x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e6661740002010002000270fff800", 0xffffffffffffffd6}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 04:58:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1c000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2685.536215] audit: type=1800 audit(1568782697.899:1779): pid=27337 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=324 res=0 04:58:18 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) dup2(r0, 0xffffffffffffffff) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="01beea074c91560000002000000085f209e00300000006258edba113d0e4a1000000000075be", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}, 0x20) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000000)={r5, 0x7, 0x26886b81}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000080)={r6, 0x800, 0xed9d07e, 0x5, 0x9, 0xfffffffffffffffc}, &(0x7f00000000c0)=0x14) 04:58:18 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1d000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2685.878019] hfsplus: unable to load nls mapping " [ 2685.878019] so8859-6" [ 2685.893977] hfsplus: unable to parse mount options 04:58:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x40000) read$char_usb(r1, &(0x7f0000000240)=""/227, 0xe3) 04:58:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x2, 0x2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r3, 0x0) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e24, 0x3a22, @dev={0xfe, 0x80, [], 0x16}, 0x7c9}}, 0xb67, 0x20984f1e, 0x883, 0x2, 0x100}, &(0x7f0000000240)=0x98) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r6, &(0x7f0000000180), 0x8) ioctl$DRM_IOCTL_SET_UNIQUE(r6, 0x40106410, &(0x7f0000000340)={0x35, &(0x7f0000000300)="35ddbd7c96b6f34abd50224e1aaf882a6f01bb91fd8b854d960bcbb70ff354bdb1967eb00413a86fd45b20f15c227f31db4f953789"}) mlockall(0x2) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000280)={0x7, 0x3e5b, 0x0, 0x6, 0xffffffff, 0xb5f, 0x4, 0x4, r5}, 0x20) r7 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r1, r7, 0x0, 0x7fffffa7) 04:58:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x8) getsockopt$ax25_int(r1, 0x101, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) 04:58:18 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2686.081567] hfsplus: umask requires a value [ 2686.086019] hfsplus: unable to parse mount options [ 2686.127591] hfsplus: unable to load nls mapping " [ 2686.127591] so8859-6" [ 2686.134951] hfsplus: unable to parse mount options 04:58:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x50800, 0xc) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 2686.402707] audit: type=1800 audit(1568782698.869:1780): pid=28158 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=325 res=0 04:58:19 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x02W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:19 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) 04:58:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1f000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000000)={0x0, 0x7}, 0x8) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0xffffffffffffff7a}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r3, r4, 0x0, 0x7fffffa7) [ 2686.640563] hfsplus: umask requires a value [ 2686.649546] hfsplus: unable to parse mount options [ 2686.676493] hfsplus: unable to load nls mapping " [ 2686.676493] so8859-6" 04:58:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2686.694698] hfsplus: unable to parse mount options 04:58:19 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x200000, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000200)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x1f, 0x81, 0x9, 0xb31, 0x9}, 0x14) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r4, &(0x7f0000000180), 0x8) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="ebc4733d0a00"]) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r5, &(0x7f0000000180), 0x8) ioctl$DRM_IOCTL_GET_MAGIC(r5, 0x80046402, &(0x7f00000002c0)=0x18) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1f, 0x74381990dd499283, 0x2, 0x6, 0x7, 0x7}, &(0x7f0000000080)=0x20) 04:58:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x40000) read$char_usb(r1, &(0x7f0000000240)=""/227, 0xe3) 04:58:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = semget$private(0x0, 0x7, 0x0) semop(r2, &(0x7f0000000080)=[{0x0, 0x80}, {}], 0x2) semtimedop(r2, &(0x7f00000000c0)=[{0x4, 0x7fffffff}], 0x1, 0x0) semop(r2, &(0x7f0000000040)=[{0x4, 0x7, 0x800}, {0x2, 0x10000, 0x1800}, {0x4, 0x5, 0x800}, {0x3, 0x0, 0x800}, {0x0, 0x5, 0x1000}, {0x2, 0x8, 0x800}, {0x3ae8b71e2f230223, 0x1, 0x5fca690b5c479d8e}, {0x0, 0xffffffff, 0x1800}, {0x4, 0x6}, {0x4, 0xec, 0x800}], 0x2bc1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r3, 0x0) accept(r3, 0x0, 0x0) writev(r3, &(0x7f0000000500), 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) fstat(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") listen(r7, 0x3) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000080), &(0x7f0000000240)=0x0, &(0x7f0000000280)) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000300)={{0x7, r5, r6, r8, r9, 0x5aaee53004174810, 0xfffffffffffff800}, 0x200, 0x10000, 0x74b2}) r10 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r1, r10, 0x0, 0x7fffffa7) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r11, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) openat$vimc2(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/video2\x00', 0x2, 0x0) listen(r11, 0x0) r12 = accept(r11, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r12, &(0x7f00000013c0)={0x0, 0xffffffffffffff49, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYRESDEC], 0x1}}, 0x8080) sendto$rose(r12, &(0x7f0000000380)="7f7eb7b919430ca698dcbcb1b7febf4d35e01b71b9421822466c023e20cc83438b20c27997422401fe96e01c8befe4e95b2db6a4a7ec4372a8981fbdce71735bdd3e331abb0005a7e0a23d32d690d51382302ca4604854f128b6c884e39783b1305fbdbf2346e91287dc48c5696e9cc2e0dd4bf979d44e3db19ff2eb6d5d6bd453cad1726a8783213dccc8e017ae3cf12d0bafdc39b0ecff8444cfa3ec32eb7ba5fc10236c74f4258f5af117aa54e07979e73c58fe7d3f46035034e918df8c91d3a79e65150f21af306878bf9920", 0xce, 0x8000, &(0x7f0000000480)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast]}, 0x40) 04:58:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x6b6b6b00000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_UNIQUE(r5, 0xc0106401, &(0x7f0000000080)={0x73, &(0x7f0000000000)=""/115}) [ 2687.120406] hfsplus: umask requires a value [ 2687.137289] hfsplus: unable to parse mount options [ 2687.300840] audit: type=1800 audit(1568782699.769:1781): pid=28782 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=326 res=0 [ 2687.345758] audit: type=1804 audit(1568782699.789:1782): pid=28782 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir956972793/syzkaller.BI9LIb/5501/file0/file0" dev="loop2" ino=326 res=1 [ 2687.377993] audit: type=1800 audit(1568782699.789:1783): pid=28782 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=326 res=0 04:58:19 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x04W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0xf4e5e06f36c0b069) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x2, 0x3, 0x100, 0x2}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = accept(r2, 0x0, 0x0) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r4, 0x0) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d49f34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r7, 0x0) r8 = accept(r7, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r8, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r9, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r9, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r9, 0x1) recvfrom$inet6(r9, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r9) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r10, 0x0) r11 = accept(r10, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r11, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYPTR64, @ANYRESHEX=r1], @ANYRESDEC=r5, @ANYRES32=r6, @ANYPTR=&(0x7f0000000e00)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES16=r8, @ANYPTR64, @ANYBLOB="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", @ANYRESOCT=r3, @ANYRESDEC, @ANYRESHEX=r11], @ANYRES64=r9, @ANYRESHEX=0x0, @ANYRESHEX, @ANYRES64=r0]], 0x1}}, 0x8000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x7ff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000140)={0x0, 0x3f}, &(0x7f00000001c0)=0x8) r12 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r13 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r13, 0x84, 0x1d, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r12, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r14}, 0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={r14, 0x2}, 0x3a9) 04:58:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x22000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='v;FO\x9d', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 04:58:20 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2687.560490] hfsplus: umask requires a value [ 2687.570418] hfsplus: unable to parse mount options 04:58:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e0c00438dae13553e6659e9f1d745366ec214a23c5017113f26dbb872ccbc058a6a12f1a7ff90292c066618d5d077"]) [ 2687.822201] hfsplus: unable to parse mount options 04:58:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x40000) read$char_usb(r1, &(0x7f0000000240)=""/227, 0xe3) 04:58:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2c000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:20 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) accept(r2, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000014) 04:58:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_elf64(r0, &(0x7f0000000c00)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x2, 0x1, 0x800, 0x0, 0x3, 0x5b, 0x7, 0xf7, 0x40, 0x2d8, 0x3f, 0xfffffffffffffffb, 0x38, 0x2, 0xe50, 0x8, 0x40}, [{0x8000000f, 0xd47, 0x8, 0x9, 0x8, 0x5, 0xf2, 0x5}], "9ea4e8fd6cd583a39171fb414f123ebc14d0eceee9f8befda18c5d81e95d96ab43", [[], [], [], [], [], []]}, 0x699) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bdev\x00', 0x1116870, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xfff, 0x2401) renameat2(r1, &(0x7f00000001c0)='./file1\x00', r2, &(0x7f00000002c0)='./file0\x00', 0x1) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000600)=@nat={'nat\x00', 0x1b, 0x5, 0x568, 0x1d8, 0x2f8, 0x2f8, 0x1d8, 0x2f8, 0x4d0, 0x4d0, 0x4d0, 0x4d0, 0x4d0, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x1a0, 0x1d8, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x40, [0x3, 0x1, 0x200, 0x2, 0x9, 0x2], 0x5}}}, @common=@unspec=@conntrack3={0xc8, 'conntrack\x00', 0x3, {{@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, [0xff, 0xffffffff, 0xffffffff, 0xff], @ipv4=@dev={0xac, 0x14, 0x14, 0x29}, [0xff000000, 0xffffffff, 0x0, 0xffffff00], @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, [0xff000000, 0xff000000, 0xffffff, 0xff], @ipv6=@local, [0xffffff00, 0xffffffff, 0x0, 0xffffffff], 0x5, 0x3, 0x21, 0x4e21, 0x4e21, 0x4e22, 0x4e22, 0x8, 0x200}, 0x1, 0x2000, 0x4e22, 0x4e24, 0x4e24, 0x4e20}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x2d, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @port=0x4e20, @gre_key=0xfffffffffffffff9}}}}, {{@ip={@local, @empty, 0x0, 0xff, '\x00', 'ip6_vti0\x00', {}, {0xff}, 0x1d, 0x0, 0x10}, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x0, [0x0, 0xd, 0x9, 0x0, 0x8, 0x5], 0x4, 0x3}}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x10, @ipv6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x15}}, @ipv6=@dev={0xfe, 0x80, [], 0x14}, @icmp_id=0x64, @icmp_id=0x64}}}, {{@ip={@local, @loopback, 0xff, 0x69fc27fbd36f1961, 'veth1_to_bridge\x00', 'ip6erspan0\x00', {}, {0xff}, 0x2, 0x0, 0x50}, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x0, 0xfffffffffffeffff}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x10, @dev={0xac, 0x14, 0x14, 0xa}, @remote, @icmp_id=0x68, @port=0x4e22}}}}, {{@ip={@empty, @broadcast, 0xffffffff, 0xff000000, 'bridge_slave_0\x00', 'bond0\x00', {0xff}, {0x101}, 0x1, 0x2, 0x21}, 0x0, 0x98, 0xe0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x4, @ipv6=@dev={0xfe, 0x80, [], 0x19}, @ipv4=@local, @port=0x4e22, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5c8) [ 2688.051105] hfsplus: umask requires a value [ 2688.072298] hfsplus: unable to parse mount options [ 2688.203550] hfsplus: unable to load nls mapping " [ 2688.203550] so8859-6" [ 2688.224721] hfsplus: unable to parse mount options 04:58:20 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x06W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:20 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000540), &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@ng={0x4, 0x9, "f078c39f8f6ec5663d9d2d32730ad859d94253"}, 0x15, 0x1) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x410201, 0x110) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 04:58:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3f000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000140)=0xfffffffffffffe2c) ioctl$SIOCAX25GETUID(r2, 0x89e0, &(0x7f0000000180)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r3}) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="6e6c723d0a736f382835392d36e754"]) 04:58:21 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2688.553671] hfsplus: umask requires a value [ 2688.571841] hfsplus: unable to parse mount options 04:58:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESDEC=r0]) [ 2688.780277] hfsplus: unable to parse mount options 04:58:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x40000) read$char_usb(r1, &(0x7f0000000240)=""/227, 0xe3) 04:58:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0xaaaaaaaaaaaad03, &(0x7f0000000140)=[{&(0x7f0000010000)="eb07000000000000006174000a04010002000270fff8", 0x16, 0x4}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)={0x101, 0x6, 0x0, 0xffffffffffff7fff, 0x7c}) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 04:58:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:21 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_MARK_BUFS(r5, 0x40206417, &(0x7f00000003c0)={0x2, 0x200, 0x0, 0x6, 0x2, 0x9}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) ioctl(r6, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r7, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r7, 0x1) recvfrom$inet6(r7, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r7) getpeername(r7, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$fou(&(0x7f00000006c0)='fou\x00') sendmsg$FOU_CMD_DEL(r9, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000002040)={&(0x7f0000000280)={0x1c, r10, 0x903, 0x0, 0x0, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e21}]}, 0x1c}}, 0x0) sendmsg$FOU_CMD_ADD(r8, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x3c, r10, 0x100, 0x70bd28, 0x25dfdbff, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3a}, @FOU_ATTR_PEER_V4={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @FOU_ATTR_AF={0x8}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x20004004) [ 2689.011145] hfsplus: umask requires a value [ 2689.015632] hfsplus: unable to parse mount options 04:58:21 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\'W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:21 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6f6465636f6d706f73652c6f626a5f747970653d2c7375626a5f757365723d6e6c732c636f6e7465316a875f0301ebc25c9d6f78743d73746166665f752c6f"]) 04:58:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0xffffffffffffff01, 0xff}]}, 0xc, 0x2) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 04:58:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x48000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2689.454601] hfsplus: umask requires a value [ 2689.462487] hfsplus: unable to parse mount options 04:58:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x8bb288bb3275272f, 0x4) sendfile(r1, r2, 0x0, 0x7fffffa7) 04:58:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(0x0, 0x0, 0x40000) read$char_usb(r1, &(0x7f0000000240)=""/227, 0xe3) 04:58:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = creat(&(0x7f0000000000)='./file0\x00', 0x100) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0x3e, "bf820a97b7752b3a1117ad52ef6f4a3e54a5b21881b19e4b4c72501c8177bca1816994ac7b0f39fef34f51f9957a2d91aa77a3c7acba6e2bde733c1b5e6a"}, &(0x7f00000000c0)=0x46) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r4, @in6={{0xa, 0x4e24, 0x401, @rand_addr="9bcd525f680b1cf49d27b187c8e8a0bf", 0xffffffffffffff7f}}, 0x0, 0xfca}, 0x90) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) 04:58:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x4c000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x900000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000000)=""/36) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) recvfrom$rose(0xffffffffffffffff, &(0x7f0000000600)=""/4096, 0x1000, 0x40000020, &(0x7f0000000080)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x5, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x40) read$eventfd(r3, &(0x7f0000000180), 0x8) ioctl$VIDIOC_G_STD(r3, 0x80085617, &(0x7f0000000040)) [ 2689.970571] hfsplus: umask requires a value [ 2689.976970] hfsplus: unable to parse mount options [ 2690.061056] FAT-fs (loop2): bogus number of reserved sectors [ 2690.096999] FAT-fs (loop2): Can't find a valid FAT filesystem 04:58:22 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3/W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(0x0, 0x0, 0x40000) read$char_usb(r1, &(0x7f0000000240)=""/227, 0xe3) 04:58:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xa00000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r6, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f00000000c0)={'eql\x00', 0x4000}) getsockopt$inet_udp_int(r4, 0x11, 0x6f, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$IOC_PR_RESERVE(r3, 0x401070c9, &(0x7f0000000000)={0x3, 0x0, 0x1}) 04:58:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$packet(0x11, 0x3, 0x300) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 04:58:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x60000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(0x0, 0x0, 0x40000) read$char_usb(r1, &(0x7f0000000240)=""/227, 0xe3) [ 2690.504287] hfsplus: umask requires a value [ 2690.521069] hfsplus: unable to parse mount options [ 2690.526935] hfsplus: unable to load nls mapping " [ 2690.526935] so8859-6" 04:58:23 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x110e000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, &(0x7f0000000240)=""/227, 0xe3) [ 2690.552755] hfsplus: unable to parse mount options 04:58:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_evm(r0, &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@sha1={0x1, "e59defdcd8b320518fe2c71e176ebeb4e1b043b1"}, 0x15, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='nls9-6,\x00']) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xb, 0x0, 0x10000}) r4 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$EVIOCGKEYCODE(r4, 0x80084504, &(0x7f0000000140)=""/213) 04:58:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x68000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:23 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2690.841131] hfsplus: unable to parse mount options 04:58:23 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3HW\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xffffffff, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) 04:58:23 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x6b6b6b00, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2691.434301] hfsplus: unable to load nls mapping " [ 2691.434301] so8859-6" [ 2691.449213] hfsplus: unable to parse mount options 04:58:23 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2200000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f0000000240)=""/227, 0xe3) 04:58:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000140)=0xc) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@empty}}, &(0x7f00000003c0)=0xe8) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="02000000010004000000000002000500", @ANYRES32=r2, @ANYBLOB="02000200", @ANYRES32=r4, @ANYBLOB="02000900", @ANYRES32=0x0, @ANYBLOB="02000600", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="8ee29803f2c4af", @ANYRES32=r9, @ANYBLOB="1000aea7000000002000050000000000"], 0x54, 0x1) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="6e6c0000002d362c002bd0ec95fa2b57bdc6f2979716acdf10933417af5103a0e13fe3ca0d88e8f7cc1710b91d237160dfdef35851d95b03ad37a9824bf4c417305fdd922125d9c1b7e41d8ddfb9e798c5bebced3b62677b57fe498e50bae2cdc65e088489c86ade10e230e0c292e9e0b7c52f937cd067bf7dd0b2494d692b800c646a5a802ca8f9413904838eb2a49f508963a12bc1e38f7a2d2c83bad3a6326bd5956802a2c4de5c19ee3e4d2f06d599565cc476e530bbc601eda6db8b2c"]) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80040, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r10, 0x0) r11 = accept(r10, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r11, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) ioctl$SIOCX25GSUBSCRIP(r11, 0x89e0, &(0x7f0000000540)={'bridge_slave_0\x00', 0x3, 0x607}) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000040)=""/14) 04:58:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x6c000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:24 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2c00000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f0000000240)=""/227, 0xe3) 04:58:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)=';\x19=\x0f]\x04\x05\x05', &(0x7f0000000280)='./file0\x00', 0x0, 0x30f, 0x0, 0x0, &(0x7f0000000000)={[{@umask={'umask', 0x3d, 