3a0 [ 2134.270042][T18329] ksys_mount+0xdb/0x150 [ 2134.274471][T18329] __x64_sys_mount+0xbe/0x150 [ 2134.279176][T18329] do_syscall_64+0x103/0x610 [ 2134.283865][T18329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2134.289841][T18329] RIP: 0033:0x45b69a [ 2134.293735][T18329] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2134.313426][T18329] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2134.321848][T18329] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2134.330197][T18329] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 13:43:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.opaque\x00') ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2134.338343][T18329] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2134.346311][T18329] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2134.354294][T18329] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:19 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x17+\x86a\x957s\x16FA\x00'}}) 13:43:19 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x3f00000000000000}) 13:43:19 executing program 4 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x2, {0x2400, {0x0, 0x1, 0x3}, 0x180, r2, r3, 0x1, 0x80000001, 0x7f, 0x8b, 0x2, 0x1, 0x5, 0x3, 0x101, 0x1, 0x10000, 0x100000001, 0x2800000000, 0x9, 0x9}}, 0xa0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r4, 0x0, 0x0, 0x0) 13:43:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101000, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000080)={{0x2d74776, 0x5, 0x1, 0xfed, 0x1f, 0x1}, 0x9f, 0x1ff, 0x5, 0x100000000, 0x4, "4663843e54e2351171425f72abd458d5db4c933ea02ae821e99572faa5f3f6462d7e9251feb6eb016cff04085233d0e969b648ce57c6a2c43dd48f6642ed384b15d7059ea24075bc4c501fbb06b697db91d5ab32a6613f2bbf810717a097c2f15d449e8bd0e491bc8aa435b4097e71482f24c9712dc6a0c003f1f8caa2895b7b"}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000003ec000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2134.607588][T18347] hfs: can't find a HFS filesystem on dev loop5 [ 2134.616986][T18351] FAULT_INJECTION: forcing a failure. [ 2134.616986][T18351] name failslab, interval 1, probability 0, space 0, times 0 [ 2134.667048][T18351] CPU: 1 PID: 18351 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2134.675068][T18351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2134.685335][T18351] Call Trace: [ 2134.689113][T18351] dump_stack+0x172/0x1f0 [ 2134.693643][T18351] should_fail.cold+0xa/0x15 [ 2134.698279][T18351] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2134.704094][T18351] ? ___might_sleep+0x163/0x280 [ 2134.708974][T18351] __should_failslab+0x121/0x190 [ 2134.713913][T18351] should_failslab+0x9/0x14 [ 2134.718766][T18351] kmem_cache_alloc_trace+0x2d1/0x760 [ 2134.724162][T18351] alloc_fs_context+0x5a/0x640 [ 2134.728933][T18351] fs_context_for_mount+0x25/0x30 [ 2134.734146][T18351] vfs_kern_mount.part.0+0x28/0xf0 [ 2134.739283][T18351] vfs_kern_mount+0x40/0x60 [ 2134.743874][T18351] btrfs_mount+0x2b4/0x15e2 [ 2134.748389][T18351] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2134.754029][T18351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2134.760538][T18351] ? should_fail+0x1de/0x852 [ 2134.765137][T18351] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2134.770947][T18351] ? btrfs_remount+0x11f0/0x11f0 [ 2134.775890][T18351] ? rcu_read_lock_sched_held+0x110/0x130 [ 2134.781612][T18351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2134.788202][T18351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2134.794980][T18351] ? vfs_parse_fs_string+0x111/0x170 [ 2134.800352][T18351] ? vfs_parse_fs_string+0x111/0x170 [ 2134.805812][T18351] ? rcu_read_lock_sched_held+0x110/0x130 [ 2134.811532][T18351] ? kfree+0x1fa/0x230 [ 2134.815607][T18351] ? vfs_parse_fs_string+0x116/0x170 [ 2134.821007][T18351] ? btrfs_remount+0x11f0/0x11f0 [ 2134.825945][T18351] legacy_get_tree+0xf2/0x200 [ 2134.830625][T18351] ? btrfs_remount+0x11f0/0x11f0 [ 2134.835651][T18351] ? legacy_get_tree+0xf2/0x200 [ 2134.840593][T18351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2134.846964][T18351] vfs_get_tree+0x123/0x450 [ 2134.851491][T18351] do_mount+0x1436/0x2c40 [ 2134.855915][T18351] ? copy_mount_string+0x40/0x40 [ 2134.860941][T18351] ? _copy_from_user+0xdd/0x150 [ 2134.865793][T18351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2134.872120][T18351] ? copy_mount_options+0x280/0x3a0 [ 2134.877347][T18351] ksys_mount+0xdb/0x150 [ 2134.881679][T18351] __x64_sys_mount+0xbe/0x150 [ 2134.886364][T18351] do_syscall_64+0x103/0x610 [ 2134.890985][T18351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2134.896883][T18351] RIP: 0033:0x45b69a [ 2134.900861][T18351] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2134.921244][T18351] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2134.929655][T18351] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2134.937624][T18351] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2134.945682][T18351] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2134.953656][T18351] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 13:43:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x18+\x86a\x957s\x16FA\x00'}}) 13:43:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x26, 0x3ff, 0x5, 0x2, 0x3f, 0x6, 0x30a, 0x40, 0xfb, 0x1, 0x20, 0x38, 0x2, 0x9, 0x8000}, [{0x60000005, 0x4, 0x41, 0x6, 0x101, 0x688, 0x8, 0x3}, {0x60000000, 0xe576, 0x3f, 0xac, 0x0, 0xff, 0x3, 0x678}], "", [[]]}, 0x1b0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) [ 2134.961636][T18351] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@rand_addr=0x7fffffff, @in6=@dev={0xfe, 0x80, [], 0x13}, 0x4e20, 0x3, 0x4e21, 0x400, 0x2, 0xa0, 0xa0, 0x73, r1, r2}, {0x6, 0x400, 0x8000, 0x3, 0x5, 0x200, 0x9}, {0xfffffffffffff800, 0x7fffffff, 0x100000000, 0x2}, 0x5, 0x6e6bb2, 0x0, 0x1, 0x2, 0x3}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6=@loopback, 0x3506, 0x3, 0x3, 0x400, 0xfff, 0x1, 0x9}}, 0xe8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r4, 0x0, 0x0, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="1000000017e8ff07002e2f66696c65309ae35e1e379fd0ca7b60ef13b1b15417cfb9f6b70ae1e91e498289b7efb1a9bbe092710fe56526c2f8a32e76144ed166f505b16c1d25cb99e24ae8000000"], 0x10) [ 2135.038834][T18347] hfs: can't find a HFS filesystem on dev loop5 13:43:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) r2 = getegid() fchown(r0, r1, r2) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0x1, 0x4) accept4$netrom(r3, 0x0, 0x0, 0x0) 13:43:20 executing program 4 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:20 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x4000000000000000}) 13:43:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000003fc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x8, 0x80000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000001c0)) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000000)=""/46, 0x2e) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x9, 0x8, 0x3f1b, 0x0, 0xd65}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r4, 0x4) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x19+\x86a\x957s\x16FA\x00'}}) [ 2135.304409][T18374] FAULT_INJECTION: forcing a failure. [ 2135.304409][T18374] name failslab, interval 1, probability 0, space 0, times 0 [ 2135.345213][T18374] CPU: 1 PID: 18374 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2135.353421][T18374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2135.353429][T18374] Call Trace: [ 2135.353453][T18374] dump_stack+0x172/0x1f0 [ 2135.353478][T18374] should_fail.cold+0xa/0x15 [ 2135.366822][T18374] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2135.366844][T18374] ? ___might_sleep+0x163/0x280 [ 2135.366862][T18374] __should_failslab+0x121/0x190 13:43:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x40e00) faccessat(r2, &(0x7f0000000140)='./file0\x00', 0x0, 0x300) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000080)={0x0, {{0x2, 0x4e20, @loopback}}}, 0x88) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2135.366875][T18374] should_failslab+0x9/0x14 [ 2135.366890][T18374] __kmalloc_track_caller+0x2d8/0x740 [ 2135.366902][T18374] ? kasan_kmalloc+0x9/0x10 [ 2135.366919][T18374] ? kmem_cache_alloc_trace+0x151/0x760 [ 2135.366930][T18374] ? legacy_init_fs_context+0x48/0xe0 [ 2135.366942][T18374] ? alloc_fs_context+0x365/0x640 [ 2135.366952][T18374] ? fs_context_for_mount+0x25/0x30 [ 2135.366963][T18374] ? do_mount+0x13d7/0x2c40 [ 2135.366974][T18374] ? ksys_mount+0xdb/0x150 [ 2135.366994][T18374] ? btrfs_mount+0xdc/0x15e2 [ 2135.441879][T18374] kstrdup+0x3a/0x70 [ 2135.445783][T18374] ? btrfs_remount+0x11f0/0x11f0 [ 2135.450719][T18374] btrfs_mount+0xdc/0x15e2 [ 2135.455154][T18374] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2135.460792][T18374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2135.467055][T18374] ? should_fail+0x1de/0x852 [ 2135.471647][T18374] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2135.477458][T18374] ? btrfs_remount+0x11f0/0x11f0 [ 2135.482416][T18374] ? rcu_read_lock_sched_held+0x110/0x130 [ 2135.488133][T18374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2135.494475][T18374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2135.494500][T18374] ? vfs_parse_fs_string+0x111/0x170 [ 2135.494513][T18374] ? vfs_parse_fs_string+0x111/0x170 [ 2135.494536][T18374] ? rcu_read_lock_sched_held+0x110/0x130 [ 2135.517469][T18374] ? kfree+0x1fa/0x230 [ 2135.525418][T18374] ? vfs_parse_fs_string+0x116/0x170 [ 2135.530845][T18374] ? btrfs_remount+0x11f0/0x11f0 [ 2135.530863][T18374] legacy_get_tree+0xf2/0x200 [ 2135.530876][T18374] ? btrfs_remount+0x11f0/0x11f0 [ 2135.530887][T18374] ? legacy_get_tree+0xf2/0x200 [ 2135.530909][T18374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2135.556782][T18374] vfs_get_tree+0x123/0x450 [ 2135.561293][T18374] do_mount+0x1436/0x2c40 [ 2135.565719][T18374] ? copy_mount_string+0x40/0x40 [ 2135.570758][T18374] ? _copy_from_user+0xdd/0x150 [ 2135.575874][T18374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2135.582132][T18374] ? copy_mount_options+0x280/0x3a0 [ 2135.587341][T18374] ksys_mount+0xdb/0x150 [ 2135.591679][T18374] __x64_sys_mount+0xbe/0x150 [ 2135.596371][T18374] do_syscall_64+0x103/0x610 [ 2135.601224][T18374] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2135.607288][T18374] RIP: 0033:0x45b69a [ 2135.611185][T18374] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2135.631687][T18374] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2135.640710][T18374] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2135.648852][T18374] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2135.656923][T18374] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2135.664995][T18374] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2135.673929][T18374] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2135.687304][T18377] hfs: can't find a HFS filesystem on dev loop5 13:43:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x32140, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f00000000c0)=0x10) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f0896d070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000040c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:21 executing program 4 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2135.870367][T18377] hfs: can't find a HFS filesystem on dev loop5 13:43:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x101, 0x5, 0x0, 0x3, 0x3, 0x1, "2311d795f29a68a5a583301da4c7c8ee652d7d8181363996d5daf000771f9303f2999a47eee5802c04e072f129c7b271268a09dca55bd444f1006865d0bf4c62", "ca929724dfb3bcda7f5fe5aecc1b828839d2d68fcdf3f15cc01533bc8757777825fa764c65ec8b554de335f1fdedbfa5496679192574accbd3c8aff0d9a51eeb", "be35a8fddf74f3575d09676ab6aae98f6ecf34227b1115b20aeb8313a40d4707", [0x3, 0x3f]}) renameat2(r2, &(0x7f0000000080)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00', 0x2) 13:43:21 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x4244000000000000}) 13:43:21 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0000e25e05d0e6a8e2050000cd76a1845d2bfc0c04beb2") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r2}) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000080)={0x0, @remote, @dev}, &(0x7f00000000c0)=0xc) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000100)={r4, 0x1, 0x6, @local}, 0x10) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r6 = getpgrp(0xffffffffffffffff) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000140)=r6) accept4$netrom(r5, 0x0, 0x0, 0x0) 13:43:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x1a+\x86a\x957s\x16FA\x00'}}) [ 2136.020092][T18398] FAULT_INJECTION: forcing a failure. [ 2136.020092][T18398] name failslab, interval 1, probability 0, space 0, times 0 [ 2136.051096][T18398] CPU: 0 PID: 18398 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2136.059204][T18398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2136.069352][T18398] Call Trace: [ 2136.072662][T18398] dump_stack+0x172/0x1f0 [ 2136.077540][T18398] should_fail.cold+0xa/0x15 [ 2136.082143][T18398] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2136.087967][T18398] ? ___might_sleep+0x163/0x280 [ 2136.092853][T18398] __should_failslab+0x121/0x190 [ 2136.097826][T18398] should_failslab+0x9/0x14 [ 2136.102508][T18398] __kmalloc_track_caller+0x2d8/0x740 [ 2136.107895][T18398] ? kasan_kmalloc+0x9/0x10 [ 2136.112413][T18398] ? kmem_cache_alloc_trace+0x151/0x760 13:43:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x2) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x440002, 0x0) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000080)) 13:43:21 executing program 1: getuid() getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$pppoe(0x18, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2136.117984][T18398] ? legacy_init_fs_context+0x48/0xe0 [ 2136.123376][T18398] ? alloc_fs_context+0x365/0x640 [ 2136.128504][T18398] ? fs_context_for_mount+0x25/0x30 [ 2136.133713][T18398] ? do_mount+0x13d7/0x2c40 [ 2136.138321][T18398] ? ksys_mount+0xdb/0x150 [ 2136.142848][T18398] ? btrfs_mount+0xdc/0x15e2 [ 2136.147461][T18398] kstrdup+0x3a/0x70 [ 2136.151355][T18398] ? btrfs_remount+0x11f0/0x11f0 [ 2136.156301][T18398] btrfs_mount+0xdc/0x15e2 [ 2136.160818][T18398] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2136.166535][T18398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2136.172759][T18398] ? should_fail+0x1de/0x852 [ 2136.177440][T18398] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2136.183680][T18398] ? btrfs_remount+0x11f0/0x11f0 [ 2136.188645][T18398] ? rcu_read_lock_sched_held+0x110/0x130 [ 2136.194358][T18398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2136.200593][T18398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2136.206999][T18398] ? vfs_parse_fs_string+0x111/0x170 [ 2136.212285][T18398] ? vfs_parse_fs_string+0x111/0x170 [ 2136.217565][T18398] ? rcu_read_lock_sched_held+0x110/0x130 [ 2136.223288][T18398] ? kfree+0x1fa/0x230 [ 2136.227373][T18398] ? vfs_parse_fs_string+0x116/0x170 [ 2136.232655][T18398] ? btrfs_remount+0x11f0/0x11f0 [ 2136.237592][T18398] legacy_get_tree+0xf2/0x200 [ 2136.242261][T18398] ? btrfs_remount+0x11f0/0x11f0 [ 2136.247187][T18398] ? legacy_get_tree+0xf2/0x200 [ 2136.252024][T18398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2136.258273][T18398] vfs_get_tree+0x123/0x450 [ 2136.262779][T18398] do_mount+0x1436/0x2c40 [ 2136.267111][T18398] ? copy_mount_string+0x40/0x40 [ 2136.272503][T18398] ? _copy_from_user+0xdd/0x150 [ 2136.277641][T18398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2136.283885][T18398] ? copy_mount_options+0x280/0x3a0 [ 2136.289099][T18398] ksys_mount+0xdb/0x150 [ 2136.293343][T18398] __x64_sys_mount+0xbe/0x150 [ 2136.298085][T18398] do_syscall_64+0x103/0x610 [ 2136.303301][T18398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2136.309209][T18398] RIP: 0033:0x45b69a [ 2136.313096][T18398] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2136.332689][T18398] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2136.341111][T18398] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2136.350293][T18398] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2136.358277][T18398] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2136.366338][T18398] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2136.374320][T18398] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2136.413397][T18402] hfs: can't find a HFS filesystem on dev loop5 13:43:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000041c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = accept4$netrom(r1, &(0x7f0000000080)={{0x3, @rose}, [@netrom, @rose, @null, @bcast, @rose, @netrom, @remote, @bcast]}, &(0x7f0000000000)=0x48, 0x0) r3 = getpid() r4 = gettid() r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-control\x00', 0x100, 0x0) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r1, &(0x7f0000000380)={r5, r2, 0x9}) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video2\x00', 0x2, 0x0) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000100)=0x6, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000180)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000000280)=0xe8) sendto$packet(r2, &(0x7f0000000140)="0970cab6f32a4f8f1cf0aa3c75152155722c5db5344a7a84b4fdddd657d053732c3b6e03059d268cc3f74c189c42b93cbfde0e0ae0fd070e2c72436acb", 0x3d, 0x8000, &(0x7f00000002c0)={0x11, 0x6, r6, 0x1, 0x8, 0x6, @dev={[], 0xd}}, 0x14) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1ff, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x1b+\x86a\x957s\x16FA\x00'}}) [ 2136.628020][T18402] hfs: can't find a HFS filesystem on dev loop5 13:43:22 executing program 4 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x1) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000080)=0x542, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x80000001) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:22 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x4800000000000000}) 13:43:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000042c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2136.877356][T18439] FAULT_INJECTION: forcing a failure. [ 2136.877356][T18439] name failslab, interval 1, probability 0, space 0, times 0 [ 2136.891140][T18439] CPU: 1 PID: 18439 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2136.899145][T18439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2136.909210][T18439] Call Trace: [ 2136.912528][T18439] dump_stack+0x172/0x1f0 [ 2136.916879][T18439] should_fail.cold+0xa/0x15 [ 2136.921490][T18439] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2136.927329][T18439] ? ___might_sleep+0x163/0x280 [ 2136.932226][T18439] __should_failslab+0x121/0x190 [ 2136.937192][T18439] should_failslab+0x9/0x14 [ 2136.941712][T18439] kmem_cache_alloc_node_trace+0x270/0x720 [ 2136.947560][T18439] __kmalloc_node+0x3d/0x70 [ 2136.952155][T18439] kvmalloc_node+0xbd/0x100 [ 2136.956686][T18439] btrfs_mount_root+0x12b/0x1220 [ 2136.961632][T18439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2136.967882][T18439] ? btrfs_decode_error+0x70/0x70 [ 2136.972925][T18439] ? rcu_read_lock_sched_held+0x110/0x130 [ 2136.978669][T18439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2136.984917][T18439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2136.991261][T18439] ? vfs_parse_fs_string+0x111/0x170 [ 2136.996545][T18439] ? vfs_parse_fs_string+0x111/0x170 [ 2137.001835][T18439] ? rcu_read_lock_sched_held+0x110/0x130 [ 2137.007558][T18439] ? kfree+0x1fa/0x230 [ 2137.011630][T18439] ? vfs_parse_fs_string+0x116/0x170 [ 2137.016920][T18439] ? btrfs_decode_error+0x70/0x70 [ 2137.021947][T18439] legacy_get_tree+0xf2/0x200 [ 2137.026714][T18439] vfs_get_tree+0x123/0x450 [ 2137.031223][T18439] fc_mount+0x17/0xc0 [ 2137.035215][T18439] vfs_kern_mount.part.0+0xd8/0xf0 [ 2137.040380][T18439] vfs_kern_mount+0x40/0x60 [ 2137.044886][T18439] btrfs_mount+0x2b4/0x15e2 [ 2137.049399][T18439] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2137.055029][T18439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2137.061272][T18439] ? should_fail+0x1de/0x852 [ 2137.065867][T18439] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2137.071677][T18439] ? btrfs_remount+0x11f0/0x11f0 [ 2137.076624][T18439] ? rcu_read_lock_sched_held+0x110/0x130 [ 2137.082385][T18439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2137.088625][T18439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2137.094870][T18439] ? vfs_parse_fs_string+0x111/0x170 [ 2137.100158][T18439] ? vfs_parse_fs_string+0x111/0x170 [ 2137.105457][T18439] ? rcu_read_lock_sched_held+0x110/0x130 [ 2137.111184][T18439] ? kfree+0x1fa/0x230 [ 2137.115258][T18439] ? vfs_parse_fs_string+0x116/0x170 [ 2137.120558][T18439] ? btrfs_remount+0x11f0/0x11f0 [ 2137.125498][T18439] legacy_get_tree+0xf2/0x200 [ 2137.130359][T18439] ? btrfs_remount+0x11f0/0x11f0 [ 2137.135314][T18439] ? legacy_get_tree+0xf2/0x200 [ 2137.140183][T18439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2137.146424][T18439] vfs_get_tree+0x123/0x450 [ 2137.150935][T18439] do_mount+0x1436/0x2c40 [ 2137.155271][T18439] ? copy_mount_string+0x40/0x40 [ 2137.160216][T18439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2137.166546][T18439] ? copy_mount_options+0x280/0x3a0 [ 2137.171754][T18439] ksys_mount+0xdb/0x150 [ 2137.176005][T18439] __x64_sys_mount+0xbe/0x150 [ 2137.180692][T18439] do_syscall_64+0x103/0x610 [ 2137.185284][T18439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2137.191174][T18439] RIP: 0033:0x45b69a [ 2137.195066][T18439] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2137.214669][T18439] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:43:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x280200, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000080)={0x6, 0x3, 0x80000000}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000100)={0xfffffffffffffffb, 0xb, 0x2}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000080)=0x1e) [ 2137.223085][T18439] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2137.231064][T18439] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2137.239040][T18439] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2137.247011][T18439] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2137.254982][T18439] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\xa8\x1b+\x86a\x957s\x16FA\x00'}}) [ 2137.275548][T18437] hfs: can't find a HFS filesystem on dev loop5 13:43:22 executing program 4 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2137.380809][T18437] hfs: can't find a HFS filesystem on dev loop5 13:43:22 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x5, 0x20, 0xffffffffffffffff}}, 0x28) write$UHID_INPUT(r0, &(0x7f00000000c0)={0x8, "967401a548a2ad915c90e83293fbe6bd21f60723f6f69f5c20bd2996ba10d79b21c80cc19c9c8f5ca013fe5041b69ca1e8e311b8c37846cb24d85745bb21dfbf21a161d0d97fe2df08fca3491c89dd0f030b556d41037d2e2f948bc68ac33ac61fa72a306277d0034a20d928e44f6f0abc47f25249c78442e3f7eb564b7d454e96dbb48da71c69ff1d9431580cce512bd665fabacbc849c0d226f06f6704ae9d1c272c13e6d474f11f92d9adc7d153abfdae27b7d68b1dfbac9a2b31cccc6ce88fb35c4ec08a67daf29429341e3c3f3fde085734f857025a618a2936e7b0fb61feccfc51b6bf9147ed4039d7ee593e4ef34f1b270e1c272b67aaa7ad59775a274a36c202d6abcea89f6b605ab8b2ad24b88254ec4269e1d9491d7d27e3d0055787d8e93272851290075d323fb7108304f9d6fc573b20508c39766acfa4b5e3d80fece9aedf503c3e183d759afef8e0bece2c825ed7e7ac542373c7b0caac2d5295f0c7b537c2333be0a5bb98ac8c4abae4fbc29abcdda5f2d8d4b01f9efa2f7676193726a81483f7ca6866aa8f11951c1dcf9054bcca4ae6448102ee1a994923ae6c162f45079b1d3565f42c51b6ab30cdd63d3ef75dca47e711842b2f12e95138d6dfc9c76ca3411d54f5cfd2fc76ce03e59b420fc3c88619f343ed1ddf5bfa4f0964504896ae17351ee74261722916460a6a41c4f6f5b04715fa5525e5874895fd9643b5ea72616f9cabff2ff3c715a1af13f3dce3833ca7d7ad263e28826f1d4e66128c6de7ef413fedac48ada8f3441c8eefc7df5cac65246f796e145787eaed977481a9823a656af658a217ceed72a60c969f0f0c8c251c64466dda467732cfd1ca01857909e40ba55aabb16a4e499d13bdabd71e53f8093c75a984276b83f0bd5e374b3a4505d725f1d53a9b185a87d2fa9fefdfa8d022ae22cb6fd0b7be7f9f6ad49eaa52e3e8ca1e78f7a84c2e04da5732c336cab1c12b7ef08b7dcbd7f8079fb6c7611568c139697b9e1ca6992b2928904caf863808ab414d184a0da9b873425f78c3e51a4b4c50bc6f0b326049c32f199156803e258d4f460f0f453d731d511538e7144221c2c227789184f7bdb46cced2e51ffb9ace77cb9bdc56c9fefdd37d43be75d0d00ccc627e67607874825e698ec8487a6b75d55c440ea7bf416d45ae59264aed9ffc5dd2ac634bd60614a591a9d5eae40c1750d0fc3f182434a9e3426db8acf886771cf81bfffff987bc1434e25ec3276232892bb008f22633cf8643bd6726b02b49f4852d8820417f48f87f87d774bc70a6c9a7b812ab044336b14bdb2df7e545bcac1aac2d9ee440de775281f2cdc5ab9895cba54a3d3cf6b9111a65fe16706c5ad80a3b4662c69a93c37d5bb939e918e0d863aa1593c0d051d13c14437aef9fb33a52e33568dc3a0d2f0ca95e07671c3967e90592ba9f77790837b4ae8ce63252df06f140dc1c7ab114aedf80cf26c74cf2d410cac95bd7867cd971140373f16aa173416ae03b64400c9745c9d76913be29acbe79b769dcc5caf518a6fd6762add747855a55b12a83313ba4096d5fe8f421425af5f9486c49c98f030a44878f0b46449712e1c7372785c6c5a96084a6acb6457b8b1c4d5f9a48811bd2a003150e7b36d4a44d0eb52297659f6acc4a20a4b708ddb4730ed8f3c9a202c13cdeb3c848e075a6855110d9d6c1586852144a8c2a876123606eb60bdffccb8ad7d86b05444636f393db50b365e839b9f620ace2035c32a6c95384f9ca0eb7a1bf100e0ab612ffc26f1a92caf1c11cbc139c9dc17ea9229bf3e77ca4e1cdb7fb42ef313bb15e9152c0bf79ceaccc6d7e604d12b0426b83bc18d5241a67db10f4e9915f30c790f1b763f485ff16c888f84c0c1e33b8babe4f1398aea79f845a2be322b6637b98b7f0d9012d0cde5c4b99e523f4b2f3e757cb98c8cf7b986a23b84c8e22aa1b9ad3dfedb6fdd9179c752206df5607d6e220eddbdfc50aa5c8853b7a3190720f35addb0391cfbe03d74a644d0b78ea6bc0447c648f7bfad1f08ce9576b467d77646c288a79227e847378eca649f6039945208dcab9faf41c43790460d98c67854587601de82aca3fc25b8eb13a0bf431f54f281ac7abd6f7224f5f6a2269a06830e553e8489b7d7851e62b5d2fb7d7b16e25abc6b3514316cdee14a259584adb2bd7c17f33c5f4f663c084c1ed88c60757a8cf8eb6788ae912ca83eecda7eabb7eb1e683b268e797c39549dd0271389471a684773346563c2a0c02e7ebbf59869bef272b4ea5deb449e36293005c1d4c802a7190507b3644920bd87f1775d4b8e42733e8137ae32a77ebf2de13db147e2c649d3ac43d79b289b07896f849f77b184c01294020d1a2eb915da58eefba1fcdae6445df569ab41c7e48cbafb85032f11a992e8e12ad3576f9fa493f6068c0d1596670f7c3ec0d887ebd7436543c483058015501e080bae2edd989068543ac00d0a4ae7d82734c5b95fb91c648872a069a9c37d0ea423c968c1caa8ac620a945e55961c13c65207b13230a10f800b82614aafcd78d27046e354129ece582d23d4e382f363fa5f0c2ed985d2cf3cd0d3d4b3caade6ade7323ccc1a49bafab47ed257b3907ab32f64f64545aec0c284a9434169f09fe381859e71f9f85ad3e03a936e20ea8f287ab6b442551c43c0e7bded2eb30091f2702b2116b2591c8b83f3ca140090c2de1bf3a6cd4833e44a3a570e3c792bfc454423b81fd84b42b02b139676099d7e8c056fc17757f5bf16a53d6be886673ec35f7ffb5636bc061ab3789bdb362fd0aaa18582e45886be97c0294b0471c6dd0db8982ab849cca3d2b1f691d34e01a0c8648401d670a1979957859dcd3357e3c864a97bfe2060ab1b4476f82fe2bb3cabb33c880e487f1083d85156e6fd3833fc0d89867ba6c00149145d8b4df64f7cba96b7e72961ab6536ac85a9d6c2059007f674c509fd2682024c35c66660355b56100c28236e30d3b18dc2c400dc3d4842484dc7bc28411c3be97703ffac9f04d1405066d8978f7d08969da6ab616d49ce9ea6cef0513da8b436524ad61a1a994093acc36ff38cd7c8336f12224f271f3c5a455844ad6f576d8154bf45afbd916007e4e3e69e9430db29da06193ae3fb69c09395eaa76dc783eeb7e484ed9e1a930c802d7357be09419905ebda5c6dce13422034b0d59647f68a86631eb0c5ae7836439fa417de6c1b8436b6a467401ecae72da9dc2f5fad4986327be22b38c18f0a2c9df8b91bf5ae3a56109b08d3e6000312dc2ca23e859c80fdf7bdf67966f4d495655dcf0c13d5dc19ed90ae04577868b5858fc9da0f9006b99fe4be9a3cc4ddafc48e2661bef4b2b5df89d36ed98f1f88dde2cc1a92ee55dc185a1cf0039a49f970085d37c117ce4ab1b3cd2571852823b4897755e7aa3c6b81399ec56798dabd8044c3206a89880b06158400c87072c068eda9be879c3705b6c5b2b9ea3ea1409aade36e31dc16d49629464fa112f59666dddef9682105bd483703ba1c762084e5fb06fb2eaf41dbe697958f909abe2d96efdc74499d456319ec6b1f4bda16f8fd7cf4b9d0724d88b2ec3abd0ae29bee6377ff5a9e873f2abcc041e5cc142aa89501d1de765276f21b02595a0c110f0582d4a4bf36b926c63156bae97e8785860724b350d645b5cc026984d3871f9cff4dbf2a62ded5cc6ded2ba25eccbc0c6a9c063161635715a486c33ca252917e49ade4eed18cf36baad5b245000a9cbba7971661dc9e7b3facc3158250fc0113d07516c86e70e5754998a7f349d0083d1f5d1624dc9c843fd632433f3edd5e1dafc78d7b5532a6cf5e71665aef56d88caaf3c71e7d70055f0b169302fb0c328c790cb2ef0faa1b532ad442c84b20e1636c7efe6d5bf1febebc58a9a44d88ab2cef754728bfbf55018cb1f0b23ec02437819d9a6cb43c7cfc578569137a5b962f6f3d9adc4c2761d70cde62a9cc2d12d77fc4f20c3035b8614533e7a44d4f9ca7c0934c6f9962650a5b87089073ed18912c78ea92be00dfcf12a08db4790cc0b7ba46dccb0b5750cc28eab33f234bbd632ca3559d968e631c8302546bb129a3d9b646cb55eeaae9898186a20c0e315cce1c426700e48fb7598c35ee962b000dbf87c43944e7792f69276ab98ef955c096892e3422ec344cff52ea46bc5ac248cdc29f16e0346ca34dcfbaf0ed7bf3ab0de22dfdef2a59e56c9ee844c5246e76515a9dbfd1b15bc5e1676523930685462bfc7159eab017686604ee916839d0491527e5f65444f63e5a4fe5f77f0be65358ad3448678339476007a235f17abf42f4906f3748f4407382b31d48230db8fce6ca0d11090e283e366d2614b24adf12b93e5d93eb74514b65a98c3791b0b360119dbb9a379e48a430e0f31c98310eab46380c555edc4b4632d8ff0b9d005313b9a5373b96ab7d94e98f1515703a05e79bc6a4a2b02c1dbd9dc943543a37d5444c7eb818a9dc3121eba493effc082f305240e0f716379da68d8ad2e0d804b29593c6bc879a2b3d3eeb6b90ff8d0618e2cfd448589701b1f0baec7e8ca57906cea369c8d078538b8247c492f793400d71f4bbd71ccf6c1db58032512d44dfc12a1de860ff9c702c9b72a47cf7749f17a926a11349c86b959cb1febce1db38421d68623e1ac2f0d936049c9325264c69f3f3102aafad9a39f895e17dfd2548534bede8678da4b8f99f7e995610332f303565f38cfc10b3297b690aafee6fd32c427f282ccaefed731ff7ce5320852a6be05f86d4d449e6f34a30f2e1a55b5855463cd3c279099b49479dc8421275f8a68272f7401387be0d54a1c7f1bee1ad5cdd6760b8a0d2e5d47ef2d1a0f79189c48d04efbb27a20c414b7d62bd2453e920c05cdb2b73a527176cb92e089769d4d57a5fda938782e18c0957c62ec022c8b37c0f7339d5ef2564ce83bd40ea4dcf1ce084ea252ebf234d1513de66af05c4accb8e3712d7f15f237741c620e75854ed80b1e221b5e7159f85c2ed5e0be0ca5fbe3244d54635fcb894ff9c45793cad711fdff7892e4f3f9426f5cf9d709129f767d6110e19c9f77f96977e26432183bea4967ba8493f008eeb06d3cce926c8755c31e75d67bc382b8f8047ac1828302c416a652e811fe61bcd5fedb5c23c6b7db48d83df3c67832e6351d328d3201aab49e6ac0b0b6d4a1edc0abb0065103ee59d4c80185911afec43b1c7dca3f9c0b0061bb504a42524314a288f1942b854f9d61ac079e2b5faa0723c708f4555529466f869308a4ff06d4a35b829a597bce88f2f87162a23007665887ceb9f0a28b05f32b425e9f20cd30297c7117b121303695f3d02defae04528c9a7be62b725050f1c7f2e391f9ef5b0f224b6f8fc1afa71476e69bbd114447ae163dceb01f9bd2f827aad7c47e7fd63817e28eae2436c247998c80171cab1dbeb88c730c0ae9bfc13ad2ddd85e7bd0fd8f8ab7b12e2bddc9d077b34b95babf18f73db31783e719c0d552115d341d4dd7e4d2987506a4d84a3a87fe171f91c2069e312dc1ea66f70d4b8237cd6a18bc444dfc04e2b735689224e29bfc466e98d6550cb439440645b80c98c290c4b2b555e61b63c8726033f3e388ff491983439087bbf9e6d1435496cefa4c3d9b944e1651e15daadba98c13abad24a2599480b0287daaf9e3e3f6b866f9a9dd82055182d8a3bcd3c570617cffb54f8dfd67bd5d448bea304d69018491a54b4db3c2bc28b76cc025bd7e561da37e2d35026fbbeef0abc10ddc1954a5bdae5ec9d5d1dac410033ffa3c", 0x1000}, 0x1006) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000043c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:22 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x4c00000000000000}) 13:43:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000080)={0x9, 0x8, 0x4, 0x1008, {}, {0x7, 0xc, 0x76f0, 0x9, 0x2, 0x7, 'IHRA'}, 0x1f, 0x3, @userptr=0xfffffffffffffffe, 0x4}) 13:43:23 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) shutdown(r0, 0x1) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xf8, r3, 0x101, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_BEARER={0xd8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x5, @mcast2, 0x9}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @ipv4={[], [], @local}, 0x8}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}}}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'ip6erspan0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1ff}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4080}, 0x4000) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r4, 0x0, 0x0, 0x0) [ 2137.663626][T18464] hfs: can't find a HFS filesystem on dev loop5 [ 2137.694529][T18467] FAULT_INJECTION: forcing a failure. [ 2137.694529][T18467] name failslab, interval 1, probability 0, space 0, times 0 13:43:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) fstatfs(r0, &(0x7f0000000000)) timer_create(0x5, &(0x7f0000000100)={0x0, 0x4, 0x3, @thr={&(0x7f0000000080)="80b4e4abf143a121f9fd1c904b7448875d1b29c0d2ef9b763c211c1a5e31ed67dc7304", &(0x7f00000000c0)="4202c1a4ed778f3ec0a606d06fc3b1163c86a22a7131f87030491367f13d4dd5cf"}}, &(0x7f0000000140)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) r3 = accept4$netrom(r1, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000200)) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20, 0x0, 0x1, {0x9, 0x4, 0x5e35, 0x800}}, 0x20) [ 2137.709027][T18467] CPU: 1 PID: 18467 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2137.717034][T18467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2137.727133][T18467] Call Trace: [ 2137.730466][T18467] dump_stack+0x172/0x1f0 [ 2137.734834][T18467] should_fail.cold+0xa/0x15 [ 2137.739546][T18467] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2137.745379][T18467] ? ___might_sleep+0x163/0x280 [ 2137.750255][T18467] __should_failslab+0x121/0x190 [ 2137.755222][T18467] should_failslab+0x9/0x14 [ 2137.759748][T18467] kmem_cache_alloc_node_trace+0x270/0x720 [ 2137.765574][T18467] __kmalloc_node+0x3d/0x70 [ 2137.770091][T18467] kvmalloc_node+0xbd/0x100 [ 2137.774609][T18467] btrfs_mount_root+0x12b/0x1220 [ 2137.779559][T18467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2137.785808][T18467] ? btrfs_decode_error+0x70/0x70 [ 2137.790839][T18467] ? rcu_read_lock_sched_held+0x110/0x130 [ 2137.796563][T18467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2137.802916][T18467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2137.809164][T18467] ? vfs_parse_fs_string+0x111/0x170 [ 2137.814461][T18467] ? vfs_parse_fs_string+0x111/0x170 [ 2137.819773][T18467] ? rcu_read_lock_sched_held+0x110/0x130 [ 2137.825600][T18467] ? kfree+0x1fa/0x230 [ 2137.829674][T18467] ? vfs_parse_fs_string+0x116/0x170 [ 2137.834980][T18467] ? btrfs_decode_error+0x70/0x70 [ 2137.840009][T18467] legacy_get_tree+0xf2/0x200 [ 2137.844690][T18467] vfs_get_tree+0x123/0x450 [ 2137.849207][T18467] fc_mount+0x17/0xc0 [ 2137.853197][T18467] vfs_kern_mount.part.0+0xd8/0xf0 [ 2137.858316][T18467] vfs_kern_mount+0x40/0x60 [ 2137.862823][T18467] btrfs_mount+0x2b4/0x15e2 [ 2137.867332][T18467] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2137.872977][T18467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2137.879219][T18467] ? should_fail+0x1de/0x852 [ 2137.883814][T18467] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2137.889642][T18467] ? btrfs_remount+0x11f0/0x11f0 [ 2137.894596][T18467] ? rcu_read_lock_sched_held+0x110/0x130 [ 2137.900403][T18467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2137.906648][T18467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2137.912889][T18467] ? vfs_parse_fs_string+0x111/0x170 [ 2137.918180][T18467] ? vfs_parse_fs_string+0x111/0x170 [ 2137.923564][T18467] ? rcu_read_lock_sched_held+0x110/0x130 [ 2137.929304][T18467] ? kfree+0x1fa/0x230 [ 2137.933383][T18467] ? vfs_parse_fs_string+0x116/0x170 [ 2137.938679][T18467] ? btrfs_remount+0x11f0/0x11f0 [ 2137.943653][T18467] legacy_get_tree+0xf2/0x200 [ 2137.948333][T18467] ? btrfs_remount+0x11f0/0x11f0 [ 2137.953281][T18467] ? legacy_get_tree+0xf2/0x200 [ 2137.958224][T18467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2137.964643][T18467] vfs_get_tree+0x123/0x450 [ 2137.969152][T18467] do_mount+0x1436/0x2c40 [ 2137.973499][T18467] ? copy_mount_string+0x40/0x40 [ 2137.978442][T18467] ? _copy_from_user+0xdd/0x150 [ 2137.983304][T18467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2137.989635][T18467] ? copy_mount_options+0x280/0x3a0 [ 2137.995102][T18467] ksys_mount+0xdb/0x150 [ 2137.999356][T18467] __x64_sys_mount+0xbe/0x150 [ 2138.004048][T18467] do_syscall_64+0x103/0x610 [ 2138.008648][T18467] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2138.014546][T18467] RIP: 0033:0x45b69a [ 2138.018442][T18467] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2138.038068][T18467] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2138.046485][T18467] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2138.054457][T18467] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2138.062544][T18467] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2138.070524][T18467] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2138.078505][T18467] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x1c+\x86a\x957s\x16FA\x00'}}) 13:43:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000044c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2138.154625][T18464] hfs: can't find a HFS filesystem on dev loop5 13:43:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x960) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:23 executing program 4 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:23 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x4d50000000000000}) 13:43:23 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x200000, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x28, &(0x7f0000000100)}, 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffffff, 0x311000) getsockname$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000080)=0x10) connect$rds(r0, &(0x7f0000000180)={0x2, 0x4e24, @local}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000300)=0xe, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000080)=0x8) readv(r1, &(0x7f0000000280)=[{&(0x7f0000000140)=""/133, 0x85}, {&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000240)=""/50, 0x32}], 0x3) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x97a0, 0x400) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0x80045500, &(0x7f0000000100)) 13:43:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x1d+\x86a\x957s\x16FA\x00'}}) [ 2138.413902][T18493] FAULT_INJECTION: forcing a failure. [ 2138.413902][T18493] name failslab, interval 1, probability 0, space 0, times 0 [ 2138.471312][T18493] CPU: 1 PID: 18493 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2138.479333][T18493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2138.479339][T18493] Call Trace: [ 2138.479365][T18493] dump_stack+0x172/0x1f0 [ 2138.479385][T18493] should_fail.cold+0xa/0x15 [ 2138.479402][T18493] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2138.479422][T18493] ? ___might_sleep+0x163/0x280 [ 2138.479438][T18493] __should_failslab+0x121/0x190 [ 2138.479452][T18493] should_failslab+0x9/0x14 [ 2138.479468][T18493] kmem_cache_alloc_node_trace+0x270/0x720 [ 2138.479493][T18493] __kmalloc_node+0x3d/0x70 [ 2138.479512][T18493] kvmalloc_node+0xbd/0x100 [ 2138.479528][T18493] btrfs_mount_root+0x12b/0x1220 [ 2138.479545][T18493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2138.479560][T18493] ? btrfs_decode_error+0x70/0x70 [ 2138.479580][T18493] ? rcu_read_lock_sched_held+0x110/0x130 [ 2138.536905][T18493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2138.565197][T18493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2138.571459][T18493] ? vfs_parse_fs_string+0x111/0x170 [ 2138.576751][T18493] ? vfs_parse_fs_string+0x111/0x170 [ 2138.582049][T18493] ? rcu_read_lock_sched_held+0x110/0x130 [ 2138.587774][T18493] ? kfree+0x1fa/0x230 [ 2138.592166][T18493] ? vfs_parse_fs_string+0x116/0x170 [ 2138.597541][T18493] ? btrfs_decode_error+0x70/0x70 [ 2138.602665][T18493] legacy_get_tree+0xf2/0x200 [ 2138.607351][T18493] vfs_get_tree+0x123/0x450 [ 2138.611859][T18493] fc_mount+0x17/0xc0 [ 2138.615843][T18493] vfs_kern_mount.part.0+0xd8/0xf0 [ 2138.620959][T18493] vfs_kern_mount+0x40/0x60 [ 2138.625467][T18493] btrfs_mount+0x2b4/0x15e2 [ 2138.629972][T18493] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2138.635707][T18493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2138.641953][T18493] ? should_fail+0x1de/0x852 [ 2138.646542][T18493] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2138.652367][T18493] ? btrfs_remount+0x11f0/0x11f0 [ 2138.657319][T18493] ? rcu_read_lock_sched_held+0x110/0x130 [ 2138.663043][T18493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2138.669636][T18493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2138.675969][T18493] ? vfs_parse_fs_string+0x111/0x170 [ 2138.681264][T18493] ? vfs_parse_fs_string+0x111/0x170 [ 2138.686552][T18493] ? rcu_read_lock_sched_held+0x110/0x130 [ 2138.692281][T18493] ? kfree+0x1fa/0x230 [ 2138.696355][T18493] ? vfs_parse_fs_string+0x116/0x170 [ 2138.701643][T18493] ? btrfs_remount+0x11f0/0x11f0 [ 2138.706589][T18493] legacy_get_tree+0xf2/0x200 [ 2138.711358][T18493] ? btrfs_remount+0x11f0/0x11f0 [ 2138.716296][T18493] ? legacy_get_tree+0xf2/0x200 [ 2138.721154][T18493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2138.727446][T18493] vfs_get_tree+0x123/0x450 [ 2138.731955][T18493] do_mount+0x1436/0x2c40 [ 2138.736292][T18493] ? copy_mount_string+0x40/0x40 [ 2138.741246][T18493] ? copy_mount_options+0x1fb/0x3a0 [ 2138.746533][T18493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2138.752793][T18493] ? copy_mount_options+0x280/0x3a0 [ 2138.758002][T18493] ksys_mount+0xdb/0x150 [ 2138.762265][T18493] __x64_sys_mount+0xbe/0x150 [ 2138.766949][T18493] do_syscall_64+0x103/0x610 [ 2138.771636][T18493] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2138.777526][T18493] RIP: 0033:0x45b69a [ 2138.781422][T18493] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2138.801039][T18493] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2138.809500][T18493] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a 13:43:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000045c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:24 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/userio\x00', 0x2, 0x0) fcntl$setflags(r0, 0x2, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4, 0x2}}, 0x10) [ 2138.817475][T18493] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2138.825446][T18493] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2138.833424][T18493] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2138.841482][T18493] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2138.859779][T18501] hfs: can't find a HFS filesystem on dev loop5 13:43:24 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x880) sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xb8, r0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4a7}]}, 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) ioctl$PPPIOCDISCONN(r4, 0x7439) 13:43:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x1e+\x86a\x957s\x16FA\x00'}}) 13:43:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x28080, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f00000001c0)={0x4, 0x5}) r3 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f0000000180)={0x0, 0x0, 0x3}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f0000000140)={0x0, &(0x7f0000000100), 0x0, r0, 0x1}) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2138.959677][T18501] hfs: can't find a HFS filesystem on dev loop5 13:43:24 executing program 4 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:24 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x5354000000000000}) 13:43:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$adsp(&(0x7f0000000400)='/dev/adsp#\x00', 0x755, 0x8000) accept4$nfc_llcp(r1, &(0x7f0000000440), &(0x7f00000004c0)=0x60, 0x80000) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) 13:43:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x1f+\x86a\x957s\x16FA\x00'}}) [ 2139.226749][T18524] FAULT_INJECTION: forcing a failure. [ 2139.226749][T18524] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2139.240001][T18524] CPU: 1 PID: 18524 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2139.247987][T18524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2139.258072][T18524] Call Trace: [ 2139.261374][T18524] dump_stack+0x172/0x1f0 [ 2139.265712][T18524] should_fail.cold+0xa/0x15 [ 2139.270308][T18524] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2139.276126][T18524] ? __lock_acquire+0x548/0x3fb0 [ 2139.281095][T18524] should_fail_alloc_page+0x50/0x60 [ 2139.286299][T18524] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2139.291685][T18524] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2139.297403][T18524] ? find_held_lock+0x35/0x130 [ 2139.302201][T18524] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2139.308029][T18524] cache_grow_begin+0x9c/0x860 [ 2139.312802][T18524] ? getname_kernel+0x53/0x370 [ 2139.317566][T18524] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2139.323810][T18524] kmem_cache_alloc+0x62d/0x6f0 [ 2139.328661][T18524] ? fc_mount+0x17/0xc0 [ 2139.332839][T18524] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 2139.338125][T18524] ? vfs_kern_mount+0x40/0x60 [ 2139.342811][T18524] ? legacy_get_tree+0xf2/0x200 [ 2139.347666][T18524] getname_kernel+0x53/0x370 [ 2139.352269][T18524] kern_path+0x20/0x40 [ 2139.356362][T18524] lookup_bdev.part.0+0x7b/0x1b0 [ 2139.361300][T18524] ? blkdev_open+0x290/0x290 [ 2139.365897][T18524] ? lock_downgrade+0x880/0x880 [ 2139.370768][T18524] blkdev_get_by_path+0x81/0x130 [ 2139.375717][T18524] btrfs_scan_one_device+0xd3/0x720 [ 2139.380920][T18524] ? kfree+0x173/0x230 [ 2139.380965][T18524] ? device_list_add+0x14d0/0x14d0 [ 2139.390138][T18524] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 2139.395958][T18524] ? btrfs_mount_root+0xb36/0x1220 [ 2139.401075][T18524] btrfs_mount_root+0x718/0x1220 [ 2139.401096][T18524] ? btrfs_decode_error+0x70/0x70 [ 2139.401116][T18524] ? rcu_read_lock_sched_held+0x110/0x130 [ 2139.416764][T18524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2139.416779][T18524] ? vfs_parse_fs_string+0x111/0x170 [ 2139.416791][T18524] ? vfs_parse_fs_string+0x111/0x170 [ 2139.416806][T18524] ? rcu_read_lock_sched_held+0x110/0x130 [ 2139.416820][T18524] ? kfree+0x1fa/0x230 [ 2139.416836][T18524] ? vfs_parse_fs_string+0x116/0x170 [ 2139.428334][T18524] ? btrfs_decode_error+0x70/0x70 [ 2139.428351][T18524] legacy_get_tree+0xf2/0x200 [ 2139.428367][T18524] vfs_get_tree+0x123/0x450 [ 2139.428384][T18524] fc_mount+0x17/0xc0 [ 2139.428405][T18524] vfs_kern_mount.part.0+0xd8/0xf0 [ 2139.471910][T18524] vfs_kern_mount+0x40/0x60 [ 2139.476420][T18524] btrfs_mount+0x2b4/0x15e2 [ 2139.481127][T18524] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2139.486887][T18524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2139.493127][T18524] ? should_fail+0x1de/0x852 [ 2139.497755][T18524] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2139.503566][T18524] ? btrfs_remount+0x11f0/0x11f0 [ 2139.508517][T18524] ? rcu_read_lock_sched_held+0x110/0x130 [ 2139.514235][T18524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2139.520489][T18524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2139.526736][T18524] ? vfs_parse_fs_string+0x111/0x170 [ 2139.532029][T18524] ? vfs_parse_fs_string+0x111/0x170 [ 2139.537319][T18524] ? rcu_read_lock_sched_held+0x110/0x130 [ 2139.543052][T18524] ? kfree+0x1fa/0x230 [ 2139.547124][T18524] ? vfs_parse_fs_string+0x116/0x170 [ 2139.552420][T18524] ? btrfs_remount+0x11f0/0x11f0 [ 2139.557359][T18524] legacy_get_tree+0xf2/0x200 [ 2139.562041][T18524] ? btrfs_remount+0x11f0/0x11f0 [ 2139.566980][T18524] ? legacy_get_tree+0xf2/0x200 [ 2139.571829][T18524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2139.578163][T18524] vfs_get_tree+0x123/0x450 [ 2139.582673][T18524] do_mount+0x1436/0x2c40 [ 2139.587008][T18524] ? copy_mount_string+0x40/0x40 [ 2139.591960][T18524] ? _copy_from_user+0xdd/0x150 [ 2139.596820][T18524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2139.603066][T18524] ? copy_mount_options+0x280/0x3a0 [ 2139.608271][T18524] ksys_mount+0xdb/0x150 [ 2139.612956][T18524] __x64_sys_mount+0xbe/0x150 [ 2139.617640][T18524] do_syscall_64+0x103/0x610 [ 2139.622236][T18524] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2139.628136][T18524] RIP: 0033:0x45b69a [ 2139.632037][T18524] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2139.651741][T18524] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2139.660200][T18524] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2139.668269][T18524] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 13:43:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000046c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:25 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = msgget$private(0x0, 0x5) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000140)=""/128) r1 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x7fff, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000100)=0x1, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bd070f6da9971f092c017f73b8cf5afe6d5788075d3e071c1ac8a696592349e5a7bef6f36b1327ebc6065e0e4783eb3d6bf0f3e7016fd6c73edd185a27ef6e8045692eb78c15277085b4474e6e04b048c624538cd325ce5526b5d8d6e9dbca35985ea80f2fa8883c73ca06f9e966aa3e1ddedeec88be3a0bc17816decc1add15662d66b7203a1e8f7e4ea23a7ca680620bc4dab6edf32fb2f62322ec7efe698b92b33c7") io_uring_setup(0x587, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x66}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) [ 2139.676245][T18524] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2139.684215][T18524] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2139.695746][T18524] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2139.722677][T18530] hfs: can't find a HFS filesystem on dev loop5 13:43:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000000)=0x400, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") writev(r0, &(0x7f0000001340)=[{&(0x7f0000000080)="257477394055d0d2e9f43b4eda3a785daa33a66860456d91627a59f6ff027ea83e92d8b3ec072f6ac33f9642a654487ec79de3e57783a42d9481122853ed6c450223e6306c193c7b71e1c2c6e7e20a265a8787ccf6d010", 0x57}, {&(0x7f0000000100)="482c2727c432e426f9c5b166986b2ae33c66150aa6388bdcd0a2890ba986e1ece0dbd75a986e72dc81a40f4822b10b57fcf31a0ce75414141d9a1fd6ccae61907092c4b0b9cdd813ddb474315983a8c9781f214d2818ca5ddd0454cd01b0437463061e2aa126b0530d9fd63cb1c125c720b51f032335dc76be496db55c3755f76a3fb058351bf37652260baaf51b933f9bf9377217e329899263b0e440a82a1a3baa812c82a2c965a2754afb14d976e5541d48cdefbdc32129a5", 