0x3ff}}]}) [ 2691.955764] hfsplus: umask requires a value [ 2691.965830] hfsplus: unable to parse mount options 04:58:24 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:24 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3LW\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f0000000240)=""/227, 0xe3) 04:58:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='\x00'/15]) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) accept(r1, 0x0, 0x0) r2 = dup(r1) getsockopt$bt_hci(r2, 0x0, 0x1, &(0x7f0000000000)=""/139, &(0x7f00000000c0)=0x8b) 04:58:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x74000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:24 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) 04:58:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x4800000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2692.477978] hfsplus: unable to find HFS+ superblock [ 2692.487186] hfsplus: umask requires a value [ 2692.505069] hfsplus: unable to parse mount options 04:58:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x7a000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x400, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) ioctl$SIOCAX25DELUID(r3, 0x89e2, &(0x7f0000000140)={0x3, @null, r5}) setuid(r2) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@nls={'nls', 0x3d, '\nso8859-6'}}], [{@audit='audit'}, {@smackfshat={'smackfshat', 0x3d, '\nso8859-6'}}, {@uid_eq={'uid', 0x3d, r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'hfsplus\x00'}}, {@dont_hash='dont_hash'}, {@smackfstransmute={'smackfstransmute', 0x3d, '\\.eth0\''}}, {@seclabel='seclabel'}]}) [ 2692.953422] hfsplus: umask requires a value [ 2692.968858] hfsplus: unable to parse mount options 04:58:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x18c4) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) [ 2693.225584] hfsplus: unable to load nls mapping " [ 2693.225584] so8859-6" [ 2693.240616] hfsplus: unable to parse mount options 04:58:25 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3hW\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x6800000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)={0x50, r3, 0x31, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x8, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x50}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x26000000}, 0xc, &(0x7f0000000400)={&(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="00022bbd7000fddbdf25050000000c0001000800090053000000"], 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x406c810) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x121300, 0x0) ioctl$SG_GET_VERSION_NUM(r4, 0x2282, &(0x7f0000000140)) read$eventfd(r1, &(0x7f0000000200), 0xffffffffffffff36) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000080)={0x73, &(0x7f0000000000)="46af8418babd5a294687e97651ae782869b90cf428dd45e7c329365920992b6880a067f2814f9c3fa7765a1aeaa934c4dd0335a919fba18e4f56053b7422c80d5075ae7bc77db730a2555bf6593e1ad6706e4f1632b97d5e0fb024b4d64190b8618468e162e5961ab096935190f038b63780d7"}) 04:58:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x400, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) ioctl$SIOCAX25DELUID(r3, 0x89e2, &(0x7f0000000140)={0x3, @null, r5}) setuid(r2) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@nls={'nls', 0x3d, '\nso8859-6'}}], [{@audit='audit'}, {@smackfshat={'smackfshat', 0x3d, '\nso8859-6'}}, {@uid_eq={'uid', 0x3d, r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'hfsplus\x00'}}, {@dont_hash='dont_hash'}, {@smackfstransmute={'smackfstransmute', 0x3d, '\\.eth0\''}}, {@seclabel='seclabel'}]}) 04:58:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2693.610976] hfsplus: unable to parse mount options 04:58:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x400, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) ioctl$SIOCAX25DELUID(r3, 0x89e2, &(0x7f0000000140)={0x3, @null, r5}) setuid(r2) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@nls={'nls', 0x3d, '\nso8859-6'}}], [{@audit='audit'}, {@smackfshat={'smackfshat', 0x3d, '\nso8859-6'}}, {@uid_eq={'uid', 0x3d, r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'hfsplus\x00'}}, {@dont_hash='dont_hash'}, {@smackfstransmute={'smackfstransmute', 0x3d, '\\.eth0\''}}, {@seclabel='seclabel'}]}) 04:58:26 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x7400000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000108912, &(0x7f0000000040)="11dca5005efacee47b70708dc87e722461b83fff0ccaf31b4ee74341dcce21351222ab3fff0cee6ad10e340920588d8dd33d5b065790101b2b8e833e056f3e28f2c5f90f3c7a28c3353e1390b64d1c") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=0x0]) [ 2693.754766] hfsplus: umask requires a value [ 2693.766341] hfsplus: unable to parse mount options 04:58:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x400, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) ioctl$SIOCAX25DELUID(r3, 0x89e2, &(0x7f0000000140)={0x3, @null, r5}) setuid(r2) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@nls={'nls', 0x3d, '\nso8859-6'}}], [{@audit='audit'}, {@smackfshat={'smackfshat', 0x3d, '\nso8859-6'}}, {@uid_eq={'uid', 0x3d, r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'hfsplus\x00'}}, {@dont_hash='dont_hash'}, {@smackfstransmute={'smackfstransmute', 0x3d, '\\.eth0\''}}, {@seclabel='seclabel'}]}) 04:58:26 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2693.901726] hfsplus: unable to find HFS+ superblock 04:58:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xffffffff, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) 04:58:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x200000, 0x80) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000000)={0x80000000, 0x0, 0x10000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000040)={0x9, r3, 0x0, 0x5}) sendfile(r1, r2, 0x0, 0x7fffffa7) 04:58:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) sendmmsg$nfc_llcp(r2, &(0x7f0000002e80)=[{&(0x7f0000000000)={0x27, 0x1, 0x1, 0x6, 0x8, 0x3f, "d86584ec23bf552ef503793f832f86b6ad1e7f12ad6a701ca586a5b469e8ad41f42d13e640d369d31f0fa2ebf99900a24344428bf647fc57d38e71d6a9c39b", 0x1b}, 0x60, &(0x7f00000000c0)=[{&(0x7f0000000080)="797e1db9768b6c1767efd4d7fc1b2d5fc68b799fc5de3d2b83", 0x19}], 0x1, 0x0, 0x0, 0x20000001}, {&(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x200, 0x2, "40de54fa7f8c4d73d6cac84cee9482d99a7999b20c5f750e8a93c55995c8390368c765adedfe0be97cf9d1c3fc70dd6413472aaa6713229c6a764ec157a1c8", 0x37}, 0x60, &(0x7f0000000480)=[{&(0x7f00000002c0)="106de41216e8ae7744da4888c68f654dcd81774292de8b20c740efbbe3301a467431482406191f42805507665ed612266f58c83627196fddc25f1728367e80d11c5d1168d2d982ed3b0d1fbae184a34b8140e19b3fdbc4fb5d76f7a9cf1824547936391864e680a95469b5c904901360cd884a7602dc6c491dbb378b3ca30eed464e7063c6e65fb809aa9814387546c7c21a21902f215c48c19302a74ecb910c55dbc9dc4121fe60351b51a1c0a7ed71507248939c5f3fa930688494e3ce634b6b09dd7171656ec1af89b7789663646b298251172928446c05ccca48fdd86e682135f8115fbb2047d8", 0xe9}, {&(0x7f00000001c0)="28d09dc9379b66553ac3801cc9002852de37f93722e3d634e97253e755780963bfa088722da6", 0x26}, {&(0x7f0000000600)="82ed68de4c68d327c8a73c5585e4e5b74783ce3fb99ff4a5f0ecf704c7f1a62be17339e80544bd652c2644cb98ae3b0dfcb02ade51baa8c1c1b91cdb4ae838927a4d178fa04ed7f918e22f233d8757ae73ab8fedb6553f802151ffa3193900c5b17f625ae3f2582f274489ba875939e15d9f44afa1a75b4a91d204f0bf8df4934d9d0dd789bc467fa991eb4d67ce8a78dd625175d579437ab79eb11bf7c7c27542c341a478a748e8bdffc0ffc249f15737c2e7cae9900dac4e6fa664e588fb2ae8f0dad917788b50937e92cbf00dcbb7ef0681978996cb60538812e511535e18ac26863e07d50bf75b23e0ae6d9667fc1b00a83e1ef5e2293237f6aa62c22b2e69fea15a2b43d1afae340b4bc8205a36d5e1637669df2e2dbc91e140bd4c4a92a4458fb8bcb371b7a260c95b180e1b5092f595d6537c927ebdceee147a7ffc8f9c356e1fbe00c234e5aac98ac05dfe2040f191f1d82814675e65afb09a801a353a9472d0dd7139709b68c530eb3e3f19e4f4ffb8624a512e414db3e182bd8052503a62a4c6c9ded9ca63ee61022860cd153ad81af6439dca22f5132c2f030e663dd9c0c76c7e485b9f0b18e855102ba8f6ec17ab5942acd8fc1ecc4949384bcec381e0a20274ccb1ba3bb6f5d5494fe28aa0fa85712bb101975a41acec813dec1437c8149a30e496f160ddeeaeed957f170c5ca190a896b2e4cc7453f60133c73bc43010c3b2d8b08d7da30088d334909d2bae2a12a4da34141a5e8d9ddf4a827a42e72f41b2dd069b25b21638cfac06b3ec1e8fc1e2db41556b9865c26d49dfd1afbe96fea55ac978f5f0d1ebae696ee3838ae62821c062bd58d86f4a4426800da9d0de5aab50dd0e9bba34957f3761b909d32b6fd116295c926d8d219269208d1ddc05fc1faf7e5486194c90bdcb7d037b18b35e6f8b9f93e73f39493abada1a2cca7969ce3cb6ac511850b386b28211ccc6761dacfe6aad9eae312155d5dd285846fb9db171d31c85d853a28219a86d0830814a5dbe5e83be2c7683c9dc9c7f97788342b7ab5b9283a7a87a77fa1a4f65ad9d8dddab9b35a37cd4b57163d74359b0d448d89153b1a5cb369ce7586b89228f1aa0d05e262033e2888883fe1c817804c5a39ef46db3a6e54e9b68973989fcd970c50c12308eae0ac46996e8582c392b2565ccd93764351a05fc2a6964e079eddc8ce0cf8c016e9f539417ddd36d84deb62afad16e97c8a3a090a57bfb6270203abd88d80d6ef0db7881e012dba749c190dee189b88a26ee859b3de3fc1523f42f818e9e6d4c439b93cb8c4d67b2719ad6b321a4704a5c72ff96485bfbccac1ea2a27d359b1b5c02b2d1cdbbec16839da4e8561c9ad272cf9a70606fb9d22811a946efe0b320cf675a1122d56ae2cfacf74b283789c172202e9ee397f2d658b26ec6e082cd50a5afd7ab89dd37f30f2d1a1bd6394aa64e8bd1e5e11a59c35b040a16f4b08d717eee156fe7b61cec69c5918e6c821962d628b7d1d76688bd7bfd76f1559f8cc7f452d1d0d855ab71511074a0a9a204906c9cb9b1fe16ff6588dbbbcdfb7fbe03d88911062ff1a5291189b18f64915c0aa56e2727c8a77afe1caff15a042fe588f5564180da27f63e49a061ed9a8e7332210614472de6c5c8c6d88373ba22de24228bb0f2e51db4abd4baf3d5dc5816623d15864134fb31ea3d58c3f8748361c822ccbc43bcc868a49c8a784ef25b4436d6919732082f75f6eaaf0c75fe80792c40fff02dd981fdd7ae2e0dc9f66d35393a1bf718dca0d8e6fb820b66d7c8ca7100ab696959bdb21ea1d11b3d02962f1f68f6625d5d0bee04ba864ac71a41e6e9557fac27babf42b20a57a2bb88c8cd124ad19097899023241deb10ee4dca05d88e4dac80ae73e61f35fe402d9cb0320f6f9dcd49caf2a4111eee9e524c45d8a70d40522a15d65a58165d24945e4e3063cf0f25f95f9a7bc8b92b2982ee8bb190ec2ef6ab25e429f203e1528f4f71e28b6e44f2aa1713b0f218b9666d00cb1d223ce570ab2f8513fff3eb3e4f4df187143f2787db5c4afd2d99b146d4a4695a850190a99d1e0768b6c9f382bec9e21a2a6cc35c61bfb82ad9c5d7480026ffc934124e127844e4d7beb87a8deefeb70a9f1ac59b2e10d59720ccdeb09c6763b978d4cde7836643524a81d2362c0b471226e30041b2c455895e3d437399729eb28b211bc830194a2272a15e6ea1e4b41459b8f0ef0c9774926ac3b39d919c3ce99c7aa5e3b36cf473f3d115363925d78c77f8bdeb8f17a04a3ed2a4c420b06a01d7bf4648562601e6b43e390a758b97ec2632de2634446e9ab55d20741944ecc0ae52e47f0daf7b87e58e4aba960408ed88b9a300ce11ada2a4f079d3a72edc39d7de4014caffc28501038c5a1010045c89bff6976ec12feb9bdaafb939ce0bf5609d502eb7cc01730eb64a40aa650073fff328b7714598068465ba4e87edae6b1081ae433689b5f6747a26c4e38f9a31eb3b27963f5e0aac9d973bee4810dddc2c2bcbb8814cc4816cdabfb38cf47ec5f68d5b0f1b7e982e8fa344caaab06c1035f2a043fe7a2dfa26e9b59166f4b6d5891db94ed05f8e410d21aed46d225de15459a91dc98e944b4199d07c93fed17523b871bdc05345da6e76dc7b0d01f0498d236226454dcabfeb10ede1c7b7df896ace22a4a6621505a03b890025b6718041a6de06e0f48720a40dffdcfde111ff0b80e27c089ed39fa5d09e39086109e07bd56524ae42f7cdd7a331a76f5760eca874ac89debda4d3a3f0a2dea755e9ac69ca1220ac451b8801f9fe431888ff6fc56fc34a8e5247c92c3ae0cc2f3517905f2dead3dc566e8b0966b7499df8cf3ad95573585a4a39a80e2ee094c4afacbc6ed0abd2c6c5710aa088d58b3b3998f11b54b3a614cb49f21b1d209457f64e03c78736f92d23e74ef8822502938dcb967df84e0203b6a507bffd32b6b866beebe7d72f3193b5364df988af9cd2252cfdfc19f5d82d9f26b5181f496ce4f7b8494af09ff52404a5905b40ad08865514162c8d6414ea9ad729fc2f848753666a6bab869652bef18588a7ffa92be4dacacb383296eb9e5487f2e358aa907839caae79b06496e9fc11c770ba07d85fdfed81d838c1f43c4f8c36a07b685157da5938abefbc03afe0a45912ddfb17693e410fdf48f046651adfd1e5216d18880449aec1a9eed1f909d92c5777f476d037239f49032db9e58af8137c83395e777932a71919693e581dcf3bac9b88f0a5c90c367c64681a93f6b00de44f420f5a462ff88e6c836b73163e58a9655ecbfa586a4ef6f03ea83ec6296cb3b2d1adef42f9db172c3b858bb8ad1a81e6c216465397a9260e6e6f909e62d4e43576f7adaf015929c8d27624f2219290d8d3d66162bcafd7a600bb74bc323533a00b57b9f3664908cdd1638f1895fe12b2c1ea7b0a3bf38865d467b24d3292a955d3174d42bb1e24e14f5f7a33a0c88bb4d53e8f49afed67eb6e24e92fd7803d4d3615da4f297ba43b5f0742060e78468d5c30093764c307ce946366c5e645949bde20cedbbf83b6be4fd13bec3b84dee5fd6af99a03542fa425f76fcca97efdf6b0fdd8da179e75af27dcfbdc58cfb6ad2aa9b6d766da1bc6a248fbfcf1732c4f7930468e7576008e85145faf7eb106e3925a975ab6f46752b611bdbbe06b9389328d0111e9ca7ce1c41bffad5233d36bfb6ea6bf7dd2318b8496cfc561bc48627b86c5f3100679d1e1353401a8025db9c0b13145a11daedc6ee7416ee53cafb16c2bccb06584360e9f2ddf5b0b2ab859a39ee5848ae44257d0d419351f54fb4569795139f522cab896671de99a2c1b59f1a63c793fb83819ba7dffa0e8b8e7d420b9354793f9de07e092288fbf33c0eb56bd6bee655608094f49a2192f0aa7ca14af9673a20f499e205254eb4d8d443dc7c2fa99a7f7b54caaed25c2de1fdc897576a3c3487c04933a0ff380941a3905cf10dcc55cf0d736a3642b8812f84b1eff82840f1011cad8c95229a05503502766e36e879e55bef0d5ea2f3f8164d374fb1b5ee008779d5623b01b97e838e2880003c524b133cdaa9aa9a6f7c0ceb60dca73e8d86696ec9ac9ddb39e010e57d153204fd2298c6ae2eb742be50f8d529fc81bf8603d2f893147e2fd80c78ea10e7c668336fe5b7475b6def408c8bedd890693e1de60a1107ddd5b8dc74fa13bbd5bafcce8e21b31392726057fbd7e6191519e563ed368800a8fde7020327991baaa811bf2f76a9fdec2554f5ac4f3d3cc430fb0d2386e23d96cdf62371742bd69b590bad1662b741e05d39f877ef7e217551405b6b7cbd905ac2420c68a69d3b1c705bf53b1b06872b7243ecb00d1676f1aa95f0541002c363ee56a39005986a74e08b9e8d317df5e3b2f170fe5e99f2e4735bf2d0b54130ec110d76bc36049d1def5b56235381cc34d927dc416e52f9385d8ddddc326e2f5869586ffc7767be0b6804b4eb3825c8fe3c5d9a5122d5dd00199afc548291af0f64b24a9971570e5f96075ae54a5814043059ddeeb5a18d49c7e786d007a3d3891b58b463c9b2ad9f8ac535eb1912c9514ac21ee839703b64421a3dcef5ced126e5c28ad821a38224383e4f75b8145eff1d14c555ce22afde5773180762e783f0ca1b15a857d4d776a28933ab67ac6f3ae8614818c138726e207caaff431e30b8523bc39b39950d3bd918e456ef0e49383abc4097f723ef46afd4c534c90b74905dfb3fdfec1bcbd2c8698c55b490a7b80e0ff9a44a8249b57e47b5cf71db500b1901b649c292767f142ce6625c1a1befce7d3b68a9feabf4782b9fedf39cb57d2411311de4feafea4629e39ce9a5d8659b21d98f812957a633b905b607d5a26e20c652fa96254c4b46f214d1a071aefda268aa60e6a8a6c0058417e26f2fca4f05e9c8616cee218d761a229a0ce24d7e238ad4c15f2a8f44de085b9f49e2cf672c74b22fdda6857d793f3cc695a3ed9879941373bd4b9013d3be32126e5b38dd1ef5113e3fef0a66469ad30dceba42e1d00aa79196306530a4b07f3dcc7f8a34f3b4d6423c7d1e2d6afefadcb256a0b328ba279b8142ba27213cf61aeeefa7472f3ccf782102de87686ef44bdec6f7a9e543a78f1d28dffcddc58d0347f23775be21717dc0111da2c11b5e2876c3bbad35017995b7e417d7bf6f98631ffc64ee21dae5e205e51b1c407d56aae47ac827b110c13e345be05a70367df3afad19c6cc3eb1ef27fb9e3831c23647240dc9656f91c4a1949919cf9739d2ca22e15dc00b2914d07573b6862b5ba76b642b649376d22b26c456267f1b53e665083c3ab6d683774c391d35f75982f383c512e0fbb4c6c5d505aab69f086593bf6834a3524ac43d94dacb9b361b2ea38c7a825f7926fcd3d6efbd28c25dcd7aeab192335e4a947e615433cfe005eaab984095c0c50712ad0fb277e1503798cdf0ab838d9675b392494f0366f25560a2be3f3ddec45be4929d9ac0e135fa7076572352c7b1c4faec0f53e49f82860170e4bfa73d2fd7064a42a6328f4e1f6c0a9136b77c1de8f8aca33ac52fe0e093c677616924afaa7262ed15e52bcaf115a22fb6691b1622f0e0bd5a003ea8b3fc8c3294576517c6b5d30c6161a11c8ff781b8227408d26715eb87441b082dfc8dac3ed44ed11c4d3681cedf11783eb1bb49ab0819a898a4a7f0101574406c990ee0d00ae0a1c5d8a013086580b369a06f490b69677101c207c15c0a51e5fd911d374421172255cae535243d818ba0ba230102bc34d16552ef5e40b50", 0x1000}, {&(0x7f0000001600)="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", 0x1000}, {&(0x7f0000000200)="22883ab1ee0b3b9dca810c434491b3a91810addd2c6d752e", 0x18}, {&(0x7f00000003c0)="8ea312121a22c200936b1a248dd2b90a2792c8feb06de2db531874951922243cd6564a3d7715df6b8cc7323bbabda63e373705ce480f1c36c1e3a54cce745b604b98001720bdacf2bd448cee8e9136af06050f54c7d7019b74288b52e377df4a1fd800825a5466c1901422dc3a1deacc51c30b610672b896b21e40c980f8a754f71ae6fafdcc4e86d57cf2a5fe68564f83a84792ff01e49f2886c932b27a70178ab5d4746afa037254cddc12902d3a406f8a130f9226", 0xb6}], 0x6, &(0x7f0000002600)={0xe8, 0x107, 0x21c9, "2d3e11d5648cd78aa3a4942897e9786c5193e1c09c2e7b1b1fd044a2d3508582964461606355bdfa086cbf64bc5ff30a96f3ab0152b7047b262c321110b3d4808979b776228b4ea9120aa5ad1a8967410dc43932725d83e32594adedf55cc4c7a87f677e76a8d205861eed1f5662f6137eada66405bae36e71c1aafd1f5416cc89422541a2a15f3a454f186b1398cd9c8689550c2eb42fcc104eb2da40ab6bd88f0e9c81302991599e9fef2baf7009afc10a8b7676aaf6dc5f2cb12b9e569c7965fe3310778e2bc453fd5fbc8a778a074592e7223a"}, 0xe8, 0x4000}, {&(0x7f0000000500)={0x27, 0x0, 0x0, 0x4, 0x913f, 0x5, "79c21945c864fda57f555440f25bfc21f00b2603a53d5dd8641d40435d3159aaa06cd7587d51bb11737c1398fcf6cbd3ec4e14a3b1c8b74c2dfd2748860f95", 0x4}, 0x60, &(0x7f0000002ac0)=[{&(0x7f0000002700)="22882ddb694a1d7a62c2a39b8e0bf42ad18c7ba441d6170d02a1ce80df667b28430618cc7ed6702838e2fd5948fe57bcf04b0e5d12986e857f4d309cb29fa284657ab5053bb1c86d277a666e92b6d1e448f0d4f32a7e2dbb8f", 0x59}, {&(0x7f0000002780)="7030bc87e8d638e07ad8f0184db4e3271017494cb69574f539682685e81b4ed2bdb231689d1a9664b6fae765b9af26e1d95c460286249f9560d4ab3437fa03d67310c89d909cac758dbc4763e1078b9ae04b335a8a185f7f1bef51c96c4602c34d00d96504c0db3408dac98bfd5e161ce648d64ce746531607eb08f3512b12d9cb0a1ba899adb502f1326bd93d1c7a41dba52e8d08138180a760b90fa6231d8528408d5582c67e2023681a533778313e610196387275a5bb3c7101f3a7a1d479001be27fcd7520a33c2a4e835f96828f1d0ee29648134abaa0cf5bf3be7d435dbd9dbc51c45c0b721a728c791c72f831ef69a41e", 0xf4}, {&(0x7f0000002880)="c616ef8548f6a031dd911d057af75396820db3e56fc853d64b67ceb49fac7d8426d6d79db7c1cd1c619eb8e94fd2d483944c9b5e3a0496c2b3d778969fd95ec593830b10b3eefbd567837abc8048d53d0aa9f9a147bbc1500f05284095addf4f86b6382720f3f0a30ccb0add8cf82a078a2e8cf9018b77d17939f8f7b5c5317207d25f7742f0fc91269474739aa0e5a610a17f761038e3133414d664084e0a2a1c827c12d7f0af717391be51fd", 0xad}, {&(0x7f0000000580)="ee771c663d82554e4124705a82e0f3c4f8e23caee2b7351db194b54189946f9796c76375a730057a3996405e40b0", 0x2e}, {&(0x7f0000002940)="101382ccd51aa8f60b30a6de8c13e73609b4720cbb76ca715ae4e54360596b64fa47ba4a6fad66e39260c2c7a6d86d16103369e80b9a3cc0e88548d60673f8d75825c1e81097d4b6b2e3f7f7a6c54903fc47ffd59abe276460f675d99be031962cba21dd883433745379fcfb1a8e6401444b79382e556a671e545f05701dc96888d6b431e4d4b6c140c1b0286ce6bfc95fa65175d5d618b323155693226d2041f35512e11cda498f2b6a6094cf5b952801b9c431f217dd6a83da77fabf3f7b07", 0xc0}, {&(0x7f0000002a00)="ad0a3cba8745dd73f5a4fb80b8d9cae0f4de7c4a52bfc419dc152c2e4adec9e5d28484189c41fed65e43bb27cdd3abc7ab40cd5204f96a0229cfe8869f81cf56c7d242df4543b2e8f8ed652910f37bedc0e84f5c839b3abdaff20d948e97c2c41830d8fbf2b1e83a670adf7a8fcd149af2c2a1ecc8e52899353c4c94aa881226118adf143ddccb05164c27163402a6a8207e9326f1c495793f0bf080e9d2583abe53dd1ce4011d473935a6534c08b8333d5080", 0xb3}], 0x6, &(0x7f0000002b40)={0x90, 0x13, 0x8, "85bb201e8ff4615ca5f10c96a1fd5e1343f138b76c0d642867a6016cdd528f1678de8d2007c10a39f395ef1934126db32cc77f61e53f5ac0cffc4a240086946f6f5b4cbfb0857221d4f38136f101ead3e58289155c9c5112061db65dd6d7ca714a56fe519439b39c90b5c3f92c4aeeb8a7d2f4e6796d04a30e76f9271e"}, 0x90, 0x2c2c86e6395afd36}, {&(0x7f0000002c00)={0x27, 0x1, 0x1, 0x2, 0xbaa7a1a, 0x3, "0b6b1a5bced85ccb7cf75128e053807e27b22da4d4e25b0dfdb956170418aa7d3b0bb63e6ce8274884737e3b268932226a740652f226899e4465f5341d4f77", 0x2b}, 0x60, &(0x7f0000002dc0)=[{&(0x7f0000002c80)="a3ea", 0x2}, {&(0x7f0000002cc0)="839fbe3e80fbde65ad5ab39f0a15201a81cdfad6ca51def7fcdd5756145971d30187ec0722eff409dda1d2f8d26a5599ade1e6ff09993d2d26fe30174bac53e09a04bd24c857963465ae4a9b08962f9db64544cbdd9964d3fbb4b87943251c8c8160aede0893bde1dc4276bfa9fd36ac2bb22f747f275faab2e9b9e74b93e529bcf5cd83f726dec5b3f07be1d0853c77c0f067c3e38a7dde74d2a5ebcb656dbcd0909c603283d05c756dfa325abaac82b25ac94db78e6bdad590d084cb851b5c1e3a6aaed6829cab089327371f7ae44deb805081152a73642b64c48c98f6495b5d6634f81c677cdba335455cce97aa256de01a6614e781bd", 0xf8}], 0x2, &(0x7f0000002e00)={0x80, 0x112, 0x8, "870d30d9612db5c544d67f49211dd5fb8a15a56777d46c3d7e1e52fde586e446fde085e09ea5fdd5ea3a4b35687bc6f7f7a2d9c662176026d6ee4f56b6f51b1ca55ce646e65a3b8098b1cf30d832ac4aec1dd186fef91e23fc3b92b4c1859c9ed27c70804241313d346444"}, 0x80, 0x800}], 0x4, 0xc004) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='nl6,\x00'/15]) 04:58:26 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3lW\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:26 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2694.381646] hfsplus: unable to load nls mapping " [ 2694.381646] so8859-6" [ 2694.394885] hfsplus: unable to parse mount options 04:58:26 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r3, &(0x7f0000000180), 0x8) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000000)={0x8c, 0xdc5b, 0x2, "62d2af50622b6a0430bc8a1f973a72b485e0746da796f5a3e146bc9513b54939e5129125b969b18836af109d1e868882b2acdced34a05cb063145de3048c0e8e7283fa92af668510ce56b843bf0bdad3a44a21b36c2350ac037695f27d066ab79b1518d99fde236badb8bd133ae7caf5bccd74b7985bfdbb31e84926ef2a786404a85fbeade1fb86d6f683be"}) 04:58:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000108912, &(0x7f0000000040)="11dca5005efacee47b70708dc87e722461b83fff0ccaf31b4ee74341dcce21351222ab3fff0cee6ad10e340920588d8dd33d5b065790101b2b8e833e056f3e28f2c5f90f3c7a28c3353e1390b64d1c") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=0x0]) 04:58:27 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x140) ioctl(0xffffffffffffffff, 0x2000e981, &(0x7f0000000000)="11dca50d5e0bcfe47bf070ed4d39ebeb9e82bb03d720a4a8a94fe622b137c02dae7d0000000000000000423eb17113b553b4b9c15d6040e0b5c9d7") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)) 04:58:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xf8030000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:27 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff00000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2694.671393] hfsplus: unable to find HFS+ superblock [ 2694.676714] hfsplus: unable to find HFS+ superblock 04:58:27 