0xba}, {&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="8fc45eb34366974ceadd09eee28c135135e4212be130a684d83ce24494cb4ccc665045f53f7a99b41202a1bc0d7bab3e351099b8648fcc85a33422a0698a228856772fa53c9ecdc9c2b7f81d1e72c3c24a3573c3d4147171fd5df8f43068f8130ea24c6d586e74073e3bbe293df6c4b92192ac8b8c0f6ca47d7326741b7b3126ff4ec53a2ad2df39d4b2f399b02953c3cea26db0955d0dbd497b9ce073de18f21868a1ec818b6229030e389e9f320f56491894abab3e702aa67642ce725def49b5691117960065cb777a558023c17d6e0b5839506a056a27b782cb78bcc2ec", 0xdf}, {&(0x7f00000012c0)="3629cf1d815de782714349828b8d70bca2605391f633ad032e6f9a5360ccc671d87bbb2a6a7caf4e4a25d14f4f012ddbb590e4acea2f36599d81f66160338107152832ffacf6311c6d6caf97bdef9270d557aebc109529d78c999b90418e1c8897619ebaba572ba6f9f8787388a9eda23ef63839d57ac4d1d8138f", 0x7b}], 0x5) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = accept4$netrom(r1, 0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000001400)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000013c0)={0x0, 0x2, 0x3, 0x0, 0x3ff}) ioctl$TCSBRKP(r3, 0x5425, 0x0) 13:43:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00 +\x86a\x957s\x16FA\x00'}}) [ 2139.850565][T18530] hfs: can't find a HFS filesystem on dev loop5 13:43:25 executing program 4 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:25 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x6000000000000000}) 13:43:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x800) 13:43:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000047c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2140.049186][T18553] FAULT_INJECTION: forcing a failure. [ 2140.049186][T18553] name failslab, interval 1, probability 0, space 0, times 0 [ 2140.126923][T18553] CPU: 0 PID: 18553 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2140.134952][T18553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2140.145017][T18553] Call Trace: [ 2140.148328][T18553] dump_stack+0x172/0x1f0 [ 2140.152683][T18553] should_fail.cold+0xa/0x15 [ 2140.157420][T18553] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2140.163245][T18553] ? ___might_sleep+0x163/0x280 [ 2140.168130][T18553] __should_failslab+0x121/0x190 [ 2140.173095][T18553] should_failslab+0x9/0x14 [ 2140.177643][T18553] __kmalloc_track_caller+0x2d8/0x740 [ 2140.183039][T18553] ? btrfs_mount_root+0x1d0/0x1220 [ 2140.188165][T18553] ? rcu_read_lock_sched_held+0x110/0x130 [ 2140.188185][T18553] ? btrfs_mount_root+0x2b8/0x1220 [ 2140.188206][T18553] kstrdup+0x3a/0x70 [ 2140.188221][T18553] btrfs_mount_root+0x2b8/0x1220 [ 2140.188238][T18553] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2140.188252][T18553] ? btrfs_decode_error+0x70/0x70 [ 2140.188267][T18553] ? rcu_read_lock_sched_held+0x110/0x130 13:43:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) connect$rds(r1, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") readv(r0, &(0x7f00000014c0)=[{&(0x7f0000000080)=""/127, 0x7f}, {&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000100)=""/152, 0x98}, {&(0x7f00000001c0)=""/177, 0xb1}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f00000002c0)=""/160, 0xa0}, {&(0x7f0000000380)=""/104, 0x68}, {&(0x7f0000000400)=""/175, 0xaf}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x9) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000001580)=0xc50) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2140.188278][T18553] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2140.188291][T18553] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2140.188306][T18553] ? vfs_parse_fs_string+0x111/0x170 [ 2140.188317][T18553] ? vfs_parse_fs_string+0x111/0x170 [ 2140.188328][T18553] ? rcu_read_lock_sched_held+0x110/0x130 [ 2140.188340][T18553] ? kfree+0x1fa/0x230 [ 2140.188350][T18553] ? vfs_parse_fs_string+0x116/0x170 [ 2140.188365][T18553] ? btrfs_decode_error+0x70/0x70 [ 2140.188379][T18553] legacy_get_tree+0xf2/0x200 13:43:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) sendto$netrom(r1, &(0x7f0000000000)="3389f4650bda32a0038bf587eef0f4d0ad70", 0x12, 0x800, &(0x7f0000000080)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x8}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) 13:43:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00!+\x86a\x957s\x16FA\x00'}}) [ 2140.188397][T18553] vfs_get_tree+0x123/0x450 [ 2140.203130][T18553] fc_mount+0x17/0xc0 [ 2140.203150][T18553] vfs_kern_mount.part.0+0xd8/0xf0 [ 2140.203164][T18553] vfs_kern_mount+0x40/0x60 [ 2140.203182][T18553] btrfs_mount+0x2b4/0x15e2 [ 2140.203197][T18553] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2140.203211][T18553] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2140.203224][T18553] ? should_fail+0x1de/0x852 [ 2140.203238][T18553] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2140.203257][T18553] ? btrfs_remount+0x11f0/0x11f0 [ 2140.237707][T18553] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2140.237724][T18553] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2140.237741][T18553] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2140.237757][T18553] ? retint_kernel+0x2d/0x2d [ 2140.237772][T18553] ? trace_hardirqs_on_caller+0x6a/0x220 [ 2140.237790][T18553] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2140.237807][T18553] ? retint_kernel+0x2d/0x2d [ 2140.237826][T18553] ? btrfs_remount+0x11f0/0x11f0 [ 2140.237844][T18553] legacy_get_tree+0xf2/0x200 [ 2140.237856][T18553] ? btrfs_remount+0x11f0/0x11f0 [ 2140.237869][T18553] ? legacy_get_tree+0xf2/0x200 [ 2140.237887][T18553] vfs_get_tree+0x123/0x450 [ 2140.237902][T18553] do_mount+0x1436/0x2c40 [ 2140.237921][T18553] ? copy_mount_string+0x40/0x40 [ 2140.248589][T18553] ? copy_mount_options+0x198/0x3a0 [ 2140.248605][T18553] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 2140.248620][T18553] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2140.248631][T18553] ? copy_mount_options+0x280/0x3a0 [ 2140.248649][T18553] ksys_mount+0xdb/0x150 [ 2140.248666][T18553] __x64_sys_mount+0xbe/0x150 [ 2140.248686][T18553] do_syscall_64+0x103/0x610 [ 2140.248705][T18553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2140.248715][T18553] RIP: 0033:0x45b69a [ 2140.248729][T18553] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2140.248737][T18553] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2140.248750][T18553] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2140.248757][T18553] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2140.248765][T18553] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2140.248773][T18553] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2140.248782][T18553] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:26 executing program 4 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2140.588190][T18573] hfs: can't find a HFS filesystem on dev loop5 13:43:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9d, 0x100) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 13:43:26 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x6800000000000000}) 13:43:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000048c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2140.740517][T18583] FAULT_INJECTION: forcing a failure. [ 2140.740517][T18583] name failslab, interval 1, probability 0, space 0, times 0 [ 2140.828564][T18583] CPU: 0 PID: 18583 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2140.836283][T18589] hfs: can't find a HFS filesystem on dev loop5 [ 2140.836939][T18583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2140.836945][T18583] Call Trace: [ 2140.836972][T18583] dump_stack+0x172/0x1f0 [ 2140.836991][T18583] should_fail.cold+0xa/0x15 [ 2140.837009][T18583] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2140.837041][T18583] ? ___might_sleep+0x163/0x280 [ 2140.837063][T18583] __should_failslab+0x121/0x190 [ 2140.837077][T18583] should_failslab+0x9/0x14 [ 2140.837098][T18583] kmem_cache_alloc_trace+0x2d1/0x760 [ 2140.891149][T18583] ? kasan_kmalloc+0x9/0x10 [ 2140.895685][T18583] btrfs_mount_root+0x1d0/0x1220 [ 2140.900746][T18583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2140.907010][T18583] ? btrfs_decode_error+0x70/0x70 [ 2140.912068][T18583] ? rcu_read_lock_sched_held+0x110/0x130 [ 2140.917795][T18583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2140.924048][T18583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2140.930378][T18583] ? vfs_parse_fs_string+0x111/0x170 [ 2140.935667][T18583] ? vfs_parse_fs_string+0x111/0x170 [ 2140.940957][T18583] ? rcu_read_lock_sched_held+0x110/0x130 [ 2140.946788][T18583] ? kfree+0x1fa/0x230 [ 2140.950859][T18583] ? vfs_parse_fs_string+0x116/0x170 [ 2140.956148][T18583] ? btrfs_decode_error+0x70/0x70 [ 2140.961201][T18583] legacy_get_tree+0xf2/0x200 [ 2140.965897][T18583] vfs_get_tree+0x123/0x450 [ 2140.970496][T18583] fc_mount+0x17/0xc0 [ 2140.974482][T18583] vfs_kern_mount.part.0+0xd8/0xf0 [ 2140.981768][T18583] vfs_kern_mount+0x40/0x60 [ 2140.986277][T18583] btrfs_mount+0x2b4/0x15e2 [ 2140.990873][T18583] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2140.996504][T18583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2141.002833][T18583] ? should_fail+0x1de/0x852 [ 2141.007431][T18583] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2141.013242][T18583] ? btrfs_remount+0x11f0/0x11f0 [ 2141.018191][T18583] ? rcu_read_lock_sched_held+0x110/0x130 [ 2141.023907][T18583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2141.030247][T18583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2141.036492][T18583] ? vfs_parse_fs_string+0x111/0x170 [ 2141.041777][T18583] ? vfs_parse_fs_string+0x111/0x170 [ 2141.047066][T18583] ? rcu_read_lock_sched_held+0x110/0x130 [ 2141.052788][T18583] ? kfree+0x1fa/0x230 [ 2141.056861][T18583] ? vfs_parse_fs_string+0x116/0x170 [ 2141.062156][T18583] ? btrfs_remount+0x11f0/0x11f0 [ 2141.067096][T18583] legacy_get_tree+0xf2/0x200 [ 2141.071775][T18583] ? btrfs_remount+0x11f0/0x11f0 [ 2141.076716][T18583] ? legacy_get_tree+0xf2/0x200 [ 2141.081565][T18583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2141.087806][T18583] vfs_get_tree+0x123/0x450 [ 2141.092309][T18583] do_mount+0x1436/0x2c40 [ 2141.096646][T18583] ? copy_mount_string+0x40/0x40 [ 2141.101589][T18583] ? _copy_from_user+0xdd/0x150 [ 2141.106446][T18583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2141.112683][T18583] ? copy_mount_options+0x280/0x3a0 [ 2141.117885][T18583] ksys_mount+0xdb/0x150 [ 2141.122130][T18583] __x64_sys_mount+0xbe/0x150 [ 2141.126817][T18583] do_syscall_64+0x103/0x610 [ 2141.131420][T18583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2141.137312][T18583] RIP: 0033:0x45b69a [ 2141.141208][T18583] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2141.161172][T18583] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2141.169607][T18583] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a 13:43:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) uname(&(0x7f00000000c0)=""/66) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) syz_genetlink_get_family_id$tipc2(0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000004c0)=@sack_info={0x0, 0x75a, 0x2}, &(0x7f0000000500)=0xc) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000140)={r5, 0x4}, &(0x7f0000000180)=0x8) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2141.177581][T18583] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2141.185640][T18583] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2141.193723][T18583] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2141.201789][T18583] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x0e!+\x86a\x957s\x16FA\x00'}}) 13:43:26 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x6c00000000000000}) 13:43:26 executing program 4 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:26 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl(0xffffffffffffffff, 0x9, &(0x7f0000000080)="2fcfd73629ae7e9222a76a038fcb224b6bd0264b368c31ecfe813fc93ee87f550d77df085e354001545b689eddef08b21c1678ecab2e08d2ebf5eece91c317e7e96a63c96d26d892d75ed184da1bd591bfa6e7a97e7e25058b9435fee8739b9af61226ded410dd4ae849aad75d4ccfb7f7dfc6ac000f5a5275180bf187d3ceb58621c237b96fe68e64f8adce22bbe4a64418234d3d08bc3f682e1d194753f63c942882582f62040a036104042ecef1305f512b16637fe435586c82cad1f7ba533b90dc81080a7e2dd7dfe5058f84d68addf8785ae38b17c6014eb6a1a068fd96d119") r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, 0x0, 0x0) [ 2141.460155][T18604] hfs: can't find a HFS filesystem on dev loop5 [ 2141.506952][T18611] FAULT_INJECTION: forcing a failure. [ 2141.506952][T18611] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2141.522695][T18611] CPU: 1 PID: 18611 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2141.530682][T18611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2141.540748][T18611] Call Trace: [ 2141.544063][T18611] dump_stack+0x172/0x1f0 [ 2141.548413][T18611] should_fail.cold+0xa/0x15 [ 2141.553039][T18611] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2141.559042][T18611] ? __lock_acquire+0x548/0x3fb0 [ 2141.564031][T18611] should_fail_alloc_page+0x50/0x60 [ 2141.569252][T18611] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2141.574663][T18611] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2141.580392][T18611] ? find_held_lock+0x35/0x130 [ 2141.585362][T18611] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2141.591194][T18611] cache_grow_begin+0x9c/0x860 [ 2141.595970][T18611] ? getname_kernel+0x53/0x370 [ 2141.600737][T18611] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2141.606991][T18611] kmem_cache_alloc+0x62d/0x6f0 [ 2141.611843][T18611] ? fc_mount+0x17/0xc0 [ 2141.616092][T18611] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 2141.621379][T18611] ? vfs_kern_mount+0x40/0x60 [ 2141.626054][T18611] ? legacy_get_tree+0xf2/0x200 [ 2141.630914][T18611] getname_kernel+0x53/0x370 [ 2141.635503][T18611] kern_path+0x20/0x40 [ 2141.639583][T18611] lookup_bdev.part.0+0x7b/0x1b0 [ 2141.644519][T18611] ? blkdev_open+0x290/0x290 [ 2141.649108][T18611] ? lock_downgrade+0x880/0x880 [ 2141.653973][T18611] blkdev_get_by_path+0x81/0x130 [ 2141.658914][T18611] btrfs_scan_one_device+0xd3/0x720 [ 2141.664122][T18611] ? kfree+0x173/0x230 [ 2141.668208][T18611] ? device_list_add+0x14d0/0x14d0 [ 2141.673320][T18611] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 2141.679174][T18611] ? btrfs_mount_root+0xb36/0x1220 [ 2141.684295][T18611] btrfs_mount_root+0x718/0x1220 [ 2141.689817][T18611] ? btrfs_decode_error+0x70/0x70 [ 2141.694856][T18611] ? rcu_read_lock_sched_held+0x110/0x130 [ 2141.700587][T18611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2141.706843][T18611] ? vfs_parse_fs_string+0x111/0x170 [ 2141.712137][T18611] ? vfs_parse_fs_string+0x111/0x170 [ 2141.717428][T18611] ? rcu_read_lock_sched_held+0x110/0x130 [ 2141.723181][T18611] ? kfree+0x1fa/0x230 [ 2141.727275][T18611] ? vfs_parse_fs_string+0x116/0x170 [ 2141.732573][T18611] ? btrfs_decode_error+0x70/0x70 [ 2141.737602][T18611] legacy_get_tree+0xf2/0x200 [ 2141.742294][T18611] vfs_get_tree+0x123/0x450 [ 2141.746817][T18611] fc_mount+0x17/0xc0 13:43:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\xdf!+\x86a\x957s\x16FA\x00'}}) 13:43:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) fsetxattr(r0, &(0x7f0000000000)=@random={'os2.', '.wlan1vboxnet0]/,$mime_type\x00'}, &(0x7f0000000080)='\x00', 0x1, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 13:43:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000049c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2141.750810][T18611] vfs_kern_mount.part.0+0xd8/0xf0 [ 2141.759241][T18611] vfs_kern_mount+0x40/0x60 [ 2141.763759][T18611] btrfs_mount+0x2b4/0x15e2 [ 2141.768272][T18611] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2141.773908][T18611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2141.780181][T18611] ? should_fail+0x1de/0x852 [ 2141.784793][T18611] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2141.791566][T18611] ? btrfs_remount+0x11f0/0x11f0 [ 2141.796598][T18611] ? rcu_read_lock_sched_held+0x110/0x130 [ 2141.802344][T18611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2141.808604][T18611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2141.814856][T18611] ? vfs_parse_fs_string+0x111/0x170 [ 2141.820143][T18611] ? vfs_parse_fs_string+0x111/0x170 [ 2141.825434][T18611] ? rcu_read_lock_sched_held+0x110/0x130 [ 2141.831156][T18611] ? kfree+0x1fa/0x230 [ 2141.835229][T18611] ? vfs_parse_fs_string+0x116/0x170 [ 2141.840525][T18611] ? btrfs_remount+0x11f0/0x11f0 [ 2141.845465][T18611] legacy_get_tree+0xf2/0x200 [ 2141.850145][T18611] ? btrfs_remount+0x11f0/0x11f0 [ 2141.855114][T18611] ? legacy_get_tree+0xf2/0x200 [ 2141.859972][T18611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2141.866216][T18611] vfs_get_tree+0x123/0x450 [ 2141.870723][T18611] do_mount+0x1436/0x2c40 [ 2141.875065][T18611] ? copy_mount_string+0x40/0x40 [ 2141.880008][T18611] ? _copy_from_user+0xdd/0x150 [ 2141.884864][T18611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2141.891107][T18611] ? copy_mount_options+0x280/0x3a0 [ 2141.896308][T18611] ksys_mount+0xdb/0x150 [ 2141.900554][T18611] __x64_sys_mount+0xbe/0x150 [ 2141.905246][T18611] do_syscall_64+0x103/0x610 [ 2141.909845][T18611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2141.915735][T18611] RIP: 0033:0x45b69a [ 2141.919628][T18611] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2141.939349][T18611] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2141.947783][T18611] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2141.955850][T18611] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2141.963828][T18611] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2141.971827][T18611] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2141.979797][T18611] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2142.063966][T18604] hfs: can't find a HFS filesystem on dev loop5 13:43:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) fadvise64(r1, 0x0, 0x8, 0x2) 13:43:27 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x7400000000000000}) 13:43:27 executing program 4 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000004ac000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000000)={0x1, 0x77, &(0x7f0000000080)="7d9b1b9de953db21fb6cb7fe1b23113d629138dbab57274624fb152d9b3ed1ae92a99177f2c1b61716a41e071c8536646ddb26f3dc4a6688b3435b0a4aa2a6ab588c8c58d424f68163457ae7ab94b7dca025c7077cc4467faa9cfb2fac037da76accbe1ee330c795ed62952334f6033683d943501d1cb8"}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 2142.354031][T18631] hfs: can't find a HFS filesystem on dev loop5 [ 2142.364641][T18634] FAULT_INJECTION: forcing a failure. [ 2142.364641][T18634] name failslab, interval 1, probability 0, space 0, times 0 [ 2142.421393][T18634] CPU: 0 PID: 18634 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2142.429427][T18634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2142.439582][T18634] Call Trace: [ 2142.443016][T18634] dump_stack+0x172/0x1f0 [ 2142.447357][T18634] should_fail.cold+0xa/0x15 [ 2142.451958][T18634] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2142.457784][T18634] ? ___might_sleep+0x163/0x280 [ 2142.462661][T18634] __should_failslab+0x121/0x190 [ 2142.467602][T18634] should_failslab+0x9/0x14 [ 2142.472456][T18634] kmem_cache_alloc+0x2b2/0x6f0 [ 2142.477309][T18634] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2142.483034][T18634] ? devid_cmp+0x95/0xb0 [ 2142.487284][T18634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2142.493526][T18634] getname_kernel+0x53/0x370 [ 2142.498121][T18634] kern_path+0x20/0x40 [ 2142.502193][T18634] lookup_bdev.part.0+0x7b/0x1b0 [ 2142.507131][T18634] ? blkdev_open+0x290/0x290 [ 2142.511731][T18634] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2142.517975][T18634] ? list_sort.part.0+0x605/0x8b0 [ 2142.523130][T18634] blkdev_get_by_path+0x81/0x130 [ 2142.528072][T18634] btrfs_get_bdev_and_sb+0x38/0x300 [ 2142.533362][T18634] open_fs_devices+0x68e/0xbd0 [ 2142.538132][T18634] ? find_fsid+0x2e0/0x2e0 [ 2142.542654][T18634] ? memmove_extent_buffer.cold+0x44/0x44 [ 2142.548376][T18634] btrfs_open_devices+0x147/0x170 [ 2142.553417][T18634] btrfs_mount_root+0x79a/0x1220 [ 2142.558362][T18634] ? btrfs_decode_error+0x70/0x70 [ 2142.563389][T18634] ? rcu_read_lock_sched_held+0x110/0x130 [ 2142.569110][T18634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2142.575356][T18634] ? vfs_parse_fs_string+0x111/0x170 [ 2142.580641][T18634] ? vfs_parse_fs_string+0x111/0x170 [ 2142.585929][T18634] ? rcu_read_lock_sched_held+0x110/0x130 [ 2142.591648][T18634] ? kfree+0x1fa/0x230 [ 2142.595717][T18634] ? vfs_parse_fs_string+0x116/0x170 [ 2142.601108][T18634] ? btrfs_decode_error+0x70/0x70 [ 2142.606137][T18634] legacy_get_tree+0xf2/0x200 [ 2142.610829][T18634] vfs_get_tree+0x123/0x450 [ 2142.615453][T18634] fc_mount+0x17/0xc0 [ 2142.619439][T18634] vfs_kern_mount.part.0+0xd8/0xf0 [ 2142.624553][T18634] vfs_kern_mount+0x40/0x60 [ 2142.629062][T18634] btrfs_mount+0x2b4/0x15e2 [ 2142.633576][T18634] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2142.639206][T18634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2142.645444][T18634] ? should_fail+0x1de/0x852 [ 2142.650047][T18634] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2142.655856][T18634] ? btrfs_remount+0x11f0/0x11f0 [ 2142.660828][T18634] ? rcu_read_lock_sched_held+0x110/0x130 [ 2142.666566][T18634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2142.672808][T18634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2142.679047][T18634] ? vfs_parse_fs_string+0x111/0x170 [ 2142.684329][T18634] ? vfs_parse_fs_string+0x111/0x170 [ 2142.689614][T18634] ? rcu_read_lock_sched_held+0x110/0x130 [ 2142.695338][T18634] ? kfree+0x1fa/0x230 [ 2142.699411][T18634] ? vfs_parse_fs_string+0x116/0x170 [ 2142.704703][T18634] ? btrfs_remount+0x11f0/0x11f0 [ 2142.709645][T18634] legacy_get_tree+0xf2/0x200 [ 2142.714327][T18634] ? btrfs_remount+0x11f0/0x11f0 [ 2142.719266][T18634] ? legacy_get_tree+0xf2/0x200 [ 2142.724121][T18634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2142.730385][T18634] vfs_get_tree+0x123/0x450 [ 2142.734903][T18634] do_mount+0x1436/0x2c40 [ 2142.739327][T18634] ? copy_mount_string+0x40/0x40 [ 2142.744357][T18634] ? _copy_from_user+0xdd/0x150 [ 2142.749211][T18634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2142.755455][T18634] ? copy_mount_options+0x280/0x3a0 [ 2142.760959][T18634] ksys_mount+0xdb/0x150 [ 2142.765205][T18634] __x64_sys_mount+0xbe/0x150 [ 2142.769918][T18634] do_syscall_64+0x103/0x610 [ 2142.774513][T18634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2142.780837][T18634] RIP: 0033:0x45b69a [ 2142.784739][T18634] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2142.804452][T18634] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2142.812883][T18634] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a 13:43:28 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000000c0)=""/148, 0x94}], 0x1, 0x0) preadv(r1, &(0x7f0000000480), 0x10000000000000f3, 0x0) 13:43:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") signalfd(r0, &(0x7f0000000000)={0x81}, 0x8) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\"+\x86a\x957s\x16FA\x00'}}) [ 2142.820862][T18634] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2142.828831][T18634] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2142.836805][T18634] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2142.844775][T18634] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2142.907707][T18631] hfs: can't find a HFS filesystem on dev loop5 13:43:28 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a}, {}, {0x0, 0x3}, 0x0, 0x0, 0x1, 0x1}, {{@in6=@remote, 0x0, 0x2b}, 0x2, @in, 0x0, 0x4}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 13:43:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000140)=[0xee00]) write$FUSE_ENTRY(r2, &(0x7f0000000180)={0x90, 0xfffffffffffffff5, 0x1, {0x5, 0x3, 0x7, 0x800, 0xffffffffffffff01, 0x40, {0x6, 0x5, 0x1, 0x6, 0x3, 0x3, 0x8000, 0x1000, 0x0, 0x5f2b, 0x52, r3, r4, 0x7988d92e, 0x8}}}, 0x90) accept4$netrom(r1, 0x0, 0x0, 0x0) 13:43:28 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x7a00000000000000}) 13:43:28 executing program 4 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) 13:43:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000004bc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2143.275636][T18661] FAULT_INJECTION: forcing a failure. [ 2143.275636][T18661] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2143.288875][T18661] CPU: 1 PID: 18661 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2143.288893][T18661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2143.288900][T18661] Call Trace: [ 2143.288924][T18661] dump_stack+0x172/0x1f0 [ 2143.288943][T18661] should_fail.cold+0xa/0x15 [ 2143.288959][T18661] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2143.288975][T18661] ? __lock_acquire+0x548/0x3fb0 [ 2143.288995][T18661] should_fail_alloc_page+0x50/0x60 [ 2143.289012][T18661] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2143.289031][T18661] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2143.289045][T18661] ? find_held_lock+0x35/0x130 [ 2143.289066][T18661] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2143.289083][T18661] cache_grow_begin+0x9c/0x860 [ 2143.289101][T18661] ? getname_kernel+0x53/0x370 [ 2143.310424][T18661] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 13:43:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00#+\x86a\x957s\x16FA\x00'}}) [ 2143.310449][T18661] kmem_cache_alloc+0x62d/0x6f0 [ 2143.310464][T18661] ? fc_mount+0x17/0xc0 [ 2143.310479][T18661] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 2143.310498][T18661] ? vfs_kern_mount+0x40/0x60 [ 2143.391931][T18661] ? legacy_get_tree+0xf2/0x200 [ 2143.396798][T18661] getname_kernel+0x53/0x370 [ 2143.401403][T18661] kern_path+0x20/0x40 [ 2143.405480][T18661] lookup_bdev.part.0+0x7b/0x1b0 [ 2143.410429][T18661] ? blkdev_open+0x290/0x290 [ 2143.415034][T18661] ? lock_downgrade+0x880/0x880 [ 2143.419903][T18661] blkdev_get_by_path+0x81/0x130 13:43:28 executing program 1: r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x5}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) [ 2143.424880][T18661] btrfs_scan_one_device+0xd3/0x720 [ 2143.430090][T18661] ? kfree+0x173/0x230 [ 2143.434174][T18661] ? device_list_add+0x14d0/0x14d0 [ 2143.439356][T18661] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 2143.445222][T18661] ? btrfs_mount_root+0xb36/0x1220 [ 2143.450349][T18661] btrfs_mount_root+0x718/0x1220 [ 2143.455328][T18661] ? btrfs_decode_error+0x70/0x70 [ 2143.460364][T18661] ? rcu_read_lock_sched_held+0x110/0x130 [ 2143.466101][T18661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2143.472348][T18661] ? vfs_parse_fs_string+0x111/0x170 [ 2143.477646][T18661] ? vfs_parse_fs_string+0x111/0x170 [ 2143.482969][T18661] ? rcu_read_lock_sched_held+0x110/0x130 [ 2143.488701][T18661] ? kfree+0x1fa/0x230 [ 2143.492778][T18661] ? vfs_parse_fs_string+0x116/0x170 [ 2143.498102][T18661] ? btrfs_decode_error+0x70/0x70 [ 2143.503156][T18661] legacy_get_tree+0xf2/0x200 [ 2143.507838][T18661] vfs_get_tree+0x123/0x450 [ 2143.512387][T18661] fc_mount+0x17/0xc0 [ 2143.516382][T18661] vfs_kern_mount.part.0+0xd8/0xf0 [ 2143.524682][T18661] vfs_kern_mount+0x40/0x60 [ 2143.529289][T18661] btrfs_mount+0x2b4/0x15e2 [ 2143.533828][T18661] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2143.539470][T18661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2143.545719][T18661] ? should_fail+0x1de/0x852 [ 2143.550318][T18661] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2143.556153][T18661] ? btrfs_remount+0x11f0/0x11f0 [ 2143.561212][T18661] ? rcu_read_lock_sched_held+0x110/0x130 [ 2143.566995][T18661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2143.573243][T18661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2143.579490][T18661] ? vfs_parse_fs_string+0x111/0x170 [ 2143.592183][T18661] ? vfs_parse_fs_string+0x111/0x170 [ 2143.597586][T18661] ? rcu_read_lock_sched_held+0x110/0x130 [ 2143.603318][T18661] ? kfree+0x1fa/0x230 [ 2143.607392][T18661] ? vfs_parse_fs_string+0x116/0x170 [ 2143.612699][T18661] ? btrfs_remount+0x11f0/0x11f0 [ 2143.617645][T18661] legacy_get_tree+0xf2/0x200 [ 2143.622333][T18661] ? btrfs_remount+0x11f0/0x11f0 [ 2143.627282][T18661] ? legacy_get_tree+0xf2/0x200 [ 2143.632145][T18661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2143.638391][T18661] vfs_get_tree+0x123/0x450 [ 2143.642902][T18661] do_mount+0x1436/0x2c40 [ 2143.647240][T18661] ? copy_mount_string+0x40/0x40 [ 2143.652185][T18661] ? _copy_from_user+0xdd/0x150 [ 2143.657047][T18661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2143.663288][T18661] ? copy_mount_options+0x280/0x3a0 [ 2143.668493][T18661] ksys_mount+0xdb/0x150 [ 2143.672739][T18661] __x64_sys_mount+0xbe/0x150 [ 2143.677428][T18661] do_syscall_64+0x103/0x610 [ 2143.682027][T18661] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2143.691505][T18661] RIP: 0033:0x45b69a [ 2143.695412][T18661] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2143.715033][T18661] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2143.723545][T18661] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2143.731533][T18661] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2143.739509][T18661] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2143.747481][T18661] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2143.755730][T18661] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2143.780704][T18662] hfs: can't find a HFS filesystem on dev loop5 13:43:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) 13:43:29 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000080)={0x0, 0x0, "3145fb1f0fd344c4b64bc5f58b077af86d8c858be79033314e327a143242cdcd"}) 13:43:29 executing program 4 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00$+\x86a\x957s\x16FA\x00'}}) 13:43:29 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x7fffffffffffffff}) 13:43:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000004cc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2144.061254][T18685] FAULT_INJECTION: forcing a failure. [ 2144.061254][T18685] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2144.074493][T18685] CPU: 0 PID: 18685 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2144.082480][T18685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2144.092549][T18685] Call Trace: [ 2144.095863][T18685] dump_stack+0x172/0x1f0 [ 2144.100204][T18685] should_fail.cold+0xa/0x15 [ 2144.100224][T18685] ? __lock_acquire+0x548/0x3fb0 [ 2144.100240][T18685] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2144.100255][T18685] ? __lock_acquire+0x548/0x3fb0 [ 2144.100275][T18685] should_fail_alloc_page+0x50/0x60 [ 2144.100291][T18685] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2144.100311][T18685] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2144.100323][T18685] ? find_held_lock+0x35/0x130 [ 2144.100348][T18685] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2144.100368][T18685] cache_grow_begin+0x9c/0x860 [ 2144.109883][T18685] ? getname_kernel+0x53/0x370 [ 2144.109900][T18685] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2144.109921][T18685] kmem_cache_alloc+0x62d/0x6f0 [ 2144.109937][T18685] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2144.109953][T18685] ? devid_cmp+0x95/0xb0 [ 2144.109968][T18685] getname_kernel+0x53/0x370 [ 2144.109981][T18685] kern_path+0x20/0x40 [ 2144.109997][T18685] lookup_bdev.part.0+0x7b/0x1b0 [ 2144.110010][T18685] ? blkdev_open+0x290/0x290 [ 2144.110022][T18685] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2144.110034][T18685] ? list_sort.part.0+0x605/0x8b0 [ 2144.110054][T18685] blkdev_get_by_path+0x81/0x130 [ 2144.120785][T18685] btrfs_get_bdev_and_sb+0x38/0x300 [ 2144.120804][T18685] open_fs_devices+0x68e/0xbd0 [ 2144.120827][T18685] ? find_fsid+0x2e0/0x2e0 [ 2144.131400][T18685] ? memmove_extent_buffer.cold+0x44/0x44 [ 2144.131420][T18685] btrfs_open_devices+0x147/0x170 [ 2144.131439][T18685] btrfs_mount_root+0x79a/0x1220 [ 2144.131458][T18685] ? btrfs_decode_error+0x70/0x70 [ 2144.131476][T18685] ? rcu_read_lock_sched_held+0x110/0x130 [ 2144.131492][T18685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2144.131506][T18685] ? vfs_parse_fs_string+0x111/0x170 [ 2144.131518][T18685] ? vfs_parse_fs_string+0x111/0x170 [ 2144.131535][T18685] ? rcu_read_lock_sched_held+0x110/0x130 [ 2144.276160][T18685] ? kfree+0x1fa/0x230 [ 2144.280234][T18685] ? vfs_parse_fs_string+0x116/0x170 [ 2144.285523][T18685] ? btrfs_decode_error+0x70/0x70 [ 2144.290553][T18685] legacy_get_tree+0xf2/0x200 [ 2144.295235][T18685] vfs_get_tree+0x123/0x450 [ 2144.299750][T18685] fc_mount+0x17/0xc0 [ 2144.303741][T18685] vfs_kern_mount.part.0+0xd8/0xf0 [ 2144.309028][T18685] vfs_kern_mount+0x40/0x60 [ 2144.313537][T18685] btrfs_mount+0x2b4/0x15e2 [ 2144.318044][T18685] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2144.323675][T18685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2144.329918][T18685] ? should_fail+0x1de/0x852 [ 2144.334515][T18685] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2144.340328][T18685] ? btrfs_remount+0x11f0/0x11f0 [ 2144.345283][T18685] ? rcu_read_lock_sched_held+0x110/0x130 [ 2144.351010][T18685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2144.357367][T18685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2144.363604][T18685] ? vfs_parse_fs_string+0x111/0x170 [ 2144.368891][T18685] ? vfs_parse_fs_string+0x111/0x170 [ 2144.374275][T18685] ? rcu_read_lock_sched_held+0x110/0x130 [ 2144.380004][T18685] ? kfree+0x1fa/0x230 [ 2144.384074][T18685] ? vfs_parse_fs_string+0x116/0x170 [ 2144.389367][T18685] ? btrfs_remount+0x11f0/0x11f0 [ 2144.394309][T18685] legacy_get_tree+0xf2/0x200 [ 2144.398990][T18685] ? btrfs_remount+0x11f0/0x11f0 [ 2144.403927][T18685] ? legacy_get_tree+0xf2/0x200 [ 