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1f000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6bdb7e2e66617400fff80000000009000000", 0x16}], 0x404, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket(0x10, 0x800000000080002, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x68, r2, 0xa35eacb2f9f40add, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz1\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x28, r2, 0x2, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x4010) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) 04:58:27 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff00000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2694.968199] hfsplus: umask requires a value 04:58:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in=@local, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xfffffffffffffddd, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='nls=\nso8859-6,fscontext=root,fowner>', @ANYRESDEC=r2, @ANYBLOB="2c666f776e65723e346f875a07ab574df4cbe2e1f064caa85f556d322db2dfd88ec5cb02df7c23b1dca31368a6aaeb8f912841aa7686e7e9ced1bc69d76c0c3aceb2af8f43f067919e583043fd43bdbfd4060f657fa9ee08cdf48259a7", @ANYRESDEC=r3, @ANYBLOB=',smackfsfloor=-@:cgroup&ppp0vmnet0,\x00']) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x20401, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) [ 2694.988826] hfsplus: unable to parse mount options [ 2694.990392] FAT-fs (loop2): bogus number of reserved sectors [ 2695.000760] FAT-fs (loop2): Can't find a valid FAT filesystem 04:58:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='veth0_to_bond\x00', 0x10) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff02, 0x420ffe0, 0x0, 0xfffffffffffffd37) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r2, &(0x7f0000000180), 0x8) ioctl$NBD_CLEAR_QUE(r2, 0xab05) fchdir(r1) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$LOOP_CLR_FD(r6, 0x4c01) r7 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r3, r7, 0x0, 0x7fffffa7) 04:58:27 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3tW\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x808, 0x4) 04:58:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000140)) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r3 = accept(r1, 0x0, 0x0) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_SET_FPU(r4, 0x41a0ae8d, &(0x7f0000000600)={[], 0x6, 0x400, 0x7, 0x0, 0x7, 0xd000, 0x2}) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000000)=0x4, &(0x7f0000000040)=0x4) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x20000, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e24, 0x5, @local, 0x3}, 0x1c) 04:58:27 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xffff070000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2695.311561] FAT-fs (loop2): bogus number of reserved sectors [ 2695.348594] FAT-fs (loop2): Can't find a valid FAT filesystem 04:58:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='veth0_to_bond\x00', 0x10) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff02, 0x420ffe0, 0x0, 0xfffffffffffffd37) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r2, &(0x7f0000000180), 0x8) ioctl$NBD_CLEAR_QUE(r2, 0xab05) fchdir(r1) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$LOOP_CLR_FD(r6, 0x4c01) r7 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r3, r7, 0x0, 0x7fffffa7) 04:58:27 executing program 4: fcntl$notify(0xffffffffffffffff, 0x402, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) 04:58:27 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xffff1f0000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:27 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1, 0x60040) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") dup3(r0, r1, 0x80000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r3, r4, 0x0, 0x7fffffa7) [ 2695.611701] hfsplus: unable to load nls mapping " [ 2695.611701] so8859-6" [ 2695.619610] hfsplus: unable to parse mount options 04:58:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='veth0_to_bond\x00', 0x10) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff02, 0x420ffe0, 0x0, 0xfffffffffffffd37) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r2, &(0x7f0000000180), 0x8) ioctl$NBD_CLEAR_QUE(r2, 0xab05) fchdir(r1) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$LOOP_CLR_FD(r6, 0x4c01) r7 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r3, r7, 0x0, 0x7fffffa7) 04:58:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000040)={&(0x7f00009fd000/0x600000)=nil, 0x4, 0x7, 0x6, &(0x7f0000ff0000/0x1000)=nil, 0xe3}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fbcd1f00385dcbd67b1c1e6d43ccbcb242ef746b9d244a3de45012ac374460aaf155e4bc2c224bbfa9f31b68a4664501ab53ff079825d572b394392130d9eeeb7c69da2ec43e76b8ce95a8841c07847094f4ec950b3b02c455886516a470b48b9e0ea366514511dd47c6b992fc0fd1daded1bddf152888fce04ae58dd2a17bbc454f3af1d164b02ff70d9ae485a816f85047ed44520976eea999a105d2b1677dda0c4159324ee7f5102cc7eda75a088ec7a04b8ec8cfc086ad4d542b4c952cb1f3abbc2e8a2b095806961a7bc53b5f3405827c2ce4367c3a79699ada944b164c2104d5c3f0c8a61e1ffa30ab3859964539"], 0xcd, 0x1) sendfile(r1, r2, 0x0, 0x7fffffa7) 04:58:28 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3zW\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='nls=\nSo8859-6,\x00']) 04:58:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xffff1f00, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x40000) read$char_usb(r1, &(0x7f0000000240)=""/227, 0xe3) 04:58:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffa7) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x240002, 0x0) [ 2696.256056] hfsplus: unable to load nls mapping " [ 2696.256056] So8859-6" [ 2696.263949] hfsplus: unable to parse mount options 04:58:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abedeca3d839c72e6d029ae7bfca26467ade28cdbb87847f0000000100b6120800000064046b449fe4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a36c3ad93defbb582c91e2c446d38c31bb7c16250c95f344b3c1bc3285ea5f4520c38b1b4445b8a708cb0e250000004f9c0100000000b3cd00a04703d25600"], 0x1}}, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000000)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) 04:58:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000204010002000270fff8fcf5721d2cab5f9e92bbd07f08338b21d4fb65abf625b174d5d0788baf7beaa62ca6f6a1", 0x3a}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x10000, 0x2}) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xc800, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 04:58:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfc, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:29 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'\nmask', 0x3d, 0x8cffffff}}]}) [ 2696.703397] FAT-fs (loop2): count of clusters too big (16120830) [ 2696.705572] hfsplus: unable to parse mount options [ 2696.711425] FAT-fs (loop2): Can't find a valid FAT filesystem 04:58:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6c73bf3c8334531843ff187d7c273d0a736f383835392d362c009371f504b1d50bb0e340f799ff4fcf18fa2560c01e25d4dce586b8e92d34fce9967d88f87110afa4a0f68187444f3bba7cfa7224710d21ae11ce9f8ee019164a1fda41be81b3f3f21ca8aa817f62c2fa0907349fb35060fc8d07eca0f7070cca409b8a820fecaeef91e0a54263b54e330780a043f7e7686fb90a2847f7c26999cf0873fff1f9b305f006b8d88351ebee7a62d4ec7b9a9c2f729a3c499c258f03a431eb84f7aad0a809b131cc543c760e50211d91b57ac7b95c1b0a9a1462166294cf025164656acf91b7da2baccb"]) socketpair(0x3, 0x5, 0x80000000, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_int(r1, 0x29, 0x46, &(0x7f0000000180)=0x100000001, 0x4) [ 2696.841753] hfsplus: unable to parse mount options 04:58:29 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\xc0W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) getsockopt$inet_buf(r3, 0x0, 0x9, &(0x7f0000000040)=""/26, &(0x7f0000000080)=0x1a) r4 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x0, 0x0) ioctl$FIBMAP(r4, 0x1, &(0x7f00000001c0)=0xffffffff) 04:58:29 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'\"mask', 0x3d, 0x8cffffff}}]}) 04:58:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_S_OUTPUT(r2, 0xc004562f, &(0x7f0000000000)=0xfffffffffffffffd) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) [ 2697.047277] hfsplus: unable to parse mount options 04:58:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x40000) read$char_usb(r1, &(0x7f0000000240)=""/227, 0xe3) 04:58:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfd, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2697.128473] hfsplus: unable to parse mount options 04:58:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f0000000040)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x4, &(0x7f0000000000)=[{}, {}, {}, {}], &(0x7f0000000580)=""/4096}, &(0x7f0000000180)=0x78) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r1, r4, 0x0, 0x7fffffa7) 04:58:29 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'#mask', 0x3d, 0x8cffffff}}]}) [ 2697.192768] hfsplus: unable to load nls mapping " [ 2697.192768] so8859-6" [ 2697.209162] hfsplus: unable to parse mount options [ 2697.355305] hfsplus: unable to parse mount options 04:58:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:29 executing program 4: prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffe000/0x2000)=nil) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r1, &(0x7f0000000180), 0x8) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000080)={0x1, 0x7, 0x3, 0x3, 0x9}) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6873d8bc266d383835392d362c00997a84f0e754ab7744ffba0ec927b6a19040cf363bab7343d4fb532020d644edf2f799899bb84b98446c559bf7c1a4e9f9c7597f4e8905616a0b667cb8ef539ae83900"]) [ 2697.482577] hfsplus: unable to parse mount options 04:58:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f0000000040)='./file0\x00', r2, r3, 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000300)={0x101, 0x0, 0x400}) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r5, r6, 0x0, 0x7fffffa7) 04:58:30 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'%mask', 0x3d, 0x8cffffff}}]}) [ 2697.573274] hfsplus: unable to parse mount options [ 2697.827974] hfsplus: unable to parse mount options [ 2697.892186] hfsplus: unable to parse mount options 04:58:30 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H/\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000040)) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) 04:58:30 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'*mask', 0x3d, 0x8cffffff}}]}) 04:58:30 executing program 1 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) 04:58:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000001c0)=0x920, 0x4) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xffffffffffffffff, 0x7f, 0x7, 0x2, 0x4, 0x200}) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r4, &(0x7f0000000180), 0x8) mkdirat$cgroup(r4, &(0x7f0000000080)='syz0\x00', 0x1ff) [ 2698.138884] hfsplus: unable to load nls mapping " [ 2698.138884] so8859-6" [ 2698.152656] hfsplus: unable to parse mount options [ 2698.168183] hfsplus: unable to parse mount options 04:58:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f0000000340)=[{&(0x7f0000000140)="99080f9d0e45d418e72feaf151f14ff9d0bdbed8cde14fcf1db7b1e03906a2cee3324fad608e779c9a0ff8ddc636aebd55a6e6cdd7c9608565f54163da4126620ab9c9f291030baaece27397b97fadbe4845637371001183888ce876927cf2ad3853e27d9a008f9c68f1251f0cf2873bcd29ec6543384716d8057da8", 0x7c, 0x153}, {&(0x7f00000001c0)="59e94da7fb2d6d627ce7e1a463de1721584b035dc4398d18a31c7dfc4fd17a853084d9f172084006d3e3804e0d02514501644a4f569b1b090f23df99e7ead625eb83fcf9", 0x44, 0x1}, {&(0x7f0000000280)="8abe4dce9b1a20ee573d08311d4bbc8cfefbab7351264bccd324651ad47ce90744d53ad3058e68f6db16191acc4f36b23d136f95d7b5c7e9f50eb4051552ab5a7372d37ec65cdac15cf445b3860310a1b2e72ab8b36744a92a7a49eb47e4a23755cf1c00e58b5896d5fb45d49d566c46679dadc238f0c4a73b6d9438831e743f19990d03b8", 0x85, 0x80}], 0x0, &(0x7f0000000440)={[{@umask={'umask', 0x3d, 0x10000}}, {@decompose='decompose'}, {@type={'type', 0x3d, "5a5fea32"}}, {@part={'part', 0x3d, 0x1ff}}, {@uid={'uid', 0x3d, r1}}, {@part={'part', 0x3d, 0x2}}], [{@dont_measure='dont_measure'}, {@pcr={'pcr', 0x3d, 0x13}}, {@measure='measure'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@fowner_lt={'fowner<', 0xee01}}, {@dont_appraise='dont_appraise'}, {@context={'context', 0x3d, 'root'}}, {@appraise='appraise'}, {@pcr={'pcr', 0x3d, 0x1d}}]}) geteuid() syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x366, 0x0, 0x4000000, &(0x7f0000000880)={[], [{@smackfstransmute={'smackfstransmute', 0x3d, 'lo*bdev,'}}]}) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffc000/0x4000)=nil) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000580)='/dev/cachefiles\x00', 0x2000, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}, 0x20) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value={r5, 0x8}, &(0x7f0000000640)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000680)={r6, @in={{0x2, 0x4e24, @empty}}, [0x8001, 0xf8, 0x100000000, 0x0, 0x800, 0x1, 0x7, 0x6, 0x63, 0xffffffff, 0x0, 0x1000, 0x2b2ff4bd, 0x5, 0x5]}, &(0x7f0000000780)=0x100) [ 2698.350643] hfsplus: unable to parse mount options 04:58:30 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'+mask', 0x3d, 0x8cffffff}}]}) [ 2698.453516] hfsplus: unable to parse mount options 04:58:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nls={'nls', 0x3d, '\nso8859-6'}}], [{@appraise_type='a\x81\x00raise_type=imasig'}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@subj_type={'subj_type'}}]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r1, &(0x7f0000000180), 0x8) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r3, r4) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000600)=ANY=[@ANYBLOB="26f8ceac62d09b93c5954f45f3d2c71a94652c9acd0cb16a1b1acbb110204e035f1e38836cfb2f41439047c0919d7a0983ed321d31bb3f41de73f2336812ba301c78847cb64208ab5a0ac27bbbe725bfc62e4510df4f797c076ba52e06d83995244eb1f820e5a241e79846ebdbe765c0e28a1990f43442becf1973b1bd93989995e7dcf0799031ee43e7ba64ff3b6cae036aa3b100000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8}, 0x20) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f00000000c0)={r8}, &(0x7f0000000140)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000002c0)={0xff, 0x7, 0x1, "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"}) [ 2698.555095] hfsplus: unable to parse mount options 04:58:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80000, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r2, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x4e24, @multicast2}}) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r3, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r3, 0x1) recvfrom$inet6(r3, &(0x7f00000001c0)=""/226, 0x1cf, 0x0, 0x0, 0xfffffffffffffc8c) close(r3) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000180)='./file0\x00', 0x0, 0x28}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r4, &(0x7f0000000340)="7da8e1a726779ca74e", &(0x7f0000000380)=""/26}, 0x18) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000040)) r5 = socket$inet(0x2, 0x2, 0x1) sendfile(r5, r2, 0x0, 0x7fffffa4) 04:58:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2698.626169] hfsplus: unable to parse mount options 04:58:31 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={',mask', 0x3d, 0x8cffffff}}]}) [ 2698.795655] hfsplus: unable to load nls mapping " [ 2698.795655] so8859-6" [ 2698.825995] hfsplus: unable to parse mount options [ 2698.838668] hfsplus: unable to parse mount options [ 2698.907929] hfsplus: unable to parse mount options 04:58:31 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x04\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:31 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r0, &(0x7f0000000180), 0x8) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@nls={'nls', 0x3d, 'iso8859-15'}}]}) 04:58:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2699.039306] FAULT_INJECTION: forcing a failure. [ 2699.039306] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2699.051335] CPU: 1 PID: 4831 Comm: syz-executor.1 Not tainted 4.19.73 #0 [ 2699.058191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2699.067540] Call Trace: [ 2699.070128] dump_stack+0x172/0x1f0 [ 2699.070145] should_fail.cold+0xa/0x1b [ 2699.070161] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2699.070184] __alloc_pages_nodemask+0x1ee/0x750 [ 2699.087442] ? find_held_lock+0x35/0x130 [ 2699.091512] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2699.091531] ? lock_downgrade+0x810/0x810 [ 2699.091549] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2699.100695] alloc_pages_current+0x107/0x210 [ 2699.100714] __get_free_pages+0xc/0x40 [ 2699.100729] __tlb_remove_page_size+0x2e2/0x500 [ 2699.110650] unmap_page_range+0xeee/0x1e70 [ 2699.110684] ? vm_normal_page_pmd+0x400/0x400 [ 2699.110696] ? kasan_check_read+0x11/0x20 [ 2699.110716] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2699.119251] ? uprobe_munmap+0xad/0x2b0 [ 2699.119271] unmap_single_vma+0x19d/0x300 [ 2699.119288] unmap_vmas+0xae/0x180 [ 2699.119306] exit_mmap+0x2c2/0x530 [ 2699.119319] ? __ia32_sys_munmap+0x80/0x80 [ 2699.119345] ? __khugepaged_exit+0x2da/0x400 [ 2699.119358] ? rcu_read_lock_sched_held+0x110/0x130 [ 2699.119375] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2699.119386] ? __khugepaged_exit+0xcf/0x400 [ 2699.119402] mmput+0x15f/0x4c0 [ 2699.141740] do_exit+0x899/0x2fa0 [ 2699.141758] ? find_held_lock+0x35/0x130 [ 2699.149415] ? task_work_run+0x118/0x1c0 [ 2699.149429] ? get_signal+0x384/0x1fc0 [ 2699.149444] ? mm_update_next_owner+0x660/0x660 [ 2699.149465] ? _raw_spin_unlock_irq+0x28/0x90 [ 2699.159752] hfsplus: unable to find HFS+ superblock [ 2699.161594] ? get_signal+0x384/0x1fc0 [ 2699.161609] ? _raw_spin_unlock_irq+0x28/0x90 [ 2699.161635] do_group_exit+0x135/0x370 [ 2699.176487] get_signal+0x3ec/0x1fc0 [ 2699.176616] ? mousedev_cleanup+0x190/0x190 [ 2699.191256] do_signal+0x95/0x1960 [ 2699.191275] ? __inode_security_revalidate+0xda/0x120 [ 2699.191294] ? avc_policy_seqno+0xd/0x70 [ 2699.242343] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2699.247380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2699.252925] ? setup_sigcontext+0x7d0/0x7d0 [ 2699.257255] ? kick_process+0xef/0x180 [ 2699.261172] ? task_work_add+0x9c/0x110 [ 2699.265156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2699.270697] ? fput+0x128/0x1a0 [ 2699.273980] ? ksys_read+0x1f1/0x2d0 [ 2699.277699] ? exit_to_usermode_loop+0x43/0x2c0 [ 2699.282372] ? do_syscall_64+0x53d/0x620 [ 2699.286432] ? exit_to_usermode_loop+0x43/0x2c0 [ 2699.291105] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2699.295714] ? trace_hardirqs_on+0x67/0x220 [ 2699.300044] exit_to_usermode_loop+0x244/0x2c0 [ 2699.304639] do_syscall_64+0x53d/0x620 [ 2699.308535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2699.313725] RIP: 0033:0x4598e9 [ 2699.316925] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2699.335828] RSP: 002b:00007f13feac6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2699.343539] RAX: fffffffffffffe00 RBX: 00007f13feac6c90 RCX: 00000000004598e9 [ 2699.354977] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 2699.362261] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2699.369529] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f13feac76d4 [ 2699.376798] R13: 00000000004c6cff R14: 00000000004dc090 R15: 0000000000000005 04:58:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) 04:58:31 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'-mask', 0x3d, 0x8cffffff}}]}) 04:58:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x480000, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 04:58:31 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\a\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400502, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x4000, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000080)=0x92) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='nls=\n3o8859-6,\x00']) [ 2699.518361] hfsplus: unable to parse mount options 04:58:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2699.624795] hfsplus: unable to parse mount options [ 2699.663344] hfsplus: unable to load nls mapping " [ 2699.663344] 3o8859-6" 04:58:32 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'.mask', 0x3d, 0x8cffffff}}]}) [ 2699.683076] hfsplus: unable to parse mount options 04:58:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SIOCRSACCEPT(r1, 0x89e3) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r2, r3, 0x0, 0x7fffffa7) 04:58:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) getsockopt$nfc_llcp(r1, 0x118, 0x0, &(0x7f0000000040)=""/161, 0xa1) [ 2699.892266] hfsplus: unable to parse mount options [ 2699.950292] hfsplus: unable to parse mount options 04:58:32 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'0mask', 0x3d, 0x8cffffff}}]}) 04:58:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = syz_open_dev$radio(&(0x7f0000000700)='/dev/radio#\x00', 0x2, 0x2) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}, 0x20) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000007c0)={r6, 0x48, &(0x7f0000000740)=[@in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e24, 0x7, @ipv4={[], [], @loopback}, 0x8}, @in6={0xa, 0x4e21, 0x1f, @mcast1, 0x101}]}, &(0x7f0000000800)=0x10) [ 2700.058054] hfsplus: unable to load nls mapping " [ 2700.058054] so8859-6" [ 2700.084139] hfsplus: unable to parse mount options [ 2700.154440] hfsplus: unable to parse mount options [ 2700.269855] hfsplus: unable to parse mount options 04:58:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x223) 04:58:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r1, &(0x7f0000000180), 0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x90) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000180), r3, 