2144.408788][T18685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2144.415292][T18685] vfs_get_tree+0x123/0x450 [ 2144.419796][T18685] do_mount+0x1436/0x2c40 [ 2144.424141][T18685] ? copy_mount_string+0x40/0x40 [ 2144.429089][T18685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2144.435341][T18685] ? copy_mount_options+0x280/0x3a0 [ 2144.440567][T18685] ksys_mount+0xdb/0x150 [ 2144.444899][T18685] __x64_sys_mount+0xbe/0x150 [ 2144.449580][T18685] do_syscall_64+0x103/0x610 [ 2144.454176][T18685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2144.460069][T18685] RIP: 0033:0x45b69a [ 2144.463967][T18685] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2144.483573][T18685] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2144.492109][T18685] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2144.500082][T18685] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 13:43:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="623ad882c0d98a0d7ed2fa6843dd3c22", 0x0, 0x0, 0x0, 0x4}, 0x20) 13:43:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) [ 2144.508056][T18685] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2144.516031][T18685] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2144.524005][T18685] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2144.551014][T18690] hfs: unable to parse mount options 13:43:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) [ 2144.622363][T18690] hfs: unable to parse mount options 13:43:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00%+\x86a\x957s\x16FA\x00'}}) 13:43:30 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x8000000000000000}) [ 2144.643402][T18698] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 13:43:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) 13:43:30 executing program 4 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffcbe) mmap$xdp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x80c, 0x10, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x60e, 0x68) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x10, r1, 0x0) 13:43:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000004dc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2144.859276][T18710] hfs: can't find a HFS filesystem on dev loop5 13:43:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00&+\x86a\x957s\x16FA\x00'}}) 13:43:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) [ 2144.957147][T18717] FAULT_INJECTION: forcing a failure. [ 2144.957147][T18717] name failslab, interval 1, probability 0, space 0, times 0 [ 2144.969862][T18717] CPU: 1 PID: 18717 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2144.977842][T18717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2144.987902][T18717] Call Trace: [ 2144.991205][T18717] dump_stack+0x172/0x1f0 [ 2144.995554][T18717] should_fail.cold+0xa/0x15 [ 2145.000166][T18717] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2145.005984][T18717] ? mark_held_locks+0xa4/0xf0 [ 2145.010773][T18717] __should_failslab+0x121/0x190 [ 2145.015713][T18717] should_failslab+0x9/0x14 [ 2145.020235][T18717] kmem_cache_alloc+0x47/0x6f0 [ 2145.025000][T18717] ? __lock_acquire+0x548/0x3fb0 [ 2145.029940][T18717] xas_alloc+0x2df/0x3d0 [ 2145.034272][T18717] xas_create+0x2cd/0x1040 [ 2145.038715][T18717] xas_store+0x9a/0x19b0 [ 2145.042969][T18717] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2145.049206][T18717] ? xas_start+0x166/0x560 [ 2145.053624][T18717] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2145.059908][T18717] ? xas_load+0x67/0x150 [ 2145.064156][T18717] __add_to_page_cache_locked+0x5be/0xe70 [ 2145.069892][T18717] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 2145.076064][T18717] ? __alloc_pages_nodemask+0x599/0x7e0 [ 2145.081630][T18717] ? count_shadow_nodes+0x500/0x500 [ 2145.086861][T18717] add_to_page_cache_lru+0x1cb/0x760 [ 2145.092158][T18717] ? add_to_page_cache_locked+0x40/0x40 [ 2145.097715][T18717] ? __page_cache_alloc+0x131/0x460 [ 2145.103012][T18717] do_read_cache_page+0xc2e/0x14c0 [ 2145.108125][T18717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2145.114367][T18717] ? blkdev_writepages+0x30/0x30 [ 2145.119316][T18717] ? blkdev_get+0xcc/0x990 [ 2145.123737][T18717] ? pagecache_get_page+0x740/0x740 [ 2145.128944][T18717] ? bd_may_claim+0xd0/0xd0 [ 2145.133450][T18717] ? lookup_bdev.part.0+0x10e/0x1b0 [ 2145.138148][T18710] hfs: can't find a HFS filesystem on dev loop5 [ 2145.138667][T18717] ? blkdev_open+0x290/0x290 [ 2145.149474][T18717] ? lock_downgrade+0x880/0x880 [ 2145.154344][T18717] read_cache_page_gfp+0x6e/0x90 [ 2145.159296][T18717] btrfs_scan_one_device+0x19b/0x720 [ 2145.164605][T18717] ? kfree+0x173/0x230 [ 2145.168692][T18717] ? device_list_add+0x14d0/0x14d0 [ 2145.173812][T18717] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 2145.179626][T18717] ? btrfs_mount_root+0xb36/0x1220 [ 2145.184751][T18717] btrfs_mount_root+0x718/0x1220 [ 2145.189706][T18717] ? btrfs_decode_error+0x70/0x70 [ 2145.194748][T18717] ? rcu_read_lock_sched_held+0x110/0x130 [ 2145.201699][T18717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2145.207943][T18717] ? vfs_parse_fs_string+0x111/0x170 [ 2145.213233][T18717] ? vfs_parse_fs_string+0x111/0x170 [ 2145.218531][T18717] ? rcu_read_lock_sched_held+0x110/0x130 [ 2145.224255][T18717] ? kfree+0x1fa/0x230 [ 2145.228325][T18717] ? vfs_parse_fs_string+0x116/0x170 [ 2145.233618][T18717] ? btrfs_decode_error+0x70/0x70 [ 2145.238663][T18717] legacy_get_tree+0xf2/0x200 [ 2145.243346][T18717] vfs_get_tree+0x123/0x450 [ 2145.247853][T18717] fc_mount+0x17/0xc0 [ 2145.251841][T18717] vfs_kern_mount.part.0+0xd8/0xf0 [ 2145.256958][T18717] vfs_kern_mount+0x40/0x60 [ 2145.261464][T18717] btrfs_mount+0x2b4/0x15e2 [ 2145.265970][T18717] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2145.271609][T18717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2145.277883][T18717] ? should_fail+0x1de/0x852 [ 2145.282493][T18717] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2145.288576][T18717] ? btrfs_remount+0x11f0/0x11f0 [ 2145.293537][T18717] ? rcu_read_lock_sched_held+0x110/0x130 [ 2145.299262][T18717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2145.305511][T18717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2145.311764][T18717] ? vfs_parse_fs_string+0x111/0x170 [ 2145.317049][T18717] ? vfs_parse_fs_string+0x111/0x170 [ 2145.322335][T18717] ? rcu_read_lock_sched_held+0x110/0x130 [ 2145.328056][T18717] ? kfree+0x1fa/0x230 [ 2145.332169][T18717] ? vfs_parse_fs_string+0x116/0x170 [ 2145.337459][T18717] ? btrfs_remount+0x11f0/0x11f0 [ 2145.342397][T18717] legacy_get_tree+0xf2/0x200 [ 2145.347164][T18717] ? btrfs_remount+0x11f0/0x11f0 [ 2145.352195][T18717] ? legacy_get_tree+0xf2/0x200 [ 2145.357053][T18717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2145.363300][T18717] vfs_get_tree+0x123/0x450 [ 2145.367808][T18717] do_mount+0x1436/0x2c40 [ 2145.372149][T18717] ? copy_mount_string+0x40/0x40 [ 2145.377179][T18717] ? _copy_from_user+0xdd/0x150 [ 2145.382035][T18717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2145.388272][T18717] ? copy_mount_options+0x280/0x3a0 [ 2145.393658][T18717] ksys_mount+0xdb/0x150 [ 2145.397903][T18717] __x64_sys_mount+0xbe/0x150 [ 2145.402586][T18717] do_syscall_64+0x103/0x610 [ 2145.407273][T18717] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2145.413169][T18717] RIP: 0033:0x45b69a [ 2145.417071][T18717] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2145.436703][T18717] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2145.445127][T18717] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2145.453114][T18717] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2145.461093][T18717] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2145.469152][T18717] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2145.477124][T18717] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:31 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0x8cffffff00000000}) 13:43:31 executing program 4 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) 13:43:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000004ec000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2145.782275][T18736] FAULT_INJECTION: forcing a failure. [ 2145.782275][T18736] name failslab, interval 1, probability 0, space 0, times 0 [ 2145.795648][T18734] hfs: can't find a HFS filesystem on dev loop5 [ 2145.811158][T18736] CPU: 0 PID: 18736 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2145.819193][T18736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2145.829348][T18736] Call Trace: [ 2145.832662][T18736] dump_stack+0x172/0x1f0 [ 2145.837016][T18736] should_fail.cold+0xa/0x15 [ 2145.841631][T18736] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2145.847467][T18736] ? ___might_sleep+0x163/0x280 [ 2145.852596][T18736] __should_failslab+0x121/0x190 [ 2145.857556][T18736] should_failslab+0x9/0x14 [ 2145.862089][T18736] __kmalloc+0x2dc/0x740 [ 2145.866361][T18736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2145.872726][T18736] ? btrfs_find_device+0x189/0x1d0 [ 2145.877871][T18736] ? device_list_add+0xf16/0x14d0 [ 2145.882918][T18736] device_list_add+0xf16/0x14d0 [ 2145.887803][T18736] ? btrfs_rm_dev_replace_free_srcdev+0x300/0x300 [ 2145.894324][T18736] ? ___might_sleep+0x163/0x280 [ 2145.899207][T18736] btrfs_scan_one_device+0x378/0x720 [ 2145.904513][T18736] ? btrfs_scan_one_device+0x378/0x720 [ 2145.910007][T18736] ? device_list_add+0x14d0/0x14d0 [ 2145.915136][T18736] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 2145.920959][T18736] ? btrfs_mount_root+0xb36/0x1220 [ 2145.926101][T18736] btrfs_mount_root+0x718/0x1220 [ 2145.931069][T18736] ? btrfs_decode_error+0x70/0x70 [ 2145.936463][T18736] ? rcu_read_lock_sched_held+0x110/0x130 [ 2145.942198][T18736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2145.948451][T18736] ? vfs_parse_fs_string+0x111/0x170 [ 2145.953749][T18736] ? vfs_parse_fs_string+0x111/0x170 [ 2145.959053][T18736] ? rcu_read_lock_sched_held+0x110/0x130 [ 2145.964795][T18736] ? kfree+0x1fa/0x230 [ 2145.968887][T18736] ? vfs_parse_fs_string+0x116/0x170 [ 2145.974196][T18736] ? btrfs_decode_error+0x70/0x70 [ 2145.979239][T18736] legacy_get_tree+0xf2/0x200 [ 2145.984106][T18736] vfs_get_tree+0x123/0x450 [ 2145.988639][T18736] fc_mount+0x17/0xc0 [ 2145.992762][T18736] vfs_kern_mount.part.0+0xd8/0xf0 [ 2145.997898][T18736] vfs_kern_mount+0x40/0x60 [ 2146.002424][T18736] btrfs_mount+0x2b4/0x15e2 [ 2146.006945][T18736] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2146.012608][T18736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2146.018862][T18736] ? should_fail+0x1de/0x852 [ 2146.023479][T18736] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2146.029390][T18736] ? btrfs_remount+0x11f0/0x11f0 [ 2146.034350][T18736] ? rcu_read_lock_sched_held+0x110/0x130 [ 2146.040084][T18736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2146.046358][T18736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2146.052626][T18736] ? vfs_parse_fs_string+0x111/0x170 [ 2146.057965][T18736] ? vfs_parse_fs_string+0x111/0x170 [ 2146.063276][T18736] ? rcu_read_lock_sched_held+0x110/0x130 [ 2146.069040][T18736] ? kfree+0x1fa/0x230 [ 2146.073124][T18736] ? vfs_parse_fs_string+0x116/0x170 [ 2146.078537][T18736] ? btrfs_remount+0x11f0/0x11f0 [ 2146.083536][T18736] legacy_get_tree+0xf2/0x200 [ 2146.088242][T18736] ? btrfs_remount+0x11f0/0x11f0 [ 2146.093198][T18736] ? legacy_get_tree+0xf2/0x200 [ 2146.098065][T18736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2146.104326][T18736] vfs_get_tree+0x123/0x450 [ 2146.108852][T18736] do_mount+0x1436/0x2c40 [ 2146.113230][T18736] ? copy_mount_string+0x40/0x40 [ 2146.118188][T18736] ? _copy_from_user+0xdd/0x150 [ 2146.123063][T18736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2146.129336][T18736] ? copy_mount_options+0x280/0x3a0 [ 2146.134679][T18736] ksys_mount+0xdb/0x150 [ 2146.138937][T18736] __x64_sys_mount+0xbe/0x150 [ 2146.143637][T18736] do_syscall_64+0x103/0x610 [ 2146.148329][T18736] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2146.154225][T18736] RIP: 0033:0x45b69a [ 2146.158125][T18736] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 13:43:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\'+\x86a\x957s\x16FA\x00'}}) [ 2146.177740][T18736] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2146.186204][T18736] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2146.194193][T18736] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2146.202178][T18736] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2146.210162][T18736] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2146.218180][T18736] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) 13:43:31 executing program 4 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2146.332628][T18734] hfs: can't find a HFS filesystem on dev loop5 13:43:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) [ 2146.463986][T18755] FAULT_INJECTION: forcing a failure. [ 2146.463986][T18755] name failslab, interval 1, probability 0, space 0, times 0 [ 2146.496594][T18755] CPU: 0 PID: 18755 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2146.504621][T18755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2146.514954][T18755] Call Trace: [ 2146.518266][T18755] dump_stack+0x172/0x1f0 [ 2146.522628][T18755] should_fail.cold+0xa/0x15 [ 2146.527243][T18755] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2146.533071][T18755] ? legacy_get_tree+0xf2/0x200 [ 2146.537951][T18755] ? vfs_get_tree+0x123/0x450 [ 2146.542646][T18755] ? fc_mount+0x17/0xc0 [ 2146.546821][T18755] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 2146.552111][T18755] ? vfs_kern_mount+0x40/0x60 [ 2146.556797][T18755] ? btrfs_mount+0x2b4/0x15e2 [ 2146.561491][T18755] ? legacy_get_tree+0xf2/0x200 [ 2146.566357][T18755] ? vfs_get_tree+0x123/0x450 [ 2146.571048][T18755] __should_failslab+0x121/0x190 [ 2146.575998][T18755] should_failslab+0x9/0x14 [ 2146.580515][T18755] kmem_cache_alloc+0x47/0x6f0 [ 2146.585302][T18755] ? ___might_sleep+0x163/0x280 [ 2146.590164][T18755] ? mempool_alloc+0x380/0x380 [ 2146.594936][T18755] mempool_alloc_slab+0x47/0x60 [ 2146.599790][T18755] mempool_alloc+0x16b/0x380 [ 2146.604476][T18755] ? mempool_destroy+0x40/0x40 [ 2146.609250][T18755] ? find_held_lock+0x35/0x130 [ 2146.614017][T18755] ? create_empty_buffers+0x59e/0x840 [ 2146.619395][T18755] ? kasan_check_write+0x14/0x20 [ 2146.624339][T18755] bio_alloc_bioset+0x3bf/0x680 [ 2146.629194][T18755] ? bvec_alloc+0x2f0/0x2f0 [ 2146.633703][T18755] submit_bh_wbc+0x133/0x7f0 [ 2146.638299][T18755] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2146.644551][T18755] block_read_full_page+0x7e4/0xd70 [ 2146.649752][T18755] ? check_disk_change+0x140/0x140 [ 2146.654870][T18755] ? __bread_gfp+0x300/0x300 [ 2146.659468][T18755] ? add_to_page_cache_lru+0x34e/0x760 [ 2146.664942][T18755] ? add_to_page_cache_locked+0x40/0x40 [ 2146.670496][T18755] blkdev_readpage+0x1d/0x30 [ 2146.675097][T18755] do_read_cache_page+0xc5c/0x14c0 [ 2146.680226][T18755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2146.686470][T18755] ? blkdev_writepages+0x30/0x30 [ 2146.691417][T18755] ? blkdev_get+0xcc/0x990 [ 2146.695838][T18755] ? pagecache_get_page+0x740/0x740 [ 2146.701043][T18755] ? bd_may_claim+0xd0/0xd0 [ 2146.705563][T18755] ? lookup_bdev.part.0+0x10e/0x1b0 [ 2146.710772][T18755] ? blkdev_open+0x290/0x290 [ 2146.715365][T18755] ? lock_downgrade+0x880/0x880 [ 2146.720227][T18755] read_cache_page_gfp+0x6e/0x90 [ 2146.725175][T18755] btrfs_scan_one_device+0x19b/0x720 [ 2146.730467][T18755] ? kfree+0x173/0x230 [ 2146.734551][T18755] ? device_list_add+0x14d0/0x14d0 [ 2146.739662][T18755] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 2146.745469][T18755] ? btrfs_mount_root+0xb36/0x1220 [ 2146.750597][T18755] btrfs_mount_root+0x718/0x1220 [ 2146.755555][T18755] ? btrfs_decode_error+0x70/0x70 [ 2146.760673][T18755] ? rcu_read_lock_sched_held+0x110/0x130 [ 2146.766403][T18755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2146.772644][T18755] ? vfs_parse_fs_string+0x111/0x170 [ 2146.777928][T18755] ? vfs_parse_fs_string+0x111/0x170 [ 2146.783214][T18755] ? rcu_read_lock_sched_held+0x110/0x130 [ 2146.788937][T18755] ? kfree+0x1fa/0x230 [ 2146.793010][T18755] ? vfs_parse_fs_string+0x116/0x170 [ 2146.798300][T18755] ? btrfs_decode_error+0x70/0x70 [ 2146.803325][T18755] legacy_get_tree+0xf2/0x200 [ 2146.808144][T18755] vfs_get_tree+0x123/0x450 [ 2146.812650][T18755] fc_mount+0x17/0xc0 [ 2146.816642][T18755] vfs_kern_mount.part.0+0xd8/0xf0 [ 2146.821753][T18755] vfs_kern_mount+0x40/0x60 [ 2146.826263][T18755] btrfs_mount+0x2b4/0x15e2 [ 2146.830881][T18755] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2146.836528][T18755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2146.842780][T18755] ? should_fail+0x1de/0x852 [ 2146.847375][T18755] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2146.853193][T18755] ? btrfs_remount+0x11f0/0x11f0 [ 2146.858149][T18755] ? rcu_read_lock_sched_held+0x110/0x130 [ 2146.863867][T18755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2146.870111][T18755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2146.876350][T18755] ? vfs_parse_fs_string+0x111/0x170 [ 2146.881633][T18755] ? vfs_parse_fs_string+0x111/0x170 [ 2146.886922][T18755] ? rcu_read_lock_sched_held+0x110/0x130 [ 2146.892653][T18755] ? kfree+0x1fa/0x230 [ 2146.896728][T18755] ? vfs_parse_fs_string+0x116/0x170 [ 2146.902020][T18755] ? btrfs_remount+0x11f0/0x11f0 [ 2146.907047][T18755] legacy_get_tree+0xf2/0x200 [ 2146.911727][T18755] ? btrfs_remount+0x11f0/0x11f0 [ 2146.916663][T18755] ? legacy_get_tree+0xf2/0x200 [ 2146.921531][T18755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2146.927864][T18755] vfs_get_tree+0x123/0x450 [ 2146.932375][T18755] do_mount+0x1436/0x2c40 [ 2146.936712][T18755] ? copy_mount_string+0x40/0x40 [ 2146.941832][T18755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2146.948069][T18755] ? copy_mount_options+0x280/0x3a0 [ 2146.953443][T18755] ksys_mount+0xdb/0x150 [ 2146.957685][T18755] __x64_sys_mount+0xbe/0x150 [ 2146.962369][T18755] do_syscall_64+0x103/0x610 [ 2146.966971][T18755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2146.972860][T18755] RIP: 0033:0x45b69a [ 2146.976763][T18755] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2146.996377][T18755] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2147.004790][T18755] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a 13:43:32 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x100000000000005, @dev={[], 0xc}, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 13:43:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000004fc000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:32 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xf4ffffff00000000}) 13:43:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) [ 2147.012763][T18755] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2147.020733][T18755] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2147.028703][T18755] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2147.036675][T18755] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00(+\x86a\x957s\x16FA\x00'}}) 13:43:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) 13:43:32 executing program 4 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) [ 2147.239545][T18768] hfs: can't find a HFS filesystem on dev loop5 13:43:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000050c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2147.352511][T18768] hfs: can't find a HFS filesystem on dev loop5 [ 2147.359731][T18778] FAULT_INJECTION: forcing a failure. [ 2147.359731][T18778] name failslab, interval 1, probability 0, space 0, times 0 [ 2147.372895][T18778] CPU: 1 PID: 18778 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2147.380880][T18778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2147.390955][T18778] Call Trace: [ 2147.394243][T18778] dump_stack+0x172/0x1f0 [ 2147.398581][T18778] should_fail.cold+0xa/0x15 [ 2147.403157][T18778] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2147.408960][T18778] __should_failslab+0x121/0x190 [ 2147.413883][T18778] should_failslab+0x9/0x14 [ 2147.418387][T18778] kmem_cache_alloc+0x47/0x6f0 [ 2147.423141][T18778] ? __lock_acquire+0x548/0x3fb0 [ 2147.428068][T18778] xas_alloc+0x2df/0x3d0 [ 2147.432298][T18778] xas_create+0x2cd/0x1040 [ 2147.436706][T18778] xas_store+0x9a/0x19b0 [ 2147.440945][T18778] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2147.447167][T18778] ? xas_start+0x166/0x560 [ 2147.451579][T18778] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2147.457798][T18778] ? xas_load+0x67/0x150 [ 2147.462028][T18778] __add_to_page_cache_locked+0x5be/0xe70 [ 2147.467834][T18778] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 2147.473970][T18778] ? __alloc_pages_nodemask+0x599/0x7e0 [ 2147.479505][T18778] ? lock_downgrade+0x880/0x880 [ 2147.484452][T18778] ? count_shadow_nodes+0x500/0x500 [ 2147.489636][T18778] ? find_get_entry+0x535/0x880 [ 2147.494487][T18778] add_to_page_cache_lru+0x1cb/0x760 [ 2147.499759][T18778] ? add_to_page_cache_locked+0x40/0x40 [ 2147.505291][T18778] ? __page_cache_alloc+0x131/0x460 [ 2147.510496][T18778] pagecache_get_page+0x35c/0x740 [ 2147.515518][T18778] __getblk_gfp+0x27e/0x970 [ 2147.524134][T18778] ? kasan_check_write+0x14/0x20 [ 2147.529064][T18778] __bread_gfp+0x2f/0x300 [ 2147.533472][T18778] btrfs_read_dev_one_super+0xb6/0x2a0 [ 2147.538918][T18778] btrfs_read_dev_super+0x6c/0xd0 [ 2147.543935][T18778] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 2147.549642][T18778] btrfs_get_bdev_and_sb+0xff/0x300 [ 2147.554830][T18778] open_fs_devices+0x68e/0xbd0 [ 2147.559606][T18778] ? find_fsid+0x2e0/0x2e0 [ 2147.564016][T18778] ? memmove_extent_buffer.cold+0x44/0x44 [ 2147.569725][T18778] btrfs_open_devices+0x147/0x170 [ 2147.574739][T18778] btrfs_mount_root+0x79a/0x1220 [ 2147.579666][T18778] ? btrfs_decode_error+0x70/0x70 [ 2147.584688][T18778] ? rcu_read_lock_sched_held+0x110/0x130 [ 2147.590394][T18778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2147.596715][T18778] ? vfs_parse_fs_string+0x111/0x170 [ 2147.602070][T18778] ? vfs_parse_fs_string+0x111/0x170 [ 2147.607353][T18778] ? rcu_read_lock_sched_held+0x110/0x130 [ 2147.613156][T18778] ? kfree+0x1fa/0x230 [ 2147.617212][T18778] ? vfs_parse_fs_string+0x116/0x170 [ 2147.622483][T18778] ? btrfs_decode_error+0x70/0x70 [ 2147.627521][T18778] legacy_get_tree+0xf2/0x200 [ 2147.632183][T18778] vfs_get_tree+0x123/0x450 [ 2147.636690][T18778] fc_mount+0x17/0xc0 [ 2147.640654][T18778] vfs_kern_mount.part.0+0xd8/0xf0 [ 2147.645752][T18778] vfs_kern_mount+0x40/0x60 [ 2147.650252][T18778] btrfs_mount+0x2b4/0x15e2 [ 2147.654742][T18778] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2147.660358][T18778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2147.666592][T18778] ? should_fail+0x1de/0x852 [ 2147.671181][T18778] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2147.676982][T18778] ? btrfs_remount+0x11f0/0x11f0 [ 2147.681938][T18778] ? rcu_read_lock_sched_held+0x110/0x130 [ 2147.688107][T18778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2147.694334][T18778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2147.700579][T18778] ? vfs_parse_fs_string+0x111/0x170 [ 2147.705848][T18778] ? vfs_parse_fs_string+0x111/0x170 [ 2147.711124][T18778] ? rcu_read_lock_sched_held+0x110/0x130 [ 2147.716830][T18778] ? kfree+0x1fa/0x230 [ 2147.720885][T18778] ? vfs_parse_fs_string+0x116/0x170 [ 2147.726160][T18778] ? btrfs_remount+0x11f0/0x11f0 [ 2147.731178][T18778] legacy_get_tree+0xf2/0x200 [ 2147.735853][T18778] ? btrfs_remount+0x11f0/0x11f0 [ 2147.740775][T18778] ? legacy_get_tree+0xf2/0x200 [ 2147.745611][T18778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2147.751839][T18778] vfs_get_tree+0x123/0x450 [ 2147.756340][T18778] do_mount+0x1436/0x2c40 [ 2147.760675][T18778] ? copy_mount_string+0x40/0x40 [ 2147.765602][T18778] ? _copy_from_user+0xdd/0x150 [ 2147.770616][T18778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2147.776842][T18778] ? copy_mount_options+0x280/0x3a0 [ 2147.782027][T18778] ksys_mount+0xdb/0x150 [ 2147.786255][T18778] __x64_sys_mount+0xbe/0x150 [ 2147.790919][T18778] do_syscall_64+0x103/0x610 [ 2147.795498][T18778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2147.801461][T18778] RIP: 0033:0x45b69a [ 2147.805355][T18778] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2147.824944][T18778] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2147.833340][T18778] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2147.841302][T18778] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 13:43:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev, 0x807fff}, 0x1c) listen(r1, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) 13:43:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00)+\x86a\x957s\x16FA\x00'}}) [ 2147.849272][T18778] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2147.857229][T18778] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2147.865183][T18778] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) 13:43:33 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xf5ffffff00000000}) 13:43:33 executing program 4 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={'rose0\x00', 0x201}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'rose0\x00'}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 13:43:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) 13:43:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000051c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2148.164223][T18798] hfs: can't find a HFS filesystem on dev loop5 13:43:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) [ 2148.212727][T18803] IPv6: ADDRCONF(NETDEV_CHANGE): rose0: link becomes ready [ 2148.240605][T18798] hfs: can't find a HFS filesystem on dev loop5 13:43:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00*+\x86a\x957s\x16FA\x00'}}) 13:43:33 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xf6ffffff00000000}) 13:43:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) 13:43:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000052c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2148.449136][T18818] hfs: can't find a HFS filesystem on dev loop5 [ 2148.545048][T18818] hfs: can't find a HFS filesystem on dev loop5 13:43:34 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xf9fdffff00000000}) 13:43:34 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) [ 2148.635321][T18812] FAULT_INJECTION: forcing a failure. [ 2148.635321][T18812] name failslab, interval 1, probability 0, space 0, times 0 [ 2148.656561][T18812] CPU: 1 PID: 18812 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2148.665022][T18812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2148.675206][T18812] Call Trace: [ 2148.678528][T18812] dump_stack+0x172/0x1f0 13:43:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={'rose0\x00', 0x201}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'rose0\x00'}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 2148.682875][T18812] should_fail.cold+0xa/0x15 [ 2148.687485][T18812] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2148.693308][T18812] ? ___might_sleep+0x163/0x280 [ 2148.698186][T18812] __should_failslab+0x121/0x190 [ 2148.703140][T18812] should_failslab+0x9/0x14 [ 2148.707658][T18812] __kmalloc+0x2dc/0x740 [ 2148.711917][T18812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2148.718173][T18812] ? btrfs_find_device+0x189/0x1d0 [ 2148.723300][T18812] ? device_list_add+0xf16/0x14d0 [ 2148.728376][T18812] device_list_add+0xf16/0x14d0 [ 2148.733360][T18812] ? btrfs_rm_dev_replace_free_srcdev+0x300/0x300 [ 2148.739791][T18812] ? ___might_sleep+0x163/0x280 [ 2148.744652][T18812] btrfs_scan_one_device+0x378/0x720 [ 2148.749939][T18812] ? btrfs_scan_one_device+0x378/0x720 [ 2148.755422][T18812] ? device_list_add+0x14d0/0x14d0 [ 2148.760542][T18812] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 2148.766442][T18812] ? btrfs_mount_root+0xb36/0x1220 [ 2148.771562][T18812] btrfs_mount_root+0x718/0x1220 [ 2148.776550][T18812] ? btrfs_decode_error+0x70/0x70 [ 2148.781606][T18812] ? rcu_read_lock_sched_held+0x110/0x130 [ 2148.787444][T18812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2148.793687][T18812] ? vfs_parse_fs_string+0x111/0x170 [ 2148.798972][T18812] ? vfs_parse_fs_string+0x111/0x170 [ 2148.804268][T18812] ? rcu_read_lock_sched_held+0x110/0x130 [ 2148.809998][T18812] ? kfree+0x1fa/0x230 [ 2148.814069][T18812] ? vfs_parse_fs_string+0x116/0x170 [ 2148.819383][T18812] ? btrfs_decode_error+0x70/0x70 [ 2148.824420][T18812] legacy_get_tree+0xf2/0x200 [ 2148.829109][T18812] vfs_get_tree+0x123/0x450 [ 2148.833619][T18812] fc_mount+0x17/0xc0 [ 2148.837602][T18812] vfs_kern_mount.part.0+0xd8/0xf0 [ 2148.842828][T18812] vfs_kern_mount+0x40/0x60 [ 2148.847347][T18812] btrfs_mount+0x2b4/0x15e2 [ 2148.851854][T18812] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2148.857487][T18812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2148.863749][T18812] ? should_fail+0x1de/0x852 [ 2148.868353][T18812] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2148.874161][T18812] ? btrfs_remount+0x11f0/0x11f0 [ 2148.879116][T18812] ? rcu_read_lock_sched_held+0x110/0x130 [ 2148.884920][T18812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2148.891165][T18812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2148.897414][T18812] ? vfs_parse_fs_string+0x111/0x170 [ 2148.902785][T18812] ? vfs_parse_fs_string+0x111/0x170 [ 2148.908074][T18812] ? rcu_read_lock_sched_held+0x110/0x130 [ 2148.913796][T18812] ? kfree+0x1fa/0x230 [ 2148.917866][T18812] ? vfs_parse_fs_string+0x116/0x170 [ 2148.923159][T18812] ? btrfs_remount+0x11f0/0x11f0 [ 2148.928098][T18812] legacy_get_tree+0xf2/0x200 [ 2148.932779][T18812] ? btrfs_remount+0x11f0/0x11f0 [ 2148.937714][T18812] ? legacy_get_tree+0xf2/0x200 [ 2148.942570][T18812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2148.948817][T18812] vfs_get_tree+0x123/0x450 [ 2148.953335][T18812] do_mount+0x1436/0x2c40 [ 2148.957674][T18812] ? copy_mount_string+0x40/0x40 [ 2148.962638][T18812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2148.969333][T18812] ? copy_mount_options+0x280/0x3a0 [ 2148.974538][T18812] ksys_mount+0xdb/0x150 [ 2148.978787][T18812] __x64_sys_mount+0xbe/0x150 [ 2148.983469][T18812] do_syscall_64+0x103/0x610 [ 2148.988064][T18812] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2148.994044][T18812] RIP: 0033:0x45b69a [ 2148.997940][T18812] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2149.017553][T18812] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2149.025993][T18812] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2149.034099][T18812] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2149.042072][T18812] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2149.050045][T18812] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2149.058115][T18812] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:34 executing program 4 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00++\x86a\x957s\x16FA\x00'}}) 13:43:34 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) 13:43:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000053c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2149.263699][T18838] hfs: can't find a HFS filesystem on dev loop5 [ 2149.377231][T18842] FAULT_INJECTION: forcing a failure. [ 2149.377231][T18842] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2149.390568][T18842] CPU: 1 PID: 18842 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2149.390578][T18842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2149.390584][T18842] Call Trace: [ 2149.390611][T18842] dump_stack+0x172/0x1f0 [ 2149.390637][T18842] should_fail.cold+0xa/0x15 [ 2149.420875][T18842] ? __lock_acquire+0x548/0x3fb0 13:43:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00,+\x86a\x957s\x16FA\x00'}}) [ 2149.425826][T18842] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2149.425849][T18842] ? __lock_acquire+0x548/0x3fb0 [ 2149.436582][T18842] should_fail_alloc_page+0x50/0x60 [ 2149.441816][T18842] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2149.447301][T18842] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2149.453026][T18842] ? find_held_lock+0x35/0x130 [ 2149.457812][T18842] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2149.463783][T18842] cache_grow_begin+0x9c/0x860 [ 2149.468564][T18842] ? getname_kernel+0x53/0x370 [ 2149.473346][T18842] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2149.479602][T18842] kmem_cache_alloc+0x62d/0x6f0 [ 2149.484468][T18842] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2149.490201][T18842] ? devid_cmp+0x95/0xb0 [ 2149.494455][T18842] getname_kernel+0x53/0x370 [ 2149.499052][T18842] kern_path+0x20/0x40 [ 2149.503125][T18842] lookup_bdev.part.0+0x7b/0x1b0 [ 2149.508070][T18842] ? blkdev_open+0x290/0x290 [ 2149.512666][T18842] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2149.522457][T18842] ? list_sort.part.0+0x605/0x8b0 [ 2149.527498][T18842] blkdev_get_by_path+0x81/0x130 [ 2149.532558][T18842] btrfs_get_bdev_and_sb+0x38/0x300 [ 2149.537773][T18842] open_fs_devices+0x68e/0xbd0 [ 2149.542642][T18842] ? find_fsid+0x2e0/0x2e0 [ 2149.547071][T18842] ? memmove_extent_buffer.cold+0x44/0x44 [ 2149.552805][T18842] btrfs_open_devices+0x147/0x170 [ 2149.557950][T18842] btrfs_mount_root+0x79a/0x1220 [ 2149.562975][T18842] ? btrfs_decode_error+0x70/0x70 [ 2149.568023][T18842] ? rcu_read_lock_sched_held+0x110/0x130 [ 2149.573759][T18842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2149.580106][T18842] ? vfs_parse_fs_string+0x111/0x170 [ 2149.585409][T18842] ? vfs_parse_fs_string+0x111/0x170 [ 2149.590713][T18842] ? rcu_read_lock_sched_held+0x110/0x130 [ 2149.596546][T18842] ? kfree+0x1fa/0x230 [ 2149.600629][T18842] ? vfs_parse_fs_string+0x116/0x170 [ 2149.605931][T18842] ? btrfs_decode_error+0x70/0x70 [ 2149.610972][T18842] legacy_get_tree+0xf2/0x200 [ 2149.615689][T18842] vfs_get_tree+0x123/0x450 [ 2149.620208][T18842] fc_mount+0x17/0xc0 13:43:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={'rose0\x00', 0x201}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'rose0\x00'}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 2149.624198][T18842] vfs_kern_mount.part.0+0xd8/0xf0 [ 2149.629322][T18842] vfs_kern_mount+0x40/0x60 [ 2149.633857][T18842] btrfs_mount+0x2b4/0x15e2 [ 2149.638379][T18842] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2149.644025][T18842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2149.650302][T18842] ? should_fail+0x1de/0x852 [ 2149.655006][T18842] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2149.660834][T18842] ? btrfs_remount+0x11f0/0x11f0 [ 2149.665790][T18842] ? rcu_read_lock_sched_held+0x110/0x130 [ 2149.671521][T18842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2149.677778][T18842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2149.679480][T18838] hfs: can't find a HFS filesystem on dev loop5 [ 2149.684048][T18842] ? vfs_parse_fs_string+0x111/0x170 [ 2149.684062][T18842] ? vfs_parse_fs_string+0x111/0x170 [ 2149.684079][T18842] ? rcu_read_lock_sched_held+0x110/0x130 [ 2149.684095][T18842] ? kfree+0x1fa/0x230 [ 2149.684110][T18842] ? vfs_parse_fs_string+0x116/0x170 [ 2149.684142][T18842] ? btrfs_remount+0x11f0/0x11f0 [ 2149.720987][T18842] legacy_get_tree+0xf2/0x200 [ 2149.725759][T18842] ? btrfs_remount+0x11f0/0x11f0 [ 2149.730711][T18842] ? legacy_get_tree+0xf2/0x200 [ 2149.735570][T18842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2149.741817][T18842] vfs_get_tree+0x123/0x450 [ 2149.746329][T18842] do_mount+0x1436/0x2c40 [ 2149.750675][T18842] ? copy_mount_string+0x40/0x40 [ 2149.755622][T18842] ? copy_mount_options+0x203/0x3a0 [ 2149.760830][T18842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2149.767073][T18842] ? copy_mount_options+0x280/0x3a0 [ 2149.772286][T18842] ksys_mount+0xdb/0x150 [ 2149.776536][T18842] __x64_sys_mount+0xbe/0x150 [ 2149.781226][T18842] do_syscall_64+0x103/0x610 [ 2149.785854][T18842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2149.791751][T18842] RIP: 0033:0x45b69a [ 2149.795646][T18842] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2149.815273][T18842] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2149.823694][T18842] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2149.831670][T18842] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2149.839745][T18842] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2149.847721][T18842] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2149.855797][T18842] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:35 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xfbffffff00000000}) 13:43:35 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) 13:43:35 executing program 4 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000000054000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:43:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) 13:43:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000054c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2150.090708][T18860] hfs: can't find a HFS filesystem on dev loop5 13:43:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) [ 2150.188201][T18860] hfs: can't find a HFS filesystem on dev loop5 [ 2150.195313][T18863] FAULT_INJECTION: forcing a failure. [ 2150.195313][T18863] name failslab, interval 1, probability 0, space 0, times 0 [ 2150.252474][T18863] CPU: 0 PID: 18863 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2150.260501][T18863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2150.270556][T18863] Call Trace: [ 2150.273870][T18863] dump_stack+0x172/0x1f0 [ 2150.278197][T18863] should_fail.cold+0xa/0x15 [ 2150.282792][T18863] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2150.288589][T18863] ? ___might_sleep+0x163/0x280 [ 2150.293426][T18863] __should_failslab+0x121/0x190 [ 2150.298347][T18863] should_failslab+0x9/0x14 [ 2150.302835][T18863] kmem_cache_alloc_trace+0x2d1/0x760 [ 2150.308194][T18863] ? mark_held_locks+0xa4/0xf0 [ 2150.312955][T18863] btrfs_alloc_device+0xb4/0x720 [ 2150.317877][T18863] ? trace_hardirqs_on+0x67/0x230 [ 2150.322887][T18863] ? btrfs_find_device_by_devspec+0x5b0/0x5b0 [ 2150.328946][T18863] close_fs_devices.part.0+0x1af/0x790 [ 2150.334395][T18863] btrfs_close_devices+0xa0/0x200 [ 2150.339406][T18863] btrfs_mount_root+0xf0c/0x1220 [ 2150.344354][T18863] ? btrfs_decode_error+0x70/0x70 [ 2150.349403][T18863] ? rcu_read_lock_sched_held+0x110/0x130 [ 2150.357016][T18863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2150.363241][T18863] ? vfs_parse_fs_string+0x111/0x170 [ 2150.368507][T18863] ? vfs_parse_fs_string+0x111/0x170 [ 2150.373792][T18863] ? rcu_read_lock_sched_held+0x110/0x130 [ 2150.379495][T18863] ? kfree+0x1fa/0x230 [ 2150.383547][T18863] ? vfs_parse_fs_string+0x116/0x170 [ 2150.388818][T18863] ? btrfs_decode_error+0x70/0x70 [ 2150.393940][T18863] legacy_get_tree+0xf2/0x200 [ 2150.398604][T18863] vfs_get_tree+0x123/0x450 [ 2150.403093][T18863] fc_mount+0x17/0xc0 [ 2150.407059][T18863] vfs_kern_mount.part.0+0xd8/0xf0 [ 2150.412155][T18863] vfs_kern_mount+0x40/0x60 [ 2150.416643][T18863] btrfs_mount+0x2b4/0x15e2 [ 2150.421128][T18863] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2150.426745][T18863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2150.432972][T18863] ? should_fail+0x1de/0x852 [ 2150.437547][T18863] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2150.443340][T18863] ? btrfs_remount+0x11f0/0x11f0 [ 2150.448265][T18863] ? rcu_read_lock_sched_held+0x110/0x130 [ 2150.453970][T18863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2150.460216][T18863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2150.466439][T18863] ? vfs_parse_fs_string+0x111/0x170 [ 2150.471704][T18863] ? vfs_parse_fs_string+0x111/0x170 [ 2150.476972][T18863] ? rcu_read_lock_sched_held+0x110/0x130 [ 2150.482674][T18863] ? kfree+0x1fa/0x230 [ 2150.486730][T18863] ? vfs_parse_fs_string+0x116/0x170 [ 2150.492004][T18863] ? btrfs_remount+0x11f0/0x11f0 [ 2150.496928][T18863] legacy_get_tree+0xf2/0x200 [ 2150.501596][T18863] ? btrfs_remount+0x11f0/0x11f0 [ 2150.506518][T18863] ? legacy_get_tree+0xf2/0x200 [ 2150.511355][T18863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2150.517581][T18863] vfs_get_tree+0x123/0x450 [ 2150.522080][T18863] do_mount+0x1436/0x2c40 [ 2150.526400][T18863] ? copy_mount_string+0x40/0x40 [ 2150.531328][T18863] ? _copy_from_user+0xdd/0x150 [ 2150.536163][T18863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2150.542391][T18863] ? copy_mount_options+0x280/0x3a0 [ 2150.547581][T18863] ksys_mount+0xdb/0x150 [ 2150.551809][T18863] __x64_sys_mount+0xbe/0x150 [ 2150.556475][T18863] do_syscall_64+0x103/0x610 [ 2150.561052][T18863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2150.566925][T18863] RIP: 0033:0x45b69a [ 2150.570811][T18863] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2150.590402][T18863] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:43:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00-+\x86a\x957s\x16FA\x00'}}) [ 2150.598802][T18863] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2150.606759][T18863] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 [ 2150.614715][T18863] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2150.622671][T18863] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2150.630642][T18863] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 13:43:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={'rose0\x00', 0x201}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'rose0\x00'}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 2150.703952][T18863] ------------[ cut here ]------------ [ 2150.709473][T18863] kernel BUG at fs/btrfs/volumes.c:1276! [ 2150.716608][T18863] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 2150.722860][T18863] CPU: 1 PID: 18863 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2150.730937][T18863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2150.741015][T18863] RIP: 0010:close_fs_devices.part.0+0x5bf/0x790 [ 2150.747260][T18863] Code: 3c 03 0f 8e 44 01 00 00 48 8b 45 c0 c7 80 30 01 00 00 00 00 00 00 48 83 c4 48 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 e1 c1 c6 fe <0f> 0b e8 da c1 c6 fe 0f 0b e8 d3 c1 c6 fe 0f 0b e9 16 ff ff ff e8 [ 2150.766862][T18863] RSP: 0018:ffff8880608d7770 EFLAGS: 00010246 [ 2150.772928][T18863] RAX: 0000000000040000 RBX: ffff8880a0726040 RCX: ffffc90011f38000 [ 2150.780895][T18863] RDX: 0000000000040000 RSI: ffffffff82a9cacf RDI: 0000000000000007 [ 2150.788889][T18863] RBP: ffff8880608d77e0 R08: ffff8880509d6400 R09: ffffed1015d05bc8 [ 2150.796857][T18863] R10: ffffed1015d05bc7 R11: ffff8880ae82de3b R12: 0000000000000000 [ 2150.804830][T18863] R13: dffffc0000000000 R14: ffff8880995ba900 R15: fffffffffffffff4 [ 2150.812821][T18863] FS: 00007fe511883700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2150.821774][T18863] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2150.828350][T18863] CR2: 000000000070d09b CR3: 0000000094bf8000 CR4: 00000000001406e0 [ 2150.836459][T18863] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2150.844431][T18863] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2150.852395][T18863] Call Trace: [ 2150.855692][T18863] btrfs_close_devices+0xa0/0x200 [ 2150.860721][T18863] btrfs_mount_root+0xf0c/0x1220 [ 2150.865663][T18863] ? btrfs_decode_error+0x70/0x70 [ 2150.870683][T18863] ? rcu_read_lock_sched_held+0x110/0x130 [ 2150.876397][T18863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2150.882638][T18863] ? vfs_parse_fs_string+0x111/0x170 [ 2150.887926][T18863] ? vfs_parse_fs_string+0x111/0x170 [ 2150.893206][T18863] ? rcu_read_lock_sched_held+0x110/0x130 [ 2150.898929][T18863] ? kfree+0x1fa/0x230 [ 2150.902996][T18863] ? vfs_parse_fs_string+0x116/0x170 [ 2150.908281][T18863] ? btrfs_decode_error+0x70/0x70 [ 2150.913308][T18863] legacy_get_tree+0xf2/0x200 [ 2150.917984][T18863] vfs_get_tree+0x123/0x450 [ 2150.922488][T18863] fc_mount+0x17/0xc0 [ 2150.926471][T18863] vfs_kern_mount.part.0+0xd8/0xf0 [ 2150.931927][T18863] vfs_kern_mount+0x40/0x60 [ 2150.936517][T18863] btrfs_mount+0x2b4/0x15e2 [ 2150.941037][T18863] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2150.946675][T18863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 13:43:36 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'maccroatian'}}], [], 0xfcfdffff00000000}) [ 2150.946773][ T3875] kobject: 'loop5' (000000000178fee8): kobject_uevent_env [ 2150.952909][T18863] ? should_fail+0x1de/0x852 [ 2150.952922][T18863] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2150.952936][T18863] ? btrfs_remount+0x11f0/0x11f0 [ 2150.952956][T18863] ? rcu_read_lock_sched_held+0x110/0x130 [ 2150.963920][ T3875] kobject: 'loop5' (000000000178fee8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2150.964643][T18863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2150.964655][T18863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2150.964672][T18863] ? vfs_parse_fs_string+0x111/0x170 [ 2151.008937][T18863] ? vfs_parse_fs_string+0x111/0x170 [ 2151.014221][T18863] ? rcu_read_lock_sched_held+0x110/0x130 [ 2151.019939][T18863] ? kfree+0x1fa/0x230 [ 2151.024005][T18863] ? vfs_parse_fs_string+0x116/0x170 [ 2151.029302][T18863] ? btrfs_remount+0x11f0/0x11f0 [ 2151.034242][T18863] legacy_get_tree+0xf2/0x200 [ 2151.038922][T18863] ? btrfs_remount+0x11f0/0x11f0 [ 2151.043857][T18863] ? legacy_get_tree+0xf2/0x200 [ 2151.048705][T18863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2151.054939][T18863] vfs_get_tree+0x123/0x450 [ 2151.059444][T18863] do_mount+0x1436/0x2c40 [ 2151.063879][T18863] ? copy_mount_string+0x40/0x40 [ 2151.068816][T18863] ? _copy_from_user+0xdd/0x150 [ 2151.073679][T18863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2151.079924][T18863] ? copy_mount_options+0x280/0x3a0 [ 2151.085122][T18863] ksys_mount+0xdb/0x150 [ 2151.089381][T18863] __x64_sys_mount+0xbe/0x150 [ 2151.094054][T18863] do_syscall_64+0x103/0x610 [ 2151.098646][T18863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2151.104550][T18863] RIP: 0033:0x45b69a [ 2151.108464][T18863] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2151.128066][T18863] RSP: 002b:00007fe511882a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2151.136475][T18863] RAX: ffffffffffffffda RBX: 00007fe511882b40 RCX: 000000000045b69a [ 2151.144452][T18863] RDX: 00007fe511882ae0 RSI: 0000000020000100 RDI: 00007fe511882b00 13:43:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000055c000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2151.152429][T18863] RBP: 0000000000000001 R08: 00007fe511882b40 R09: 00007fe511882ae0 [ 2151.160275][ T3875] kobject: 'loop3' (0000000013eda79e): kobject_uevent_env [ 2151.160404][T18863] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2151.169153][ T3875] kobject: 'loop3' (0000000013eda79e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2151.175460][T18863] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 2151.193559][T18863] Modules linked in: [ 2151.205753][ T3875] kobject: 'loop0' (000000009b615bbb): kobject_uevent_env [ 2151.206580][T18863] ---[ end trace 5dde528459c26d11 ]--- [ 2151.218021][ T3875] kobject: 'loop0' (000000009b615bbb): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2151.219665][T18863] RIP: 0010:close_fs_devices.part.0+0x5bf/0x790 [ 2151.230515][ T3875] kobject: 'loop2' (000000002030b2a1): kobject_uevent_env [ 2151.236881][T18863] Code: 3c 03 0f 8e 44 01 00 00 48 8b 45 c0 c7 80 30 01 00 00 00 00 00 00 48 83 c4 48 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 e1 c1 c6 fe <0f> 0b e8 da c1 c6 fe 0f 0b e8 d3 c1 c6 fe 0f 0b e9 16 ff ff ff e8 [ 2151.244738][ T3875] kobject: 'loop2' (000000002030b2a1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2151.264531][T18863] RSP: 0018:ffff8880608d7770 EFLAGS: 00010246 [ 2151.275844][ T3875] kobject: 'loop4' (0000000038e74b32): kobject_uevent_env [ 2151.280080][T18863] RAX: 0000000000040000 RBX: ffff8880a0726040 RCX: ffffc90011f38000 [ 2151.295506][T18863] RDX: 0000000000040000 RSI: ffffffff82a9cacf RDI: 0000000000000007 13:43:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001380)={'#! ', './file0', [], 0xa, "4c9b2fdbe0decafe152c843e979b7b0a6fb293db6b"}, 0x20) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffe5f}, 0x0) [ 2151.297061][ T3875] kobject: 'loop4' (0000000038e74b32): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2151.333594][T18863] RBP: ffff8880608d77e0 R08: ffff8880509d6400 R09: ffffed1015d05bc8 [ 2151.342706][T18882] kobject: 'loop3' (0000000013eda79e): kobject_uevent_env [ 2151.350706][T18882] kobject: 'loop3' (0000000013eda79e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2151.355791][ T3875] kobject: 'loop1' (000000004dd4893c): kobject_uevent_env [ 2151.368970][T18863] R10: ffffed1015d05bc7 R11: ffff8880ae82de3b R12: 0000000000000000 [ 2151.379101][T18863] R13: dffffc0000000000 R14: ffff8880995ba900 R15: fffffffffffffff4 [ 2151.379842][ T3875] kobject: 'loop1' (000000004dd4893c): fill_kobj_path: path = '/devices/virtual/block/loop1' 13:43:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\xdf6+\x86a\x957s\x16FA\x00'}}) [ 2151.398894][T18863] FS: 00007fe511883700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2151.408083][T18883] kobject: 'loop5' (000000000178fee8): kobject_uevent_env [ 2151.411940][ T3875] kobject: 'loop3' (0000000013eda79e): kobject_uevent_env [ 2151.419757][T18883] kobject: 'loop5' (000000000178fee8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2151.429876][ T3875] kobject: 'loop3' (0000000013eda79e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2151.433338][T18863] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 13:43:36 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'rose0\x00', 0x201}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'rose0\x00'}) [ 2151.458180][T18863] CR2: 0000000000000000 CR3: 0000000094bf8000 CR4: 00000000001406e0 [ 2151.461676][ T3875] kobject: 'loop5' (000000000178fee8): kobject_uevent_env [ 2151.467367][T18863] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2151.482699][T18863] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2151.491062][ T3875] kobject: 'loop5' (000000000178fee8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2151.494857][T18863] Kernel panic - not syncing: Fatal exception [ 2151.503726][ T3875] kobject: 'loop2' (000000002030b2a1): kobject_uevent_env [ 2151.508670][T18863] Kernel Offset: disabled [ 2151.523676][T18863] Rebooting in 86400 seconds..