0x8}}, 0x18) r4 = geteuid() syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@uid_lt={'uid<', r4}}, {@smackfsroot={'smackfsroot'}}, {@dont_appraise='dont_appraise'}]}) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xc0001, 0x0) bind$bt_l2cap(r5, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, {0x4, 0x2, 0x800, 0x0, 0x40, 0x1ca}, 0x800, 0x2}, 0xe) 04:58:32 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'Xmask', 0x3d, 0x8cffffff}}]}) 04:58:33 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10%\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$P9_RVERSION(r0, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0xc9c4, 0x6, '9P2000'}, 0x13) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) [ 2700.533680] hfsplus: unable to parse mount options [ 2700.534899] hfsplus: unable to parse mount options 04:58:33 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r0, 0x1) recvfrom$inet6(r0, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r0) ioctl(r0, 0x88, &(0x7f0000000040)="02000000000000007bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e6c733da23740d0b4590f3b941890e2b45f0e994a02cb29b5c9f20a00e6debadca924fdf6a539fa1293967d43e42a22011bed726ecd42a8c267338a46f1d4f151ce66eb64fd3e9c52fe348619cbf234d4e5e9f83e877fcc283d1e91e33ef865529a2b04328ebb4d82926dee5b3374ab88ae2e74a5ced12f1753e7f8bd2c92d4bcffb7df"]) [ 2700.673412] hfsplus: unable to parse mount options 04:58:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'cmask', 0x3d, 0x8cffffff}}]}) [ 2700.786411] hfsplus: unable to load nls mapping "¢7@дY;”â´_™JË)µÉò [ 2700.786411] " [ 2700.799122] hfsplus: unable to parse mount options 04:58:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e002, 0xaaaaaaaaaaaacd3, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0xca00, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000040)={0x0, 0x5, 0x3, 0x7, 0x2, [{0x79c9, 0xf2, 0x200, 0x0, 0x0, 0x1241}, {0x3f, 0x0, 0xdb, 0x0, 0x0, 0x800}]}) sendfile(r1, r2, 0x0, 0x7fffffa7) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)=""/167) [ 2700.865680] hfsplus: unable to parse mount options 04:58:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x6b6b6b00000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) [ 2700.925199] hfsplus: unable to parse mount options 04:58:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'dmask', 0x3d, 0x8cffffff}}]}) [ 2701.145841] hfsplus: unable to parse mount options [ 2701.175697] hfsplus: unable to load nls mapping " [ 2701.175697] so8859-6" [ 2701.189341] hfsplus: unable to parse mount options [ 2701.256842] hfsplus: unable to parse mount options 04:58:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x2302) 04:58:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:33 executing program 2: ioctl(0xffffffffffffffff, 0x140000000000, &(0x7f0000000580)="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") syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xd90f, 0x0, &(0x7f0000000140), 0x1000000, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x301000, 0x100) fchdir(r0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000180)={@hyper}) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x200, 0x5af97b9518cf32e0) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000040)={0x0, 0x7b2, 0x3, &(0x7f0000000000)=0x7}) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000080)) sendfile(r2, r3, 0x0, 0x7fffffa7) 04:58:34 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@c\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:34 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'imask', 0x3d, 0x8cffffff}}]}) 04:58:34 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0xa0100, 0x0) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000040)="287ffd94af70d8b2b551b59f9a68ecc557ce4b1aaa85382226eab03d629864d5b26f2496e9a258cc83a45ee9c450848a56a112c6e9808c548a59f61249a4f2237418f8e1d0a1c7d04c0eb40473c4d3d7892bcebb915f", 0x56) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='nls=\nSo8859-6,\x00']) [ 2701.561028] FAT-fs (loop2): bogus number of reserved sectors [ 2701.582496] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2701.599726] hfsplus: unable to load nls mapping " [ 2701.599726] So8859-6" [ 2701.611731] hfsplus: unable to parse mount options [ 2701.620126] hfsplus: unable to parse mount options 04:58:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:34 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2701.761806] hfsplus: unable to parse mount options 04:58:34 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'lmask', 0x3d, 0x8cffffff}}]}) 04:58:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget(0x3, 0x12) msgrcv(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600d6ce7817e1571db1a714432b2b4686cb6803dbc53c2090b306fbee3eccdda78d58c15226d4d99f7d5e04f6d18f2acdc98dcba061e3c58bab8a1b4a2ff8044c4a13486770d98cd225002fcafe8abad30de8e5dac4c485735d5bc3027f23437801044239bcfdfb48309d598de656"], 0x83, 0x0, 0x800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) accept(r2, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000200)={@initdev, @local, 0x0}, &(0x7f00000002c0)=0xc) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000300)={@empty, r4}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x7c5cf1c8c1f6325c) r6 = syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x8840) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)=0x410050) read$eventfd(r5, &(0x7f0000000180), 0x8) ioctl$VIDIOC_EXPBUF(r5, 0xc0405610, &(0x7f00000000c0)={0x1, 0x0, 0x4, 0x800}) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) [ 2701.922260] FAULT_INJECTION: forcing a failure. [ 2701.922260] name failslab, interval 1, probability 0, space 0, times 0 [ 2701.950407] CPU: 1 PID: 7829 Comm: syz-executor.2 Not tainted 4.19.73 #0 [ 2701.957281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2701.957287] Call Trace: [ 2701.957309] dump_stack+0x172/0x1f0 [ 2701.957331] should_fail.cold+0xa/0x1b [ 2701.957347] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2701.957365] ? lock_downgrade+0x810/0x810 [ 2701.969323] __should_failslab+0x121/0x190 [ 2701.969343] should_failslab+0x9/0x14 [ 2701.969358] kmem_cache_alloc_trace+0x2cc/0x760 [ 2701.969372] ? lock_acquire+0x16f/0x3f0 [ 2701.969484] ? vb2_fop_read+0xf0/0x410 [ 2701.969505] __vb2_init_fileio+0x1cb/0xbe0 [ 2702.010991] ? find_held_lock+0x35/0x130 [ 2702.015072] __vb2_perform_fileio+0xc9a/0x1170 [ 2702.019663] ? mutex_trylock+0x1e0/0x1e0 [ 2702.024784] ? vb2_core_poll+0x780/0x780 [ 2702.028881] ? fsnotify_first_mark+0x210/0x210 [ 2702.033481] vb2_read+0x3b/0x50 [ 2702.036774] vb2_fop_read+0x212/0x410 [ 2702.040589] ? vb2_fop_write+0x410/0x410 [ 2702.044722] v4l2_read+0x1cc/0x230 [ 2702.048280] do_iter_read+0x490/0x640 [ 2702.052087] ? dup_iter+0x270/0x270 [ 2702.055728] vfs_readv+0xf0/0x160 [ 2702.059190] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2702.064564] ? kasan_check_read+0x11/0x20 [ 2702.068726] ? __fget+0x367/0x540 [ 2702.072191] ? iterate_fd+0x360/0x360 [ 2702.076000] ? wait_for_completion+0x440/0x440 [ 2702.080595] ? __fget_light+0x1a9/0x230 [ 2702.084583] do_preadv+0x1c4/0x280 [ 2702.088132] ? do_readv+0x370/0x370 [ 2702.091765] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2702.096527] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2702.101291] ? do_syscall_64+0x26/0x620 [ 2702.105272] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2702.110639] ? do_syscall_64+0x26/0x620 [ 2702.114626] __x64_sys_preadv+0x9a/0xf0 [ 2702.118609] do_syscall_64+0xfd/0x620 [ 2702.122423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2702.127613] RIP: 0033:0x4598e9 [ 2702.130810] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2702.149716] RSP: 002b:00007feefa23ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2702.157431] RAX: ffffffffffffffda RBX: 00007feefa23ac90 RCX: 00000000004598e9 [ 2702.164709] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 04:58:34 executing program 2 (fault-call:1 fault-nth:1): r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2702.171981] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2702.179255] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feefa23b6d4 [ 2702.186528] R13: 00000000004c6bd1 R14: 00000000004dbe08 R15: 0000000000000004 04:58:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x800, 0x84402) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@rand_addr="42d994c6e10d32db22e34c3045323718", @in6=@mcast2, 0x4e23, 0x8, 0x4e23, 0x3, 0xa, 0x20, 0xc4a98f701e28bba0, 0x5e, r6, r8}, {0x9, 0x5, 0x5, 0xffff, 0x8000, 0x6, 0x6, 0x1ff}, {0x91e, 0x4, 0x7, 0x6}, 0xfff, 0x0, 0x1, 0x0, 0x335c7c8590dec653, 0x4}, {{@in=@multicast2, 0x4d4, 0x33}, 0xa, @in=@broadcast, 0x0, 0x3, 0x0, 0x81, 0x8, 0x2}}, 0xe8) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7a, r6}) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) [ 2702.238149] hfsplus: unable to parse mount options [ 2702.303457] hfsplus: unable to parse mount options [ 2702.311866] FAULT_INJECTION: forcing a failure. [ 2702.311866] name failslab, interval 1, probability 0, space 0, times 0 [ 2702.357859] CPU: 0 PID: 7985 Comm: syz-executor.2 Not tainted 4.19.73 #0 [ 2702.364741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2702.374096] Call Trace: [ 2702.376693] dump_stack+0x172/0x1f0 [ 2702.380344] should_fail.cold+0xa/0x1b [ 2702.384249] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2702.389371] ? lock_downgrade+0x810/0x810 [ 2702.393544] __should_failslab+0x121/0x190 [ 2702.397790] should_failslab+0x9/0x14 [ 2702.401603] __kmalloc+0x2e2/0x750 [ 2702.405153] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2702.410532] ? mark_held_locks+0x100/0x100 [ 2702.414784] ? __vb2_queue_alloc+0xf2/0xe90 [ 2702.419184] ? vivid_g_fmt_vid_cap+0xfa0/0xfa0 [ 2702.423778] __vb2_queue_alloc+0xf2/0xe90 [ 2702.427954] ? vivid_g_fmt_vid_cap+0xfa0/0xfa0 [ 2702.432556] vb2_core_reqbufs+0x449/0xd70 [ 2702.436725] ? vb2_core_create_bufs+0x830/0x830 [ 2702.441402] ? rcu_read_lock_sched_held+0x110/0x130 [ 2702.446425] ? lock_acquire+0x16f/0x3f0 [ 2702.450410] ? vb2_fop_read+0xf0/0x410 [ 2702.454311] __vb2_init_fileio+0x33f/0xbe0 [ 2702.458553] ? find_held_lock+0x35/0x130 [ 2702.462657] __vb2_perform_fileio+0xc9a/0x1170 [ 2702.467267] ? mutex_trylock+0x1e0/0x1e0 [ 2702.471347] ? vb2_core_poll+0x780/0x780 [ 2702.475425] ? fsnotify_first_mark+0x210/0x210 [ 2702.480017] vb2_read+0x3b/0x50 [ 2702.483311] vb2_fop_read+0x212/0x410 [ 2702.487125] ? vb2_fop_write+0x410/0x410 [ 2702.491187] v4l2_read+0x1cc/0x230 [ 2702.494735] do_iter_read+0x490/0x640 [ 2702.498537] ? dup_iter+0x270/0x270 [ 2702.502180] vfs_readv+0xf0/0x160 [ 2702.505639] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2702.511007] ? kasan_check_read+0x11/0x20 [ 2702.515165] ? __fget+0x367/0x540 [ 2702.518627] ? iterate_fd+0x360/0x360 [ 2702.522463] ? wait_for_completion+0x440/0x440 [ 2702.527057] ? __fget_light+0x1a9/0x230 [ 2702.531039] do_preadv+0x1c4/0x280 [ 2702.534586] ? do_readv+0x370/0x370 [ 2702.538219] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2702.542981] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2702.547739] ? do_syscall_64+0x26/0x620 [ 2702.551730] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2702.557101] ? do_syscall_64+0x26/0x620 [ 2702.561091] __x64_sys_preadv+0x9a/0xf0 [ 2702.565073] do_syscall_64+0xfd/0x620 [ 2702.568885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2702.574076] RIP: 0033:0x4598e9 [ 2702.577273] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2702.596175] RSP: 002b:00007feefa23ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2702.603891] RAX: ffffffffffffffda RBX: 00007feefa23ac90 RCX: 00000000004598e9 [ 2702.611160] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 2702.618428] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2702.625706] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feefa23b6d4 [ 2702.632986] R13: 00000000004c6bd1 R14: 00000000004dbe08 R15: 0000000000000004 04:58:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x23020000) 04:58:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000300)) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0xfffffeac, 0x0, 0x8, &(0x7f0000000380)={[], [{@subj_role={'subj_role'}}, {@smackfsroot={'\x00\x00\x00\x00\x00\xb5\x00', 0x3d, 'securityposix_acl_access[md5sumvboxnet0'}}, {@smackfsdef={'smackfsdef', 0x3d, 'hfsplus\x00'}}]}) 04:58:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'omask', 0x3d, 0x8cffffff}}]}) 04:58:35 executing program 2 (fault-call:1 fault-nth:2): r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:58:35 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaa.\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x1bc9a3d3970a6357) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000040)={0x7, 0x526b, 0x80000001, 0xd46}, 0x6) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) setsockopt$inet_tcp_int(r3, 0x6, 0x24, &(0x7f0000000080)=0x80000001, 0x4) [ 2702.886048] FAULT_INJECTION: forcing a failure. [ 2702.886048] name failslab, interval 1, probability 0, space 0, times 0 [ 2702.891303] hfsplus: unable to parse mount options [ 2702.920313] CPU: 0 PID: 8259 Comm: syz-executor.2 Not tainted 4.19.73 #0 [ 2702.927202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2702.936572] Call Trace: [ 2702.939187] dump_stack+0x172/0x1f0 [ 2702.942838] should_fail.cold+0xa/0x1b [ 2702.946747] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2702.951864] ? lock_downgrade+0x810/0x810 [ 2702.956034] __should_failslab+0x121/0x190 [ 2702.960280] should_failslab+0x9/0x14 [ 2702.964093] kmem_cache_alloc_trace+0x2cc/0x760 [ 2702.968770] ? rcu_read_lock_sched_held+0x110/0x130 [ 2702.973809] ? __kmalloc+0x5e1/0x750 [ 2702.977532] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2702.982921] ? vb2_vmalloc_attach_dmabuf+0x160/0x160 [ 2702.988044] vb2_vmalloc_alloc+0x71/0x290 [ 2702.992232] __vb2_queue_alloc+0x485/0xe90 [ 2702.996495] ? vivid_g_fmt_vid_cap+0xfa0/0xfa0 [ 2703.001177] vb2_core_reqbufs+0x449/0xd70 [ 2703.005347] ? vb2_core_create_bufs+0x830/0x830 [ 2703.010029] ? rcu_read_lock_sched_held+0x110/0x130 [ 2703.015058] ? lock_acquire+0x16f/0x3f0 [ 2703.019047] ? vb2_fop_read+0xf0/0x410 [ 2703.022951] __vb2_init_fileio+0x33f/0xbe0 [ 2703.027203] ? find_held_lock+0x35/0x130 [ 2703.031277] __vb2_perform_fileio+0xc9a/0x1170 [ 2703.035889] ? mutex_trylock+0x1e0/0x1e0 [ 2703.039963] ? vb2_core_poll+0x780/0x780 [ 2703.044034] ? fsnotify_first_mark+0x210/0x210 [ 2703.048636] vb2_read+0x3b/0x50 [ 2703.051931] vb2_fop_read+0x212/0x410 [ 2703.055746] ? vb2_fop_write+0x410/0x410 [ 2703.059817] v4l2_read+0x1cc/0x230 [ 2703.063370] do_iter_read+0x490/0x640 [ 2703.067181] ? dup_iter+0x270/0x270 [ 2703.070823] vfs_readv+0xf0/0x160 [ 2703.074288] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2703.079660] ? kasan_check_read+0x11/0x20 [ 2703.083821] ? __fget+0x367/0x540 [ 2703.087289] ? iterate_fd+0x360/0x360 [ 2703.091104] ? wait_for_completion+0x440/0x440 [ 2703.095699] ? __fget_light+0x1a9/0x230 [ 2703.099685] do_preadv+0x1c4/0x280 [ 2703.103237] ? do_readv+0x370/0x370 [ 2703.106876] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2703.111639] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2703.116400] ? do_syscall_64+0x26/0x620 [ 2703.120380] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2703.125751] ? do_syscall_64+0x26/0x620 [ 2703.129740] __x64_sys_preadv+0x9a/0xf0 [ 2703.133725] do_syscall_64+0xfd/0x620 [ 2703.137547] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2703.142739] RIP: 0033:0x4598e9 [ 2703.145934] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2703.164842] RSP: 002b:00007feefa23ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2703.172562] RAX: ffffffffffffffda RBX: 00007feefa23ac90 RCX: 00000000004598e9 [ 2703.179833] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 2703.187106] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2703.194388] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feefa23b6d4 [ 2703.201659] R13: 00000000004c6bd1 R14: 00000000004dbe08 R15: 0000000000000004 04:58:35 executing program 2 (fault-call:1 fault-nth:3): r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2703.248040] hfsplus: unable to parse mount options 04:58:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'pmask', 0x3d, 0x8cffffff}}]}) [ 2703.345640] hfsplus: unable to parse mount options 04:58:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2703.391462] FAULT_INJECTION: forcing a failure. [ 2703.391462] name failslab, interval 1, probability 0, space 0, times 0 [ 2703.419414] CPU: 0 PID: 8394 Comm: syz-executor.2 Not tainted 4.19.73 #0 [ 2703.426292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2703.426298] Call Trace: [ 2703.426322] dump_stack+0x172/0x1f0 [ 2703.426344] should_fail.cold+0xa/0x1b [ 2703.426363] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2703.441922] ? lock_downgrade+0x810/0x810 [ 2703.441947] __should_failslab+0x121/0x190 [ 2703.441965] should_failslab+0x9/0x14 [ 2703.441980] kmem_cache_alloc_node_trace+0x274/0x720 [ 2703.442001] ? __lock_is_held+0xb6/0x140 [ 2703.442020] __get_vm_area_node+0x12b/0x3a0 [ 2703.442039] __vmalloc_node_range+0xc7/0x790 [ 2703.442054] ? vb2_vmalloc_alloc+0xdb/0x290 [ 2703.442070] ? rcu_read_lock_sched_held+0x110/0x130 [ 2703.442085] ? vb2_vmalloc_alloc+0xdb/0x290 [ 2703.494760] ? vb2_vmalloc_attach_dmabuf+0x160/0x160 [ 2703.499872] vmalloc_user+0x71/0x160 [ 2703.503591] ? vb2_vmalloc_alloc+0xdb/0x290 [ 2703.507916] vb2_vmalloc_alloc+0xdb/0x290 [ 2703.512079] __vb2_queue_alloc+0x485/0xe90 [ 2703.516335] ? vivid_g_fmt_vid_cap+0xfa0/0xfa0 [ 2703.520926] vb2_core_reqbufs+0x449/0xd70 [ 2703.525089] ? vb2_core_create_bufs+0x830/0x830 [ 2703.529767] ? rcu_read_lock_sched_held+0x110/0x130 [ 2703.534789] ? lock_acquire+0x16f/0x3f0 [ 2703.538770] ? vb2_fop_read+0xf0/0x410 [ 2703.542674] __vb2_init_fileio+0x33f/0xbe0 [ 2703.546921] ? find_held_lock+0x35/0x130 [ 2703.550999] __vb2_perform_fileio+0xc9a/0x1170 [ 2703.555585] ? mutex_trylock+0x1e0/0x1e0 [ 2703.559662] ? vb2_core_poll+0x780/0x780 [ 2703.563737] ? fsnotify_first_mark+0x210/0x210 [ 2703.568327] vb2_read+0x3b/0x50 [ 2703.571628] vb2_fop_read+0x212/0x410 [ 2703.575445] ? vb2_fop_write+0x410/0x410 [ 2703.579511] v4l2_read+0x1cc/0x230 [ 2703.583072] do_iter_read+0x490/0x640 [ 2703.586880] ? dup_iter+0x270/0x270 [ 2703.590531] vfs_readv+0xf0/0x160 [ 2703.593995] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2703.599369] ? kasan_check_read+0x11/0x20 [ 2703.603538] ? __fget+0x367/0x540 [ 2703.607006] ? iterate_fd+0x360/0x360 [ 2703.610815] ? wait_for_completion+0x440/0x440 [ 2703.615413] ? __fget_light+0x1a9/0x230 [ 2703.619402] do_preadv+0x1c4/0x280 [ 2703.623111] ? do_readv+0x370/0x370 [ 2703.626750] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2703.631519] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2703.636280] ? do_syscall_64+0x26/0x620 [ 2703.640263] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2703.645639] ? do_syscall_64+0x26/0x620 [ 2703.649632] __x64_sys_preadv+0x9a/0xf0 [ 2703.653630] do_syscall_64+0xfd/0x620 [ 2703.657449] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2703.662642] RIP: 0033:0x4598e9 [ 2703.665840] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2703.684753] RSP: 002b:00007feefa23ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2703.692479] RAX: ffffffffffffffda RBX: 00007feefa23ac90 RCX: 00000000004598e9 [ 2703.699760] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 2703.707044] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2703.714321] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feefa23b6d4 [ 2703.721599] R13: 00000000004c6bd1 R14: 00000000004dbe08 R15: 0000000000000004 04:58:36 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaa/\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getpeername$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0x8004510a, &(0x7f0000000180)={{}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="6e6c733d34ba8bd30e0ab5583281d5"]) setitimer(0x2, &(0x7f0000000000)={{0x77359400}, {0x0, 0x2710}}, 0x0) [ 2703.756415] syz-executor.2: vmalloc: allocation failure: 462848 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 2703.757878] hfsplus: unable to parse mount options [ 2703.787789] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 2703.830053] CPU: 0 PID: 8394 Comm: syz-executor.2 Not tainted 4.19.73 #0 [ 2703.836934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2703.846299] Call Trace: [ 2703.848901] dump_stack+0x172/0x1f0 [ 2703.852543] warn_alloc.cold+0x7b/0x173 [ 2703.856523] ? zone_watermark_ok_safe+0x260/0x260 [ 2703.861370] ? __get_vm_area_node+0x12b/0x3a0 [ 2703.865873] ? rcu_read_lock_sched_held+0x110/0x130 [ 2703.870901] ? __lock_is_held+0xb6/0x140 [ 2703.874987] ? __get_vm_area_node+0x2df/0x3a0 [ 2703.879497] __vmalloc_node_range+0x486/0x790 [ 2703.884000] ? rcu_read_lock_sched_held+0x110/0x130 [ 2703.889026] ? vb2_vmalloc_alloc+0xdb/0x290 [ 2703.893356] ? vb2_vmalloc_attach_dmabuf+0x160/0x160 [ 2703.898465] vmalloc_user+0x71/0x160 [ 2703.902184] ? vb2_vmalloc_alloc+0xdb/0x290 [ 2703.906512] vb2_vmalloc_alloc+0xdb/0x290 [ 2703.910678] __vb2_queue_alloc+0x485/0xe90 [ 2703.914932] ? vivid_g_fmt_vid_cap+0xfa0/0xfa0 [ 2703.919519] vb2_core_reqbufs+0x449/0xd70 [ 2703.923680] ? vb2_core_create_bufs+0x830/0x830 [ 2703.928360] ? rcu_read_lock_sched_held+0x110/0x130 [ 2703.933386] ? lock_acquire+0x16f/0x3f0 [ 2703.937367] ? vb2_fop_read+0xf0/0x410 [ 2703.941273] __vb2_init_fileio+0x33f/0xbe0 [ 2703.945517] ? find_held_lock+0x35/0x130 [ 2703.949593] __vb2_perform_fileio+0xc9a/0x1170 [ 2703.954179] ? mutex_trylock+0x1e0/0x1e0 [ 2703.958254] ? vb2_core_poll+0x780/0x780 [ 2703.962327] ? fsnotify_first_mark+0x210/0x210 [ 2703.966917] vb2_read+0x3b/0x50 [ 2703.970207] vb2_fop_read+0x212/0x410 [ 2703.974023] ? vb2_fop_write+0x410/0x410 [ 2703.978088] v4l2_read+0x1cc/0x230 [ 2703.981645] do_iter_read+0x490/0x640 [ 2703.985454] ? dup_iter+0x270/0x270 [ 2703.989111] vfs_readv+0xf0/0x160 [ 2703.992571] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2703.997941] ? kasan_check_read+0x11/0x20 [ 2704.002101] ? __fget+0x367/0x540 [ 2704.005564] ? iterate_fd+0x360/0x360 [ 2704.009377] ? wait_for_completion+0x440/0x440 [ 2704.013973] ? __fget_light+0x1a9/0x230 [ 2704.017960] do_preadv+0x1c4/0x280 [ 2704.021515] ? do_readv+0x370/0x370 [ 2704.029144] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2704.033908] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2704.038669] ? do_syscall_64+0x26/0x620 [ 2704.042653] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2704.048023] ? do_syscall_64+0x26/0x620 [ 2704.052009] __x64_sys_preadv+0x9a/0xf0 [ 2704.055993] do_syscall_64+0xfd/0x620 [ 2704.059804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2704.064993] RIP: 0033:0x4598e9 04:58:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x7ffffffff000) [ 2704.068194] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2704.087097] RSP: 002b:00007feefa23ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2704.094820] RAX: ffffffffffffffda RBX: 00007feefa23ac90 RCX: 00000000004598e9 [ 2704.102093] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 2704.109453] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2704.116722] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feefa23b6d4 [ 2704.123993] R13: 00000000004c6bd1 R14: 00000000004dbe08 R15: 0000000000000004 [ 2704.133234] Mem-Info: [ 2704.136628] active_anon:121862 inactive_anon:192 isolated_anon:0 [ 2704.136628] active_file:6291 inactive_file:12775 isolated_file:13 [ 2704.136628] unevictable:0 dirty:125 writeback:0 unstable:0 [ 2704.136628] slab_reclaimable:21530 slab_unreclaimable:429543 [ 2704.136628] mapped:59637 shmem:245 pagetables:5270 bounce:0 [ 2704.136628] free:926594 free_pcp:1428 free_cma:0 [ 2704.171653] Node 0 active_anon:463472kB inactive_anon:768kB active_file:24784kB inactive_file:28992kB unevictable:0kB isolated(anon):0kB isolated(file):52kB mapped:238548kB dirty:488kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 04:58:36 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'smask', 0x3d, 0x8cffffff}}]}) [ 2704.227442] Node 1 active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:12kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2704.293353] Node 0 DMA free:10500kB min:220kB low:272kB high:324kB active_anon:2052kB inactive_anon:0kB active_file:0kB inactive_file:20kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2704.378783] lowmem_reserve[]: 0 2555 2557 2557 [ 2704.397680] Node 0 DMA32 free:47896kB min:36248kB low:45308kB high:54368kB active_anon:461720kB inactive_anon:768kB active_file:24388kB inactive_file:28972kB unevictable:0kB writepending:488kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10368kB pagetables:16340kB bounce:0kB free_pcp:2684kB local_pcp:1340kB free_cma:0kB 04:58:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2704.411213] hfsplus: unable to parse mount options 04:58:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="6e6c733d12edb8227f1b00"]) [ 2704.503276] lowmem_reserve[]: 0 0 2 2 [ 2704.518657] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2704.549018] hfsplus: unable to parse mount options [ 2704.589353] lowmem_reserve[]: 0 0 0 0 [ 2704.599881] Node 1 Normal free:3648024kB min:53608kB low:67008kB high:80408kB active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB writepending:4kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2496kB pagetables:4884kB bounce:0kB free_pcp:2828kB local_pcp:1412kB free_cma:0kB [ 2704.633180] lowmem_reserve[]: 0 0 0 0 04:58:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'xmask', 0x3d, 0x8cffffff}}]}) [ 2704.638114] Node 0 DMA: 15*4kB (UME) 48*8kB (UME) 57*16kB (UME) 28*32kB (UM) 5*64kB (UM) 4*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 10508kB [ 2704.660763] Node 0 DMA32: 4700*4kB (UMEH) 582*8kB (UMEH) 68*16kB (UMEH) 290*32kB (UMH) 185*64kB (UME) 32*128kB (UM) 2*256kB (M) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 50272kB [ 2704.681100] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2704.708133] Node 1 Normal: 384*4kB (UME) 3233*8kB (UME) 2559*16kB (UME) 1205*32kB (UME) 516*64kB (UME) 163*128kB (UME) 32*256kB (UME) 15*512kB (UM) 10*1024kB (UM) 2*2048kB (UE) 844*4096kB (UM) = 3648024kB [ 2704.768152] hfsplus: unable to load nls mapping "í¸"" [ 2704.774322] hfsplus: unable to parse mount options [ 2704.786809] hfsplus: unable to parse mount options [ 2704.794973] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2704.806307] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2704.817942] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2704.831632] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2704.847442] 18743 total pagecache pages [ 2704.861375] 0 pages in swap cache [ 2704.876870] Swap cache stats: add 0, delete 0, find 0/0 [ 2704.896313] Free swap = 0kB [ 2704.915693] hfsplus: unable to parse mount options [ 2704.917047] Total swap = 0kB 04:58:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) accept(r1, 0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0xb1, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r1]) [ 2704.955378] 1965979 pages RAM [ 2704.974420] 0 pages HighMem/MovableOnly [ 2704.985186] 338856 pages reserved [ 2704.999342] 0 pages cma reserved 04:58:37 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:58:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'u\nask', 0x3d, 0x8cffffff}}]}) [ 2705.088196] hfsplus: unable to parse mount options 04:58:37 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde/\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2705.167927] hfsplus: unable to parse mount options 04:58:37 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x70800}], 0x1, 0x0) 04:58:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'u\"ask', 0x3d, 0x8cffffff}}]}) 04:58:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0xf0ffffff7f0000) 04:58:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r3 = getpid() r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r7, r8) r9 = fcntl$getown(r0, 0x9) r10 = getuid() r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r12, r13) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r14, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r14, 0x0) accept(r14, 0x0, 0x0) r15 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r15, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r16 = accept4(r15, &(0x7f0000000c40)=@ax25={{0x3, @null}, [@rose, @netrom, @rose, @null, @remote, @bcast, @default, @netrom]}, &(0x7f0000000cc0)=0x80, 0xc00) r17 = gettid() r18 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r18, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r18, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r18, 0x1) recvfrom$inet6(r18, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r18) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) r20 = socket$isdn(0x22, 0x3, 0x24) r21 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r21, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") sendmmsg$unix(r2, &(0x7f0000000fc0)=[{&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000140)="aa8c1d0768fa706c99cd049299b39ae8718cf4d92c75a9d3a38cc5e1d25e7b98d4274c5393ca8ad323e94c1c9d1ca7f19bc6778b4c75ceeca104be33919bc625f541e8836e4011f59ecac1c57bb2167633adbe98c89687693ed3a4ac0ceebabe7360d0d3bb8300674971a067b7db13f81df8c9a3a3ca16af26fa1de02b656b2be2424a80bbbd4e6f856847d02116", 0x8e}, {&(0x7f0000000080)="6b74a927f55591500051e56fd3235f026322823590928297c32d253b7a3d3b659bbdbb011df41782c1d39a5febbb5bb7edb19f31bd448461388e9b33a820a718fa6c6177db60", 0x46}, {&(0x7f00000002c0)="da01b548e4bfe54bd12391d41e14753274eee12148e9da2991af9c0949f5fb40a318c91cb63d95b4bdd5df7b4fc93111d5441e8127fe08ef5ef9482772690b62a1321b5fd10abd300de3fab915fad5f301bfea17398f86285cbb7d48b99b14972277f7b96e6d038b111ea7e6c69f1f67eaa3d0e1bebb7438aa4cfe941d891d9e8feaf3d7e15cf68df324677092def465850625f1013cef99812a5d", 0x9b}], 0x3, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r3, r5, r8}}}, @cred={{0x1c, 0x1, 0x2, {r9, r10, r13}}}], 0x40, 0x80}, {&(0x7f00000003c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000440)="cc33954c073f75d5152d80de09b852e08b2a7cd38248d6cb484fc1eb633f54a477896e843de04c974d90824d2731eed6e7c6784d728feb7ff7b51ed14d4bba115f982e9659677d09c34b65b8db0a6e60f0a4bc33610bba4969e42d642a82ede2f4884798d881cecc155144b3cbb995f256e56359ef4dd6bd81b4eb47e7c53c2a8ad1a45954e8ec7d94cefb932db57a0c1e358d010bb440690d1dc6b5b398653d", 0xa0}, {&(0x7f0000000500)="5c672451a9850a0a801217c4517dd6823515ab77f98ade71e05588ad0e0b226341f4fbc25ce2310061c540fe2f3a8b94d6a5d45da952c699a002bdbe9dd28992b2c13ce9ba18b5054c48ff36aa7ef419cc206cbcaa869fad71d8c3742012aaa6691c94cea8cd87eaf80bae274f53ba94649467d042c48a7191d5c144d23265983d8d459976b1dd7de445b56a", 0x8c}, {&(0x7f0000000600)="0f08712e571520e5e470fd5880c8b92fdcc6fd3be4ae56f5d7d592b86c4b619f4467e67e9f8159124460a8840d191638c1795a0f75681c9ba1f21831f631aded9c2d47e55c5d31823d477eab630416bb0a875cf18d7914f89924574849768274b0e03cb8f12d8505", 0x68}, {&(0x7f0000000680)="7e6577029f3ead24c3803d49c00c1ed26f7340c4bf8a146f901d69c555ea1b02b029e5ccfacf148007ff5e6160ff993af8a6538d44b7c24949d24a71f69b836d41d5ac804d4ef3187d5f338dac9b471d3e44c308fd635d44e45c", 0x5a}, {&(0x7f0000000700)="f36c1aee91", 0x5}, {&(0x7f0000000740)="31a2b7077672f83c08cf4e517d63dc1a9fe9a097aa235b316d0add7fa15b1dd66bbf57958e7721cf57682240a86d3a532548b1b4e9ba1a1cd138dcb9967791025ba42f92fde8d775444c6b4d3e6a64ed5615b315ab7a439590d08f5d58397ff6eb4ca75b53b5", 0x66}, {&(0x7f00000007c0)="4d18fb659944930c44c130dbbeb7de8604316dd66dbb1c72da0e947da9edb4cf65786c824bca8f087d174771852f33c9e7701259a90fb00b0a47bac1b578ebbd5501c8de561cbed29fb8de0cea22772536a1bf5268c90c5762953d5c33ba0a09b6d498a380cb2f53be6257c480134da8e65e76223125329e0bab35c667196d89c839e84df4e20e4e5aa859e66c5054624fe0827bcda7955acb81958de294d2860683de3f0eed729c474e2e0000516a1d5e57fc5f8985405c93e562f38c545b93334adbafdbe6b2ac1193b53fe03eba705a25e0de7bf6cc06e7849b6e01701f681a371364156baacf7b10eb3c848784e71c", 0xf1}], 0x7, 0x0, 0x0, 0x4000000}, {&(0x7f0000000940)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000a40)=[{&(0x7f00000009c0)="9e18401f6cc60f5ccd97feddd099895ba78c9b35c2ccba9b832ed6cb24e30966aa9e8ed225ccbdf9353c7aa75505b9fcf5c77a07085c9fdc5eba495418f188e63b1bc8bd4b66da0fe2f58edd382dae2e462985c3693d6898f10055663a9f48f29a8eb5f8518762379cb93bd5b7afb0efd0d979ac72002ea8", 0x78}], 0x1, 0x0, 0x0, 0x4000000}, {&(0x7f0000000a80)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000b00)="bf53c3408c32aac95b9fff53377fee88b6adc40c09bc861d4e4d8c616150035756fe4fedcd3c03a5dcb7ad6582efde0174208830", 0x34}, {&(0x7f0000000b40)="c58ef3e8cd8dd9028d986aa4e7795a2a4acbe1253607638b8208c929547b9c4d8782865e34c09054356d8e434b6bb4f5f70a53a519aa6f386b1c2011cb825fd2b21542efbfe797888e07b7c907eb2425824d7215c2a86d6d9f8650121431326f5475064e8113d21e901afb639a2ad1bc091a6477385c0bd797baf716ddb134a0c04cdb9be9f5b90a64613fa827889a21fa5e8aedfe070cc79aaa3e05ac1cc8404834c59b88", 0xa5}], 0x2, &(0x7f0000000d00)=ANY=[@ANYBLOB="18000000000000000104000001000000", @ANYRES32=r14, @ANYRES32=r16], 0x18, 0x8440}, {&(0x7f0000000d40)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000ec0)=[{&(0x7f0000000dc0)="8920d0d70ddcec868855ab2abf1820a24f1098841199c096085c550cc6023453117be9dc82268b53ad4470eb2f20dc686c1862c7e2cb52b5f3c724843e2a4786714b1efce1980921a8d86d97a387e8a16474ca1694c8f8c79484729f8ad48b6cecf8445a8c8c940757f81b58132243f8727571abda1d7270094a752ab13e2443d4e7a29af8d33c57d9fbad851cccd4e531895719131d04ffd06ea1d502a6e00aac0e00b431ed1f63385ddec6f26bd07c60751b9f7d20bb5f1ad8ed642ffb4da5c4225c52ad0ad2ef19", 0xc9}], 0x1, &(0x7f0000000f80)=[@cred={{0x1c, 0x1, 0x2, {r17, 0xee00, r19}}}, @rights={{0x18, 0x1, 0x1, [r20, r21]}}], 0x38}], 0x5, 0x800) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) 04:58:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:37 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff002}], 0x1, 0x0) [ 2705.384944] hfsplus: unable to parse mount options [ 2705.436701] hfsplus: unable to parse mount options 04:58:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'u%ask', 0x3d, 0x8cffffff}}]}) 04:58:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000000)={{{@in=@initdev, @in=@loopback}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x581042, 0x0) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0286404, &(0x7f0000000200)={0x0, 0xd05, 0x4, 0x1, &(0x7f0000ffb000/0x3000)=nil, 0x1}) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) 04:58:38 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff003}], 0x1, 0x0) 04:58:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x2302000000000000) [ 2705.647409] hfsplus: unable to parse mount options 04:58:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2705.706611] hfsplus: unable to parse mount options 04:58:38 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x02\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") clock_gettime(0x0, &(0x7f0000003f80)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000003e00)=[{{&(0x7f0000001d80)=@nl, 0x80, &(0x7f0000002080)=[{&(0x7f0000001e00)=""/75, 0x4b}, {&(0x7f0000001e80)=""/137, 0x89}, {&(0x7f0000001f40)=""/41, 0x29}, {&(0x7f0000001f80)=""/238, 0xee}], 0x4, &(0x7f00000020c0)=""/99, 0x63}, 0x7}, {{0x0, 0x0, &(0x7f0000002140), 0x0, &(0x7f0000002180)=""/152, 0x98}, 0x2}, {{&(0x7f0000002240)=@ax25={{0x3, @bcast}, [@remote, @netrom, @rose, @bcast, @remote, @rose, @default, @default]}, 0x80, &(0x7f0000002780)=[{&(0x7f00000022c0)=""/13, 0xd}, {&(0x7f0000002300)=""/87, 0x57}, {&(0x7f0000002380)=""/113, 0x71}, {&(0x7f0000002400)=""/35, 0x23}, {&(0x7f0000002440)=""/179, 0xb3}, {&(0x7f0000002500)=""/71, 0x47}, {&(0x7f0000002580)=""/216, 0xd8}, {&(0x7f0000002680)=""/240, 0xf0}], 0x8}, 0x80}, {{&(0x7f0000002800)=@in6, 0x80, &(0x7f0000003880)=[{&(0x7f0000002880)=""/4096, 0x1000}], 0x1, &(0x7f00000038c0)=""/111, 0x6f}, 0x4}, {{&(0x7f0000003940), 0x80, &(0x7f0000003a00)=[{&(0x7f00000039c0)=""/27, 0x1b}], 0x1, &(0x7f0000003a40)=""/208, 0xd0}, 0x7}, {{&(0x7f0000003b40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000003dc0)=[{&(0x7f0000003bc0)=""/204, 0xcc}, {&(0x7f0000003cc0)=""/155, 0x9b}, {&(0x7f0000003d80)=""/7, 0x7}], 0x3}, 0xf425}], 0x6, 0xc0000020, &(0x7f0000003fc0)={r1, r2+10000000}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000004000)={'team0\x00', r3}) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) 04:58:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'u,ask', 0x3d, 0x8cffffff}}]}) 04:58:38 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff004}], 0x1, 0x0) 04:58:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x900000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2706.252192] hfsplus: unable to parse mount options 04:58:38 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff005}], 0x1, 0x0) [ 2706.303059] hfsplus: unable to load nls mapping " [ 2706.303059] so8859-6" [ 2706.321208] hfsplus: unable to parse mount options [ 2706.390711] hfsplus: unable to parse mount options 04:58:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'um\nsk', 0x3d, 0x8cffffff}}]}) 04:58:38 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff006}], 0x1, 0x0) 04:58:38 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x3, 0x400) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000040)=0x4d) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) 04:58:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xa00000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2706.577668] hfsplus: unable to parse mount options [ 2706.658471] hfsplus: unable to parse mount options 04:58:39 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff007}], 0x1, 0x0) 04:58:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'um\"sk', 0x3d, 0x8cffffff}}]}) [ 2706.712461] hfsplus: unable to load nls mapping " [ 2706.712461] so8859-6" [ 2706.734998] hfsplus: unable to parse mount options [ 2706.836007] hfsplus: unable to parse mount options [ 2706.904708] hfsplus: unable to parse mount options 04:58:39 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x04\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r1, 0x1, &(0x7f00000001c0)={{}, {r2, r3+30000000}}, 0x0) timer_getoverrun(r1) r4 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r4, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') 04:58:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/se\xebinux/cruate\x00', 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x5, 0x10000, 0xffffffffec4cac92, 0x20}) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="886c002a578b49b312667000000000"]) 04:58:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x110e000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:39 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff00c}], 0x1, 0x0) 04:58:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'um%sk', 0x3d, 0x8cffffff}}]}) 04:58:39 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x9ffff040}], 0x1, 0x0) [ 2707.158998] hfsplus: unable to parse mount options [ 2707.235273] hfsplus: unable to parse mount options 04:58:39 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x2, 0x0) 04:58:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r3, 0x0) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) listen(r2, 0x0) r5 = accept(r2, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$packet_int(r5, 0x107, 0x13, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 2707.340262] hfsplus: unable to parse mount options 04:58:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x180c, &(0x7f00000005c0)={[{@nls={'\xe3\x04\x00', 0x3d, '\nso8859-6'}}]}) 04:58:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'um,sk', 0x3d, 0x8cffffff}}]}) [ 2707.472585] hfsplus: unable to parse mount options 04:58:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1a00000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2707.617763] hfsplus: unable to parse mount options 04:58:40 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x06\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x40, 0x30082) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000180)={0x4, 0x1000, "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"}) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r2, 0x0, 0x0) 04:58:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma\nk', 0x3d, 0x8cffffff}}]}) 04:58:40 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x3, 0x0) 04:58:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1b00000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r3, 0x0) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r5 = fcntl$getown(r4, 0x9) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000200)=r5) r6 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r6, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3013acc3defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a308cb0e7d3bcd384f9c0551000000b3cd00a0470fd2560035cc46c055d80012c11e09e83b4aa16e59b5c61d3027f6f8eebd5d1aac965b84bb7d0092ef95aba634402faeb71f2b237e98267db2cc93c733a45c7055ea6abcbd3ce70aeed99fded3780552"], 0x1}}, 0x8000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r6}) r8 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r11, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r11, 0x0) r12 = accept(r11, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r12, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r13 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0x440, 0x0) r14 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000006c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40026002}, 0xc, &(0x7f0000000680)={&(0x7f0000000400)={0x28, r14, 0x200, 0x70bd27, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) sendmsg$NBD_CMD_CONNECT(r12, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, r14, 0x100, 0x70bd28, 0x25dfdbff, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfffffffffffffbff}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x601c}]}, 0x2c}}, 0x20008851) setuid(r10) sendmsg$nl_generic(r7, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="140200003900200008000000ffdbdf25000000000002620008004100e000000110004a000a736f383835392d3600000008004100", @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=r10, @ANYBLOB="ee897695dbacd997583437f66ebb95dd4c61c12a1ff41f67b48c7347b4fc14145cee1d40688e385c927011c847eac23068d9067a4e69967480f815ddb7c5c56aaf2bdce270e3ef52e67113b84a8eb8b22f1792919821de8fab16fa9579c36ca536d5a3aed0"], 0x214}, 0x1, 0x0, 0x0, 0x833982e7a4ec1a6}, 0x14) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) [ 2708.083659] hfsplus: unable to parse mount options 04:58:40 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x4, 0x0) [ 2708.190250] hfsplus: unable to parse mount options 04:58:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6c733d0a736f383835392d362c00641585f28e954a064f7aca39bde0da3a02791e010400006228e837d1b34ceeac75b20d41e57d9900000000"]) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x2, {0xa, 0x4e20, 0xf2, @ipv4={[], [], @local}, 0x3ff}, r2}}, 0x38) 04:58:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma\"k', 0x3d, 0x8cffffff}}]}) 04:58:40 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x7, 0x0) 04:58:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1c00000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2708.333266] hfsplus: unable to parse mount options 04:58:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma#k', 0x3d, 0x8cffffff}}]}) [ 2708.392247] hfsplus: unable to parse mount options [ 2708.398064] hfsplus: unable to load nls mapping " [ 2708.398064] so8859-6" [ 2708.411578] hfsplus: unable to parse mount options [ 2708.550306] hfsplus: unable to parse mount options [ 2708.643293] hfsplus: unable to parse mount options 04:58:41 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\'\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r2, &(0x7f0000000180), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r2}, 0x10) read$char_usb(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) 04:58:41 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x8, 0x0) 04:58:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r3, 0x0) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000000)={r4, 0x0, 0x7, 0x8, 0x4}) rt_sigaction(0x1e, &(0x7f00000000c0)={&(0x7f0000000040)="410f0ffa97c4c2fd22d83644836cb992a8f30f1efe460fae26360fe73dffefffffc46261be01f3a6c44221ad1bf32e41dfc9", {}, 0xc0000002, &(0x7f0000000080)="660f2d43dcf2aff75387c423c96f8e72000000b7264280ac89020000001bc4a11d5f262e26362e47d9f7660f7dc0450f9f72633640ff28"}, &(0x7f0000000200)={&(0x7f0000000140)="66440f3a0d042e12460f38f6980c0000002e450fc7fdc4629ddc02f3410f1ecfc4a17e16d9f083830900000024f20f5f04cff2440f7ccc66460f5711", {}, 0x0, &(0x7f00000001c0)="3e66430f152272b7c44135e45f0364268006dec4015ded960b000000660f3815a181000000f236651190000000804732d6650f01d56666f3466d"}, 0x8, &(0x7f00000002c0)) syz_open_dev$media(&(0x7f0000000340)='/dev/media#\x00', 0x80000000, 0x20140) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$rds(r5, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000cc0)=[@fadd={0x58, 0x114, 0x6, {{0xc6, 0x9}, &(0x7f0000000440), &(0x7f0000000480)=0x1, 0xffffffff00000001, 0x7fff, 0x80, 0x3ff, 0x4, 0x100000001}}, @mask_cswp={0x58, 0x114, 0x9, {{0x7, 0x80}, &(0x7f00000004c0), &(0x7f0000000500)=0x1, 0x7, 0x5, 0x80, 0x7}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x3}, @mask_cswp={0x58, 0x114, 0x9, {{0x8, 0x6}, &(0x7f0000000540)=0x755, &(0x7f0000000580)=0x8, 0x5, 0x9, 0x7c977493, 0x100000001, 0x20, 0x9}}, @fadd={0x58, 0x114, 0x6, {{0x1, 0x9}, &(0x7f0000000600)=0x80000001, &(0x7f0000000640)=0x1, 0xf0, 0x5, 0x6, 0xa52, 0x50, 0x5}}, @cswp={0x58, 0x114, 0x7, {{0x100000000, 0xfffffffffffffff8}, &(0x7f0000000680)=0x7, &(0x7f00000006c0)=0x1000, 0x1, 0x2, 0x3, 0x7f, 0x11, 0x3}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x3}, @rdma_args={0x48, 0x114, 0x1, {{0x7fffffff, 0x7}, {&(0x7f0000000700)=""/100, 0x64}, &(0x7f0000000bc0)=[{&(0x7f0000000780)=""/88, 0x58}, {&(0x7f0000000800)=""/177, 0xb1}, {&(0x7f00000008c0)=""/192, 0xc0}, {&(0x7f0000000980)=""/210, 0xd2}, {&(0x7f0000000a80)=""/147, 0x93}, {&(0x7f0000000b40)=""/123, 0x7b}], 0x6, 0x11, 0x7d6}}, @fadd={0x58, 0x114, 0x6, {{0x0, 0xfffffffffffffe01}, &(0x7f0000000c40)=0x5, &(0x7f0000000c80), 0x8001, 0x3, 0x7, 0xc313, 0x0, 0xff}}], 0x288, 0x48}, 0x40) 04:58:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1d00000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma%k', 0x3d, 0x8cffffff}}]}) [ 2709.083070] hfsplus: unable to parse mount options [ 2709.166925] hfsplus: unable to parse mount options 04:58:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma*k', 0x3d, 0x8cffffff}}]}) 04:58:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[0x7274, 0x6, 0x80000001, 0x2b]}) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x5) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x100, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@nls={'\x00', 0x3d, '\nso8859-6'}}], [{@dont_measure='dont_measure'}, {@obj_role={'obj_role'}}, {@dont_measure='dont_measure'}]}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$FS_IOC_GETFLAGS(r4, 0x80086601, &(0x7f0000000040)) 04:58:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:41 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0xf, 0x0) 04:58:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f0000000180), r2, 0x1}}, 0x18) read$char_usb(r1, 0x0, 0x0) [ 2709.364494] hfsplus: unable to parse mount options 04:58:41 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x71, 0x0) [ 2709.400811] hfsplus: unable to parse mount options 04:58:42 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca/\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma+k', 0x3d, 0x8cffffff}}]}) 04:58:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x101000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000040)) 04:58:42 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x300, 0x0) 04:58:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2710.008319] hfsplus: unable to parse mount options 04:58:42 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0xffffff1f, 0x0) [ 2710.035815] hfsplus: unable to load nls mapping " [ 2710.035815] so8859-6" [ 2710.048660] hfsplus: unable to parse mount options [ 2710.136689] hfsplus: unable to parse mount options 04:58:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000880e, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) 04:58:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2200000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma,k', 0x3d, 0x8cffffff}}]}) 04:58:42 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x2) 04:58:42 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) [ 2710.329291] hfsplus: unable to load nls mapping " [ 2710.329291] so8859-6" [ 2710.337390] hfsplus: unable to parse mount options [ 2710.341029] hfsplus: unable to parse mount options [ 2710.472621] hfsplus: unable to parse mount options 04:58:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@umask={'umask', 0x3d, 0x400}}]}) [ 2710.589255] hfsplus: unable to find HFS+ superblock 04:58:43 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xcaH\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma-k', 0x3d, 0x8cffffff}}]}) 04:58:43 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x3) 04:58:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2c00000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200242, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000040)={0x800, 0x3, 0x10001, 0x7, 0x1}) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) [ 2710.913591] hfsplus: unable to parse mount options 04:58:43 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x4) 04:58:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma.k', 0x3d, 0x8cffffff}}]}) [ 2711.010232] hfsplus: unable to load nls mapping " [ 2711.010232] so8859-6" [ 2711.032825] hfsplus: unable to parse mount options 04:58:43 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x5) 04:58:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2711.147214] hfsplus: unable to parse mount options 04:58:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x8090, &(0x7f00000000c0)=ANY=[]) [ 2711.234040] hfsplus: unable to parse mount options 04:58:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x20800) read$char_usb(r1, 0x0, 0x0) 04:58:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma0k', 0x3d, 0x8cffffff}}]}) [ 2711.550166] hfsplus: unable to parse mount options [ 2711.613783] hfsplus: unable to parse mount options 04:58:44 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xcaL\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:44 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x6) 04:58:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) getsockopt$inet_dccp_buf(r1, 0x21, 0x6a, &(0x7f0000000040)=""/180, &(0x7f0000000140)=0xb4) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) connect$can_bcm(r1, &(0x7f00000001c0), 0x10) setuid(r8) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}], [{@uid_gt={'uid>', r3}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@fsname={'fsname', 0x3d, 'vboxnet1vmnet1\\\xb3,*trustedproc@keyring[::\\cgroup}ppp0)systemposix_acl_accessvmnet0$em0'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet1systemsystem'}}, {@euid_gt={'euid>', r5}}, {@uid_eq={'uid', 0x3d, r6}}, {@euid_lt={'euid<', r8}}]}) 04:58:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umaXk', 0x3d, 0x8cffffff}}]}) 04:58:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000000)="f6149a39a29a2cd8bc11e67e3d7bdd866654b87f94c473977f9a4c2b627b3b11e035964ffc67e5bc3576f7e661eb5933429b7c136b08a41df231655ec39468639cf8ef8365a27639615c144abce3f33098a1988006a052869f388c39cb824fbe7f9379edd88b5f372405b2dbe5a8da62b5fb4089b2677068b5700e8ace0bd55caf069bd1f2cef87eb1aa8e8552049d340921f3437aa30c0dab1ddc", 0x9b) 04:58:44 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x7) [ 2711.946916] hfsplus: unable to parse mount options [ 2712.049837] hfsplus: unable to parse mount options 04:58:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x441182, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x8390bb91a2aee050, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") 04:58:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r1) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r6 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r5, 0x8902, &(0x7f0000000200)=r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r7, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x80000001, 0x7, 0x5, 0x9, 0x0, 0xcd, 0x20, 0x4, 0x38, 0xe02, 0x5, 0x1ac, 0x4, 0x2b, 0x100, 0xfc6, 0x8, 0x8, 0x2, 0x0, 0x8000, 0x4, 0x1, 0x5, 0x2, 0x5, 0x1, 0xbe, 0x8, 0x6, 0x1, 0xffffffff, 0x5, 0x1f, 0xffff, 0x2, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000280), 0x8f35447a451e9cc3}, 0x2000, 0x2fe89911, 0x401, 0xbe784ef2bd031a6e, 0x4, 0x8000, 0x4}, r6, 0x5, r9, 0x2) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x4c, r4, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3dfb}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x6}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xffffffffffffffff}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10000}, 0x44000) read$char_usb(r2, 0x0, 0x0) clock_gettime(0x7, &(0x7f0000000240)) 04:58:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umack', 0x3d, 0x8cffffff}}]}) 04:58:44 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0xc) 04:58:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x4800000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2712.256214] hfsplus: unable to parse mount options [ 2712.325759] hfsplus: unable to parse mount options [ 2712.456764] vivid-000: kernel_thread() failed 04:58:45 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xcah\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) accept(r1, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000040)={0x32, @multicast1, 0x4e23, 0x3, 'sed\x00', 0x24, 0xb3, 0x47}, 0x2c) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x80000000, 0x40) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) 04:58:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umadk', 0x3d, 0x8cffffff}}]}) 04:58:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fd) ioctl$HDIO_GETGEO(r4, 0x301, &(0x7f0000000000)) read$char_usb(r1, 0x0, 0x0) 04:58:45 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x300) 04:58:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2712.871797] hfsplus: unable to parse mount options 04:58:45 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x500) [ 2712.943673] hfsplus: unable to parse mount options 04:58:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umaik', 0x3d, 0x8cffffff}}]}) 04:58:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x0) sendmsg$inet6(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="545cc58bfcaf", 0x6}], 0x1, &(0x7f00000002c0)=[@dontfrag={{0x14}}, @hopopts_2292={{0x68, 0x29, 0x36, {0x2c, 0x9, [], [@pad1, @calipso={0x7, 0x18, {0xc43e012, 0x4, 0x9, 0xfffffffffffffe01, [0x0, 0x4]}}, @jumbo={0xc2, 0x4, 0x1ff}, @calipso={0x7, 0x10, {0x100, 0x2, 0x5, 0x0, [0x987]}}, @enc_lim={0x4, 0x1, 0x6}, @hao={0xc9, 0x10, @ipv4={[], [], @local}}]}}}, @hopopts_2292={{0x68, 0x29, 0x36, {0x2b, 0x9, [], [@enc_lim={0x4, 0x1, 0xd9df}, @hao={0xc9, 0x10, @local}, @pad1, @enc_lim={0x4, 0x1, 0x6}, @hao={0xc9, 0x10, @empty}, @enc_lim={0x4, 0x1, 0x401}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @ra={0x5, 0x2, 0xb6c}, @ra={0x5, 0x2, 0x3fb}]}}}, @tclass={{0x14, 0x29, 0x43, 0x5}}, @hopopts_2292={{0x38, 0x29, 0x36, {0x67, 0x3, [], [@calipso={0x7, 0x10, {0xb05, 0x2, 0x20, 0x7, [0x4]}}, @pad1, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @rthdr={{0x58, 0x29, 0x39, {0x2c, 0x8, 0x0, 0x1, 0x0, [@rand_addr="f0866cfe999b2bd2de3d21169fb0081b", @remote, @loopback, @empty]}}}], 0x190}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) 04:58:45 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x600) [ 2713.197473] hfsplus: unable to parse mount options 04:58:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:45 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x700) [ 2713.230274] hfsplus: unable to load nls mapping " [ 2713.230274] so8859-6" [ 2713.243337] hfsplus: unable to parse mount options [ 2713.362812] hfsplus: unable to parse mount options 04:58:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x1000408, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno'}, 0x2c, {[{@version_9p2000='version=9p2000'}, {@cache_none='cache=none'}, {@cache_loose='cache=loose'}, {@version_u='version=9p2000.u'}, {@version_u='version=9p2000.u'}, {@access_any='access=any'}, {@noextend='noextend'}, {@cache_fscache='cache=fscache'}, {@loose='loose'}], [{@appraise='appraise'}, {@subj_type={'subj_type', 0x3d, 'nls'}}, {@pcr={'pcr', 0x3d, 0x23}}]}}) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f00000002c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000040)={0x6, 0x3, 0x80000001, 0x80000001, 'syz0\x00', 0x7}) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) 04:58:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umalk', 0x3d, 0x8cffffff}}]}) 04:58:46 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0xc00) 04:58:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x6800000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r2, &(0x7f0000000180), 0x8) read$char_usb(r2, &(0x7f0000000040)=""/23, 0x17) read$char_usb(r1, 0x0, 0x0) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000000)={0x2, 0xda54, 0xef1, 0x1000, 0xfffffffffffff7a6, 0x100000000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r6, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r7 = accept4$inet6(r6, 0x0, &(0x7f00000002c0), 0x80000) flistxattr(r7, &(0x7f0000000300)=""/209, 0xd1) r8 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) sendmsg$nl_route_sched(r9, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000600)=@newtaction={0x23c, 0x30, 0x400, 0x9, 0x25dfdbfd, {}, [{0xf8, 0x1, @m_gact={0xf4, 0x8, {{0xc, 0x1, 'gact\x00'}, {0x34, 0x2, [@TCA_GACT_PARMS={0x18, 0x2, {0x200, 0xfe, 0x4, 0x8, 0x8001}}, @TCA_GACT_PARMS={0x18, 0x2, {0x101, 0x4, 0x7, 0x80000001, 0x8}}]}, {0xac, 0x6, "890b07ab8abf36943a87258359a06ae9847a9902f21e09c114bc15348616184d0b2e3a5f83e413317fe27403d2a65dc8bea595c61de755a6e52adee048a8649f2d68b99d12c9798ebb7118860e66fec875f33aca679a5979dcf8783e7f06698ee8aebd7dde5e823ff15cef370decb27a870ae1b20455750a8d8a66b293001d81c26a5ae478609addb9ec0d6a4712ed7c193ea45b8bb2ac447b84dc87e915c98d0949a064b10d"}}}}, {0xf0, 0x1, @m_ipt={0xec, 0x1, {{0x8, 0x1, 'ipt\x00'}, {0x3c, 0x2, [@TCA_IPT_TABLE={0x14, 0x1, 'nat\x00'}, @TCA_IPT_HOOK={0x8}, @TCA_IPT_INDEX={0x8, 0x3, 0x800000000000000}, @TCA_IPT_TABLE={0x14, 0x1, 'filter\x00'}]}, {0xa0, 0x6, "0f7b961cda9488a29b3565e8d0a6dd9ac3327b6a06e1a4ff8577d53822546b1b665cdfaf50b172b1b70e2ebaf8cfac72b7905b98a5e8388e347407290debd7b1dbc4dedb6751f4a142f75e87bcc1cbf0e36249d0956fbc7a43e43e3dc9471096165f2373b192b7191d8bd9dd8200ae19ef5bd612a4a00410d7212ef1e8ad6f8ff820fbe82fe02fe8550ac95bc9edbfdd0adaf0f43317bc3824"}}}}, {0x40, 0x1, @m_connmark={0x3c, 0xe, {{0x10, 0x1, 'connmark\x00'}, {0x20, 0x2, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x417b, 0x8, 0x8, 0x31, 0x8}, 0xfffffffffffffffd}}}, {0x4}}}}]}, 0x23c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8800) faccessat(r8, &(0x7f0000000080)='./file0\x00', 0x0, 0x400) 04:58:46 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xcal\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2713.865685] hfsplus: unable to parse mount options [ 2713.931932] hfsplus: unable to parse mount options [ 2713.945856] hfsplus: unable to load nls mapping " [ 2713.945856] so8859-6" [ 2713.953536] hfsplus: unable to parse mount options 04:58:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umaok', 0x3d, 0x8cffffff}}]}) 04:58:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r2, 0x0, 0x0) 04:58:46 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x2000) 04:58:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1a1300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000140)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r1, &(0x7f0000000340)={0x78, 0xfffffffffffffffe, 0x1, {0x9, 0xf7cf, 0x0, {0x6, 0x5, 0x3eb0, 0x17842a36, 0x80000001, 0xbe, 0xfffffffffffffffb, 0x4, 0xb8b9, 0x96b, 0x1, r4, r5, 0xff, 0xfff}}}, 0x78) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6c733d05c7a8b24593350e9b05000000000000004f95662ab3c4fed40f6f902b"]) [ 2714.220668] hfsplus: unable to parse mount options 04:58:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:46 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x3f00) [ 2714.275864] hfsplus: unable to parse mount options 04:58:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umapk', 0x3d, 0x8cffffff}}]}) 04:58:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="6e6c733d0a736f1f1035792d362c00"]) [ 2714.443978] hfsplus: unable to parse mount options [ 2714.540000] hfsplus: unable to parse mount options 04:58:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x7400000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umauk', 0x3d, 0x8cffffff}}]}) 04:58:47 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x4000) [ 2714.641335] hfsplus: unable to load nls mapping " [ 2714.641335] so5y-6" [ 2714.657548] hfsplus: unable to parse mount options [ 2714.757678] hfsplus: unable to parse mount options 04:58:47 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xcat\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:47 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x200000) [ 2714.834942] hfsplus: unable to parse mount options 04:58:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000080)=@assoc_value, &(0x7f00000000c0)=0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x40000, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0/file0\x00', 0x1) setuid(r2) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@nls={'nls', 0x3d, '\nso8859-6'}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'user_u'}}]}) r4 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r9, r10) chown(&(0x7f0000000300)='./file0\x00', r6, r10) setfsgid(r7) setsockopt$llc_int(r4, 0x10c, 0x1, &(0x7f0000000040)=0x4, 0x4) 04:58:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umaxk', 0x3d, 0x8cffffff}}]}) 04:58:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7, &(0x7f0000000440)="11dca50d5e0bcfe07bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x105, &(0x7f00000004c0)=0x0) r4 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x0, 0x0) io_submit(r3, 0x2, &(0x7f00000003c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000380)={0x0, 0x0, 0xfe, 0x5, 0x0, r4, 0x0}]) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22, 0xffffffffffffffff, @ipv4={[], [], @rand_addr=0xfffffffffffffff8}}, 0x1c) setsockopt$sock_int(r5, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r5, 0x1) recvfrom$inet6(r5, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r6, 0x0) r7 = accept(r6, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r7, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1}}, 0x8000) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r8, &(0x7f0000000180), 0x8) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r9, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r9, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r9, 0x1) recvfrom$inet6(r9, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r9) timerfd_create(0x3, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x3, 0x2, 0x2, 0x7fffffff, 0x160, 0xffffffffffffffff, 0xfff, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r11, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r11, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r11, 0x1) recvfrom$inet6(r11, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r11) r12 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r12, &(0x7f0000000180), 0x8) io_submit(r3, 0x12a, &(0x7f0000000840)=[&(0x7f0000000740)={0x0, 0x0, 0x0, 0x7, 0x8fc, r10, &(0x7f00000006c0)="acf01fad6bcff7675cc10ef44e0fba72a23e6ac7ceb3648f5d825aee05a9ca2dde760c49562569000e5d1f8f3dacc7b04f5d1a907e99d513d23e94298f625e24540aaf3790e0", 0x0, 0x4c, 0x0, 0x0, r1}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x1, r11, &(0x7f0000000780)="b283436fe7203318b227ffcbe11586d97e91722aedfdada26a92bdb59a26a1a55dd17bdb4b6bb59b2527c0f5f2c621b675659244fc230fd8db99cec296766ecbefa8daca95cfa8596a38fd28ec73", 0x0, 0x9, 0x0, 0x3, r12}]) 04:58:47 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x1000000) [ 2715.185517] hfsplus: unable to parse mount options [ 2715.276447] hfsplus: unable to parse mount options 04:58:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") socket$bt_hidp(0x1f, 0x3, 0x6) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@nls={'nls', 0x3d, '\nso885)-6'}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@subj_type={'subj_type', 0x3d, '\nso8859-6'}}, {@permit_directio='permit_directio'}, {@obj_role={'obj_role', 0x3d, 'eth0{.keyring[+cgroup{eth1GPL*^cpusetvmnet1'}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f00000002c0)) 04:58:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umas\n', 0x3d, 0x8cffffff}}]}) 04:58:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:47 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x2000000) 04:58:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x37bc80) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x20480, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r2, &(0x7f0000000180), 0x8) read$char_usb(r2, 0x0, 0xfd40) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r3, &(0x7f0000000180), 0x8) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000000)={{0x800, 0x89}, 'port1\x00', 0xa0, 0x20, 0x40, 0x1, 0x1330ae9b, 0xe00000000, 0x10000, 0x0, 0x4, 0x5}) [ 2715.446288] hfsplus: unable to load nls mapping " [ 2715.446288] so885)-6" [ 2715.456328] hfsplus: unable to parse mount options [ 2715.473735] hfsplus: unable to parse mount options [ 2715.575980] hfsplus: unable to parse mount options 04:58:48 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umas\"', 0x3d, 0x8cffffff}}]}) 04:58:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") 04:58:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r1, &(0x7f0000000180), 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$inet_dccp_buf(r3, 0x21, 0x0, &(0x7f00000001c0)=""/250, &(0x7f0000000080)=0xfa) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r4, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r5, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) execveat(r7, &(0x7f0000000340)='./file0\x00', &(0x7f0000000800)=[&(0x7f0000000440)='\x00', &(0x7f0000000600)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00', &(0x7f0000000780)='\x00', &(0x7f00000007c0)='!\x00'], &(0x7f0000000880)=[&(0x7f0000000840)='/dev/input/mice\x00'], 0x400) r8 = accept(r4, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a394358b8abbd42b361f438e3bbee4ea19c4b68e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}, 0x1, 0x0, 0x0, 0x4050}, 0x8881) r9 = accept4$rose(r8, &(0x7f0000000000)=@short={0xb, @dev, @bcast, 0x1, @null}, &(0x7f00000000c0)=0x1c, 0x80000) accept4(r9, &(0x7f00000002c0)=@rc, &(0x7f0000000140)=0x80, 0x80000) r10 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x8000) read$char_usb(r10, 0x0, 0x0) 04:58:48 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xcaz\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2715.807102] hfsplus: unable to parse mount options [ 2715.823159] vivid-000: kernel_thread() failed 04:58:48 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x3000000) 04:58:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ptrace$pokeuser(0x6, r1, 0x4, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) [ 2715.890386] hfsplus: unable to parse mount options 04:58:48 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umas%', 0x3d, 0x8cffffff}}]}) 04:58:48 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x4000000) [ 2716.081754] hfsplus: unable to parse mount options 04:58:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r2, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r4 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f00000002c0)=r4) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r7 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r6, 0x8902, &(0x7f0000000200)=r7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001280)={r7, 0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001240)='/dev/input/mice\x00'}, 0x30) fstat(r1, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r11) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r12, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r13, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$sock_int(r13, 0x1, 0x26, &(0x7f0000000300)=0xfffffffffffff76f, 0xff0e) shutdown(r12, 0x1) recvfrom$inet6(r12, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r12) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r14, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r14, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r14, 0x1) recvfrom$inet6(r14, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r14) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r15, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r15, 0x0) r16 = accept(r15, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r16, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) sendmsg$netlink(r1, &(0x7f0000001880)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfe, 0x40000000}, 0xc, &(0x7f00000017c0)=[{&(0x7f00000018c0)={0x10, 0x3a, 0x20, 0x70bd27, 0x1000000025dfdbfb}, 0x10}, {&(0x7f0000000080)={0x44, 0x2d, 0x2, 0x70bd26, 0x25dfdbfb, "", [@typed={0x8, 0x92, @pid=r4}, @nested={0x2c, 0x80, [@typed={0x8, 0x90, @uid}, @typed={0x8, 0x4c, @pid=r5}, @typed={0x14, 0x63, @str='/dev/input/mice\x00'}, @typed={0x4, 0x1}]}]}, 0x44}, {&(0x7f00000012c0)={0x2c, 0x42, 0x1, 0x70bd2d, 0x25dfdbfc, "", [@typed={0xc, 0x58, @u64=0x100000000}, @typed={0x8, 0x92, @pid=r8}, @typed={0x8, 0x20000000054, @ipv4=@dev={0xac, 0x14, 0x14, 0x14}}]}, 0x2c}, {&(0x7f0000001300)={0x188, 0x38, 0x9b31fb44e5371415, 0x70bd2c, 0x25dfdbfc, "", [@generic="fc7b7629aac5e8fca9de38ea1728211dd32e2a496fbcf1468fd1e7bf35ad053779ec3725e2cf1205c4c35b59d0fd594afcc112cfd99cc29eba582881d31529bc566f19568174e4af4e2fc314d5eac11f33540d19a708bf4ef4383d78f10d046719e29836340b921fac2773c4683aa2de953afbd2799a3975ce7cd2b0f482fa", @nested={0xe4, 0x4d, [@typed={0x14, 0x4b, @str='/dev/input/mice\x00'}, @generic="ce35eafd358cd1b1c8183d549fa9ce0cf524ef22746ec09f97d598eaa25cc8ca3f60526e95967cc207e6ae7154f02dbccea93f6a135a34ce5553e81faf22560888ebd8436f65a0778f5423c70d7a6e5e497ff50f13dea6a69b7b8132ae0088cc57d9f1baaca5f0f84f9bd1790927398cb78eff2687a42205fd28a50fad0c592288d556ee38b64613afb7c96248ebe28ba911cd0ba9dc8c4808122d75ebf1cd2fc10692ab60f3bab77430942e438900bc4cc158d3bc1956448343b724f7c1cb58ecb141b90a5424b5643942e1"]}, @typed={0x14, 0x1c, @str='/dev/input/mice\x00'}]}, 0x188}, {&(0x7f0000001540)={0x1d4, 0x21, 0x100, 0x70bd27, 0x25dfdbff, "", [@nested={0x1c4, 0xf198, [@generic="859d9bf4730c79664577b853c57a3f63470ebd886fedd8d0bd60b73ac2d4bf26a6b26b7de4800a25f3c76e0b4032e6d18a3c0d195672d9cbce1cd85cae3a340b93cb2ab57ba6c7ff95a44cd52549d22677d3587b3ce5792911458f62393b76747cdae718430151f5056375f4df99d39dfc629756f66f548f2c411d00c398ef08be962dccae8c13b8a35254e4b541e158b2b67020640aa05a5119f90048afab988ff3d38570ffab4b30ea2c53238352079bb2a76452dfa5c3c790f09853c0f96c61ea", @typed={0x8, 0x48, @uid=r9}, @generic="4ba799302711c035c9b7cfeb42aa6a8a3c2834d4f84359040feab52fc9647be89dd6cc94571f411c976531f679c01e8887cab955698e5ce9e9ab49f257537c1f6ca813759753a0dc3597619d38f80395d0fdd092a041ebe14c6152ba1a75c163a74c92aff3da679065d9467e7e4b45c3a0c1335d28603ef784b090c5342175fe9e3e8726c520a1657061d49c9e7f062ffa0ed36017d9a2b158a353bf8a9bdf38fbc54744f1ed8f5424a0afbfa38675ec5517810eb7e1ed36559965572708f2cb730964a8", @generic="ce69e400af6d30bf9f9cc431de478f7ba0dd4af065f7d5db24a3be54cb11c2ec331be1dfcc", @typed={0xc, 0x53, @u64=0x83f}]}]}, 0x1d4}, {&(0x7f0000001740)=ANY=[@ANYBLOB="500000003b0000012dbd7000fcdbdf256422ff6cbd621881441551d04389ebe2bac06be18df18c19eb9a0948a7eb01cde4d3ecc00d9b1930780138211f6894e525368176ed08008900", @ANYRES32=r11, @ANYBLOB='\x00\x00\x00'], 0x3}], 0x6, &(0x7f0000001840)=[@rights={{0x10}}], 0x10}, 0x20000001) read$char_usb(r1, 0x0, 0x0) 04:58:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xf803000000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2716.138468] hfsplus: unable to load nls mapping " [ 2716.138468] so8859-6" [ 2716.138899] hfsplus: unable to parse mount options [ 2716.166297] hfsplus: unable to parse mount options 04:58:48 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x5000000) 04:58:48 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umas,', 0x3d, 0x8cffffff}}]}) [ 2716.342619] hfsplus: unable to parse mount options 04:58:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="736d61636b66736465663d736d61636b66736861742c7375626a5f757365723d6e6c732c736d6163446cfb1b3ce2899b7ee19e2d21a16b66736861743d0a736f383835392d362c726f6f74636f6e746578743d756e636f6666696e65645f752c7375626a5f74797069643d00"/121, @ANYRESDEC=r2, @ANYBLOB=',\x00']) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000140)={0x5, 0x8, 0x2}) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x4000, 0x0) 04:58:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x204400) read$char_usb(r1, 0x0, 0x0) [ 2716.440768] hfsplus: unable to parse mount options 04:58:48 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x22, 0x8cffffff}}]}) [ 2716.489884] hfsplus: unable to parse mount options [ 2716.664284] hfsplus: unable to parse mount options [ 2716.741802] hfsplus: unable to parse mount options 04:58:49 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\xc0\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:49 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x6000000) 04:58:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) r1 = request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='/dev/input/mice\x00', 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000180)=""/57, 0x39) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) accept(r2, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f00000001c0), 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r3 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r3, 0x0, 0x0) 04:58:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff00000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:49 executing program 4: r0 = geteuid() setuid(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x258, 0xe0, 0x0, 0xe0, 0xe0, 0xe0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, &(0x7f0000000140), {[{{@uncond, 0x0, 0xc0, 0xe0, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00'}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b8) semget(0x2, 0x3bb54f7c2d7855bb, 0x100) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x9c) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file1\x00') openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80800, 0x15) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r5, &(0x7f0000000180), 0x8) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', r5, &(0x7f0000000080)='./file1\x00') 04:58:49 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x25, 0x8cffffff}}]}) 04:58:49 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x7000000) [ 2716.915538] hfsplus: unable to parse mount options 04:58:49 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000006c0)=ANY=[@ANYBLOB="08000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000a004e2200000009fe8000000000000000000000000000bb47820000000000000000000000000070b9851ae22e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2200000008fe880000000000000000000000000001ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003d709e720000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000fe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000fe8000000000000000000000000000bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000a00000000000000fe8000000000000000000000000000bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff02000000000000000000000000000100"/1168], 0x490) [ 2716.991610] hfsplus: unable to parse mount options 04:58:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) rt_sigreturn() openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0) read$char_usb(r1, 0x0, 0x0) 04:58:49 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x2c, 0x8cffffff}}]}) 04:58:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff00000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2717.138379] hfsplus: unable to parse mount options 04:58:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dce47bf0700000000000f1f59cc608d774cbf28e3a9fa3a6836cd2282d717a8e8f03972b6eaf72f2e8946b0066b066449a9be0eb2a1f7340bc774d97b3a0525918d48d0685b5ab33c637ce3bc54ac10d67dc6471a89dddb8ee") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000080)={0xfc, 0xaa}) [ 2717.230588] hfsplus: unable to parse mount options 04:58:50 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x02\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:50 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0xc000000) 04:58:50 executing program 4: 04:58:50 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x39, 0x8cffffff}}]}) 04:58:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xffff1f0000000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000000)='/\xe3}e\x00', 0x0, 0x6781f2cf9a9ea37a) read$char_usb(r1, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x76) 04:58:50 executing program 4: [ 2717.805538] hfsplus: unable to parse mount options 04:58:50 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x3f000000) [ 2717.877791] hfsplus: unable to parse mount options 04:58:50 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}, 0x22}]}) 04:58:50 executing program 4: 04:58:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r8, 0x84, 0xa, &(0x7f0000000080)={0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x670, 0x0, 0x0, 0x0, r7}, 0x20) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000000)={r4, 0x8001}, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r9 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r9, 0x0, 0x0) [ 2718.106028] hfsplus: unable to parse mount options [ 2718.231294] hfsplus: unable to parse mount options 04:58:51 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x03\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:51 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x40000000) 04:58:51 executing program 4: 04:58:51 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r0, &(0x7f0000000180), 0x8) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r2, 0x0, 0x0) 04:58:51 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}, 0x2f}]}) 04:58:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:51 executing program 4: [ 2718.825031] hfsplus: unable to parse mount options 04:58:51 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x20000000000000) [ 2718.873444] hfsplus: unable to parse mount options 04:58:51 executing program 4: 04:58:51 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}, 0x36}]}) 04:58:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:58:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x48, 0x0, 0x1000000}]}) [ 2719.078650] hfsplus: umask requires a value [ 2719.093685] hfsplus: unable to parse mount options [ 2719.158908] hfsplus: umask requires a value [ 2719.164057] hfsplus: unable to parse mount options 04:58:52 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x05\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:52 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x100000000000000) 04:58:52 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x2}) 04:58:52 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x8000, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r0, &(0x7f0000000100)="115a7c93ac", 0x5, 0x2fffffc}]) ftruncate(r0, 0x0) 04:58:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'\nmask', 0x3d, 0x8cffffff}}]}) 04:58:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="30dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) [ 2719.811355] hfsplus: umask requires a value [ 2719.819674] hfsplus: unable to parse mount options [ 2719.832239] hfsplus: unable to parse mount options [ 2719.911650] hfsplus: umask requires a value [ 2719.916258] hfsplus: unable to parse mount options 04:58:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'\"mask', 0x3d, 0x8cffffff}}]}) 04:58:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x11e}]}) 04:58:52 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x3}) 04:58:52 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x200000000000000) [ 2720.125693] hfsplus: umask requires a value [ 2720.139231] hfsplus: unable to parse mount options 04:58:52 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x300000000000000) [ 2720.220365] hfsplus: unable to parse mount options [ 2720.244016] hfsplus: umask requires a value [ 2720.258588] hfsplus: unable to parse mount options 04:58:52 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 04:58:53 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\a\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:53 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x4}) 04:58:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'#mask', 0x3d, 0x8cffffff}}]}) 04:58:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = creat(0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) 04:58:53 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x400000000000000) 04:58:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8000000000000, 0x2a000) read$char_usb(r1, 0x0, 0x0) [ 2720.763269] hfsplus: umask requires a value [ 2720.778844] hfsplus: unable to parse mount options 04:58:53 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x500000000000000) [ 2720.831019] hfsplus: unable to parse mount options 04:58:53 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x5}) 04:58:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'%mask', 0x3d, 0x8cffffff}}]}) 04:58:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x408040) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x303180) read$char_usb(r1, 0x0, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000040)) [ 2721.119903] hfsplus: unable to parse mount options 04:58:53 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x600000000000000) [ 2721.182382] hfsplus: umask requires a value [ 2721.194821] hfsplus: unable to parse mount options [ 2721.286457] hfsplus: umask requires a value [ 2721.291281] hfsplus: unable to parse mount options 04:58:53 executing program 4: syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x186185) 04:58:54 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x6}) 04:58:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'*mask', 0x3d, 0x8cffffff}}]}) 04:58:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f00000001c0)={{&(0x7f0000000000)=""/238, 0xee}, &(0x7f0000000180), 0x87e6eaa32062a59}, 0x72) read$char_usb(r1, 0x0, 0x0) 04:58:54 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x24001000, 0x0, &(0x7f00000001c0), 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x400000000000072, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x4060010) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 04:58:54 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x02bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:54 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x700000000000000) [ 2721.696630] hfsplus: umask requires a value [ 2721.725860] hfsplus: unable to parse mount options 04:58:54 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0xc00000000000000) [ 2721.776463] hfsplus: unable to parse mount options [ 2721.785640] hfsplus: umask requires a value [ 2721.796161] hfsplus: unable to parse mount options 04:58:54 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000000000000000"], 0x2ab) 04:58:54 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x7}) 04:58:54 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x3f00000000000000) 04:58:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'+mask', 0x3d, 0x8cffffff}}]}) [ 2721.965877] hfsplus: umask requires a value [ 2721.983236] sel_write_load: 8 callbacks suppressed [ 2721.983242] SELinux: failed to load policy [ 2721.983697] hfsplus: unable to parse mount options 04:58:54 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000000000000000"], 0x2ab) [ 2722.038068] vivid-000: kernel_thread() failed [ 2722.057998] hfsplus: umask requires a value [ 2722.068123] hfsplus: unable to parse mount options [ 2722.094661] SELinux: failed to load policy 04:58:54 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x4000000000000000) [ 2722.152363] hfsplus: unable to parse mount options 04:58:55 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x03bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:55 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x8}) 04:58:55 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000000000000000"], 0x2ab) 04:58:55 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x8000000000000000) 04:58:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={',mask', 0x3d, 0x8cffffff}}]}) [ 2722.608923] hfsplus: umask requires a value [ 2722.613424] hfsplus: unable to parse mount options 04:58:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x1094c0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r3, 0x0) accept(r3, 0x0, 0x0) accept(r3, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80) listen(r2, 0x0) r4 = accept(r2, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16=0x0], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x8000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f0000000340)='y\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r6, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x1}}, 0x8000) r7 = socket(0x10, 0x6, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r9, 0x0) r10 = accept(r9, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r10, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x8000) r11 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r11, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000003c0)=ANY=[@ANYBLOB="500000006d02c81fe2f40579", @ANYRESDEC=0x0, @ANYBLOB="31000000000000000000090000003c0003000800030000000000140002006c6f000000000000000000000a00000014000800ff0200000000000000000000000000010800010000000000"], 0x3}}, 0x40004) sendmsg$IPVS_CMD_SET_INFO(r10, &(0x7f0000000600)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40060}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)={0xe0, 0x0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x19}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_team\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x101}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffffff9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}]}, 0xe0}}, 0x10000) sendmsg$TIPC_CMD_SET_LINK_PRI(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x68, r8, 0xa35eacb2f9f40add, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz1\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r6, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r8, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x7d00}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x94}, 0x40) ioctl$IMGETCOUNT(r4, 0x80044943, &(0x7f0000000000)) read$char_usb(r1, 0x0, 0x0) 04:58:55 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0xffffffff00000000) [ 2722.661886] hfsplus: umask requires a value [ 2722.666247] hfsplus: unable to parse mount options [ 2722.696982] SELinux: failed to load policy 04:58:55 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x9}) 04:58:55 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000000000000000"], 0x2ab) [ 2722.773091] hfsplus: unable to parse mount options 04:58:55 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) fcntl$notify(r0, 0x402, 0x40000000) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f00000000c0)={0x100, "9e9b8e001f1ab30a74dfd4c482f402198f585ea67a420bde3e5446c9b3e83e1a", 0x1}) [ 2722.858960] SELinux: failed to load policy [ 2722.870653] hfsplus: umask requires a value [ 2722.875192] hfsplus: unable to parse mount options 04:58:55 executing program 4: write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000000000000000"], 0x2ab) [ 2722.914455] hfsplus: umask requires a value [ 2722.926162] hfsplus: unable to parse mount options 04:58:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e1e, 0x9f, @mcast2, 0x400000000000000}, 0xfffffffffffffe45) listen(r0, 0x0) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f0000000100000031018807753ee59d88c330d664046b44b9e4a794358b8abb01000000438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb58942c4cec89d1fc89c6eb7c248f55e4192c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd38"], 0x1}}, 0x8000) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000000)=0x8, 0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r5 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x20000) read$char_usb(r5, 0x0, 0x0) 04:58:55 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x05bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:55 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xa}) 04:58:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'-mask', 0x3d, 0x8cffffff}}]}) 04:58:55 executing program 4: write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000000000000000"], 0x2ab) 04:58:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x100000001, 0x200) signalfd(r1, &(0x7f0000000080)={0x6}, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80000, 0x0) read$char_usb(r2, 0x0, 0x0) [ 2723.546076] hfsplus: umask requires a value 04:58:56 executing program 4: write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000000000000000"], 0x2ab) [ 2723.567642] hfsplus: unable to parse mount options [ 2723.584751] hfsplus: unable to parse mount options 04:58:56 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x10}) 04:58:56 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000000000000000"], 0x2ab) [ 2723.817383] hfsplus: umask requires a value 04:58:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x20000, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x0, 0x0, {0x32, 0x38, 0x11, 0x2, 0x8, 0x8, 0x2, 0xea}}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000000), 0x4) setsockopt$inet6_group_source_req(r1, 0x29, 0x3, &(0x7f00000001c0)={0x8000, {{0xa, 0x4e21, 0x9, @rand_addr="adf0d9aa1ec27747e8598fad7f7b54ae", 0x9}}, {{0xa, 0x4e22, 0x1, @mcast1, 0x8001}}}, 0x108) r4 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r4, 0x0, 0x0) 04:58:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'.mask', 0x3d, 0x8cffffff}}]}) [ 2723.859494] hfsplus: unable to parse mount options 04:58:56 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000000000000000"], 0x2ab) [ 2723.966338] hfsplus: umask requires a value [ 2723.980158] hfsplus: unable to parse mount options 04:58:56 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x22}) [ 2724.070456] hfsplus: unable to parse mount options [ 2724.224607] hfsplus: umask requires a value [ 2724.258871] hfsplus: unable to parse mount options [ 2724.325867] hfsplus: umask requires a value [ 2724.331099] hfsplus: unable to parse mount options 04:58:56 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\abq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:58:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf07015c8d6c70c158bf75f7b9da1e97ca427c0d03ee5a3eb4e8a3bf04abc810e769b2996ba7d70633b79c0eb3effb877ca2ff697efac54f0c8b7129b45164cda9b0f67cc0dca0e79cd0a452adc1e369552f776e02c267147b6a3630ba78ab21b7e2993cb1c14c4eed04fca6f9566cb3ccf4e9e14c0257a1fba000f0203e97f9e729700") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) 04:58:56 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000000000000000"], 0x2ab) 04:58:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'0mask', 0x3d, 0x8cffffff}}]}) 04:58:56 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x2c}) 04:58:57 executing program 4: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000000000000000"], 0x2ab) [ 2724.516274] hfsplus: umask requires a value [ 2724.524399] hfsplus: unable to parse mount options [ 2724.556734] hfsplus: unable to parse mount options [ 2724.625802] hfsplus: umask requires a value [ 2724.637187] hfsplus: unable to parse mount options 04:58:57 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x48}) 04:58:57 executing program 4: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000000000000000"], 0x2ab) 04:58:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'Xmask', 0x3d, 0x8cffffff}}]}) 04:58:57 executing program 4: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000000000000000"], 0x2ab) [ 2724.839877] hfsplus: umask requires a value [ 2724.859915] hfsplus: unable to parse mount options [ 2724.920190] hfsplus: unable to parse mount options [ 2724.925419] hfsplus: umask requires a value [ 2724.943509] hfsplus: unable to parse mount options 04:58:57 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 04:58:57 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x4c}) [ 2725.143316] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2725.168775] hfsplus: umask requires a value [ 2725.192365] hfsplus: unable to parse mount options [ 2725.198668] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2725.222670] CPU: 0 PID: 22759 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2725.229640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2725.239005] Call Trace: [ 2725.241609] dump_stack+0x172/0x1f0 [ 2725.245258] warn_alloc.cold+0x7b/0x173 [ 2725.249243] ? zone_watermark_ok_safe+0x260/0x260 [ 2725.254094] ? lock_downgrade+0x810/0x810 [ 2725.258266] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2725.263817] ? avc_has_perm+0x404/0x610 [ 2725.267809] __vmalloc_node_range+0x486/0x790 [ 2725.272326] ? sel_write_load+0x1de/0x470 [ 2725.285262] vmalloc+0x6b/0x90 [ 2725.288486] ? sel_write_load+0x1de/0x470 [ 2725.292649] sel_write_load+0x1de/0x470 [ 2725.296644] __vfs_write+0x114/0x810 [ 2725.300372] ? sel_make_policy_nodes+0x1520/0x1520 [ 2725.305317] ? kernel_read+0x120/0x120 [ 2725.309224] ? __lock_is_held+0xb6/0x140 [ 2725.313302] ? rcu_read_lock_sched_held+0x110/0x130 [ 2725.318329] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2725.323101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2725.328657] ? __sb_start_write+0x1a9/0x360 [ 2725.332992] vfs_write+0x20c/0x560 [ 2725.336543] ksys_write+0x14f/0x2d0 [ 2725.340185] ? __ia32_sys_read+0xb0/0xb0 [ 2725.344260] ? do_syscall_64+0x26/0x620 [ 2725.348255] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2725.353634] ? do_syscall_64+0x26/0x620 [ 2725.357710] __x64_sys_write+0x73/0xb0 [ 2725.361615] do_syscall_64+0xfd/0x620 [ 2725.365438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2725.370684] RIP: 0033:0x4598e9 [ 2725.373904] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2725.392818] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2725.400803] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2725.408083] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 2725.415369] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2725.422647] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2725.429936] R13: 00000000004c9b57 R14: 00000000004e12c8 R15: 00000000ffffffff 04:58:58 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\t\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2725.479259] Mem-Info: [ 2725.483119] hfsplus: umask requires a value [ 2725.487647] active_anon:121865 inactive_anon:192 isolated_anon:0 [ 2725.487647] active_file:5198 inactive_file:12594 isolated_file:0 [ 2725.487647] unevictable:0 dirty:179 writeback:0 unstable:0 [ 2725.487647] slab_reclaimable:21571 slab_unreclaimable:428464 [ 2725.487647] mapped:59550 shmem:245 pagetables:5250 bounce:0 [ 2725.487647] free:930041 free_pcp:393 free_cma:0 [ 2725.524529] hfsplus: unable to parse mount options 04:58:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_DBG_G_CHIP_INFO(0xffffffffffffffff, 0xc0c85666, &(0x7f0000000000)={{0x0, @addr=0x13f3}, "c446e5b672a3cfc1167c362200038d0006f7fa56e8929b8322ab2a707ce5b0db", 0x3}) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video2\x00', 0x2, 0x0) read$char_usb(r1, 0x0, 0x0) 04:58:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'cmask', 0x3d, 0x8cffffff}}]}) 04:58:58 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x60}) [ 2725.599464] Node 0 active_anon:463600kB inactive_anon:768kB active_file:20412kB inactive_file:28296kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238200kB dirty:688kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2725.699544] hfsplus: unable to parse mount options [ 2725.709541] Node 1 active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:16kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2725.775122] Node 0 DMA free:11072kB min:220kB low:272kB high:324kB active_anon:2052kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2725.804464] hfsplus: umask requires a value [ 2725.810239] hfsplus: unable to parse mount options [ 2725.853532] lowmem_reserve[]: 0 2555 2557 2557 [ 2725.866734] hfsplus: umask requires a value [ 2725.871486] hfsplus: unable to parse mount options [ 2725.906283] Node 0 DMA32 free:57224kB min:36248kB low:45308kB high:54368kB active_anon:461648kB inactive_anon:768kB active_file:20412kB inactive_file:28284kB unevictable:0kB writepending:688kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10336kB pagetables:16252kB bounce:0kB free_pcp:1592kB local_pcp:760kB free_cma:0kB [ 2725.949209] lowmem_reserve[]: 0 0 2 2 04:58:58 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x68}) 04:58:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'dmask', 0x3d, 0x8cffffff}}]}) [ 2725.958660] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2726.056798] hfsplus: umask requires a value [ 2726.075672] lowmem_reserve[]: 0 0 0 0 [ 2726.080599] Node 1 Normal free:3650924kB min:53608kB low:67008kB high:80408kB active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB writepending:16kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2464kB pagetables:4884kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2726.080949] hfsplus: unable to parse mount options [ 2726.149313] lowmem_reserve[]: 0 0 0 0 [ 2726.153310] Node 0 DMA: 14*4kB (UME) 113*8kB (UME) 60*16kB (UME) 28*32kB (UM) 5*64kB (UM) 4*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 11072kB [ 2726.184464] hfsplus: unable to parse mount options [ 2726.184883] Node 0 DMA32: 4602*4kB (UMEH) 796*8kB (UMEH) 532*16kB (UMEH) 373*32kB (UMH) 189*64kB (UME) 4*128kB (M) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 57832kB [ 2726.214604] hfsplus: umask requires a value [ 2726.226084] hfsplus: unable to parse mount options [ 2726.233732] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2726.258659] Node 1 Normal: 677*4kB (UME) 3421*8kB (UME) 2549*16kB (UME) 1199*32kB (UME) 515*64kB (UME) 168*128kB (UME) 32*256kB (UME) 15*512kB (UM) 10*1024kB (UM) 2*2048kB (UE) 844*4096kB (UM) = 3650924kB [ 2726.296871] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 04:58:58 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x6c}) [ 2726.308642] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2726.337831] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 04:58:58 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='vhci\x00', 0x40) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x901, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000140)={0x0, 0x100000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000180)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000001c0)={r2, r6}) 04:58:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'imask', 0x3d, 0x8cffffff}}]}) [ 2726.365901] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2726.404110] 18042 total pagecache pages 04:58:58 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\n\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2726.453327] 0 pages in swap cache [ 2726.473426] Swap cache stats: add 0, delete 0, find 0/0 [ 2726.507626] hfsplus: umask requires a value [ 2726.515848] Free swap = 0kB [ 2726.524704] hfsplus: unable to parse mount options [ 2726.548687] Total swap = 0kB [ 2726.563878] 1965979 pages RAM [ 2726.572438] 0 pages HighMem/MovableOnly [ 2726.586836] hfsplus: umask requires a value [ 2726.588113] 338856 pages reserved 04:58:59 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 04:58:59 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r2, r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r5, r6) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r11, r12) r13 = getegid() stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x7, &(0x7f0000000200)=[r3, r6, r9, r12, r13, r14, r15]) 04:58:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000000)=0x9, 0x4) r3 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) read$char_usb(r3, 0x0, 0x0) [ 2726.599587] hfsplus: unable to parse mount options [ 2726.601832] 0 pages cma reserved 04:58:59 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x74}) 04:58:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'lmask', 0x3d, 0x8cffffff}}]}) [ 2726.735258] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2726.757371] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2726.763530] CPU: 0 PID: 23300 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2726.770481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2726.779933] Call Trace: [ 2726.779957] dump_stack+0x172/0x1f0 [ 2726.779977] warn_alloc.cold+0x7b/0x173 [ 2726.779992] ? zone_watermark_ok_safe+0x260/0x260 [ 2726.780007] ? lock_downgrade+0x810/0x810 [ 2726.780034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2726.780056] ? avc_has_perm+0x404/0x610 [ 2726.780083] __vmalloc_node_range+0x486/0x790 [ 2726.813227] ? sel_write_load+0x1de/0x470 [ 2726.817388] vmalloc+0x6b/0x90 [ 2726.820590] ? sel_write_load+0x1de/0x470 [ 2726.824750] sel_write_load+0x1de/0x470 [ 2726.828739] __vfs_write+0x114/0x810 [ 2726.832477] ? sel_make_policy_nodes+0x1520/0x1520 [ 2726.837417] ? kernel_read+0x120/0x120 [ 2726.841319] ? __lock_is_held+0xb6/0x140 [ 2726.845402] ? rcu_read_lock_sched_held+0x110/0x130 [ 2726.850426] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2726.855185] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2726.860729] ? __sb_start_write+0x1a9/0x360 [ 2726.865060] vfs_write+0x20c/0x560 [ 2726.868614] ksys_write+0x14f/0x2d0 [ 2726.872258] ? __ia32_sys_read+0xb0/0xb0 [ 2726.876332] ? do_syscall_64+0x26/0x620 [ 2726.880341] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2726.885715] ? do_syscall_64+0x26/0x620 [ 2726.889706] __x64_sys_write+0x73/0xb0 [ 2726.893606] do_syscall_64+0xfd/0x620 [ 2726.897418] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2726.902616] RIP: 0033:0x4598e9 [ 2726.905815] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2726.924731] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 04:58:59 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001780)='/dev/vsock\x00', 0x22622, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f00000000c0)={0x0, 0x80000001, 0x1003}) [ 2726.932459] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2726.939736] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 2726.947008] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2726.954292] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2726.961571] R13: 00000000004c9b57 R14: 00000000004e12c8 R15: 00000000ffffffff [ 2726.974229] Mem-Info: [ 2726.978777] hfsplus: umask requires a value [ 2726.984156] active_anon:121899 inactive_anon:192 isolated_anon:0 [ 2726.984156] active_file:5198 inactive_file:12610 isolated_file:0 [ 2726.984156] unevictable:0 dirty:180 writeback:0 unstable:0 [ 2726.984156] slab_reclaimable:21558 slab_unreclaimable:428942 [ 2726.984156] mapped:59550 shmem:245 pagetables:5270 bounce:0 [ 2726.984156] free:929224 free_pcp:689 free_cma:0 [ 2727.020457] hfsplus: unable to parse mount options [ 2727.033487] Node 0 active_anon:463620kB inactive_anon:768kB active_file:20412kB inactive_file:28332kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238200kB dirty:704kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2727.065870] Node 1 active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:16kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2727.097397] Node 0 DMA free:11072kB min:220kB low:272kB high:324kB active_anon:2052kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 04:58:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$char_usb(r3, 0x0, 0xfffffffffffffffb) [ 2727.157894] hfsplus: umask requires a value [ 2727.170456] hfsplus: unable to parse mount options [ 2727.193903] hfsplus: unable to parse mount options [ 2727.207397] Unknown ioctl -1070574078 [ 2727.234477] lowmem_reserve[]: 0 2555 2557 2557 [ 2727.248632] Node 0 DMA32 free:54064kB min:36248kB low:45308kB high:54368kB active_anon:462168kB inactive_anon:768kB active_file:20412kB inactive_file:28320kB unevictable:0kB writepending:704kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10400kB pagetables:16488kB bounce:0kB free_pcp:2884kB local_pcp:1484kB free_cma:0kB [ 2727.286412] lowmem_reserve[]: 0 0 2 2 [ 2727.302668] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 04:58:59 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x7a}) [ 2727.336618] lowmem_reserve[]: 0 0 0 0 [ 2727.342141] Node 1 Normal free:3650924kB min:53608kB low:67008kB high:80408kB active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB writepending:16kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2464kB pagetables:4884kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2727.372198] lowmem_reserve[]: 0 0 0 0 04:58:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'omask', 0x3d, 0x8cffffff}}]}) 04:58:59 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) dup3(r0, r0, 0x80000) [ 2727.404675] Node 0 DMA: 14*4kB (UME) 113*8kB (UME) 60*16kB (UME) 28*32kB (UM) 5*64kB (UM) 4*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 11072kB 04:58:59 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\a\x00\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2727.458463] Node 0 DMA32: 4476*4kB (UMEH) 550*8kB (UMEH) 529*16kB (UMEH) 388*32kB [ 2727.477168] (UMH) 04:59:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1}}, 0x8000) accept4$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0}, &(0x7f0000000240)=0x14, 0x100000) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r5, &(0x7f0000000180), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8e52, 0x0, 0x0, 0x0, 0x3ff}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0x6d}, @alu={0x7, 0xd, 0xe, 0x0, 0x4, 0x20, 0xc}, @map={0x18, 0x2, 0x1, 0x0, r1}]}, &(0x7f0000000100)='syzkaller\x00', 0xba0, 0x67, &(0x7f0000000180)=""/103, 0x40f00, 0x4, [], r4, 0x11, r5, 0x8, &(0x7f0000000280)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xd, 0x3, 0xfff}, 0x10}, 0x70) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r7 = openat$vhci(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhci\x00', 0x500) setsockopt$IP_VS_SO_SET_EDITDEST(r5, 0x0, 0x489, &(0x7f0000000740)={{0x2c, @rand_addr=0x100000001, 0x4e24, 0x0, 'dh\x00', 0x28, 0x4, 0x61}, {@multicast2, 0x4e21, 0x2005, 0x9, 0x100000001, 0x20}}, 0x44) splice(r6, &(0x7f0000000380), r7, &(0x7f0000000400), 0x3f, 0x3) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r5, 0xc02c564a, &(0x7f0000000440)={0xa0, 0x34565559, 0x484f647ba9833ca7, @discrete={0x17, 0x400000000}}) [ 2727.527532] 192*64kB (UME) 4*128kB (M) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 55984kB [ 2727.538121] hfsplus: umask requires a value [ 2727.556600] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2727.558197] hfsplus: unable to parse mount options [ 2727.586996] Node 1 Normal: 677*4kB (UME) 3421*8kB (UME) 2549*16kB (UME) 1199*32kB (UME) 515*64kB (UME) 168*128kB (UME) 32*256kB (UME) 15*512kB (UM) 10*1024kB (UM) 2*2048kB (UE) 844*4096kB (UM) = 3650924kB [ 2727.617320] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2727.637802] hfsplus: umask requires a value [ 2727.643026] hfsplus: unable to parse mount options [ 2727.663517] hfsplus: unable to parse mount options [ 2727.679452] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2727.729143] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2727.762802] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2727.784595] 18061 total pagecache pages [ 2727.797688] 0 pages in swap cache [ 2727.803624] Swap cache stats: add 0, delete 0, find 0/0 [ 2727.810238] Free swap = 0kB [ 2727.814357] Total swap = 0kB [ 2727.818661] 1965979 pages RAM [ 2727.822984] 0 pages HighMem/MovableOnly [ 2727.828877] 338856 pages reserved [ 2727.836057] 0 pages cma reserved 04:59:00 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 04:59:00 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000100)={0x8, @sdr={0x513addf7, 0xfffffffffffffc00}}) ioctl$TCGETS2(r3, 0x802c542a, &(0x7f00000000c0)) syz_open_pts(r3, 0x6b7c55b7edb0df31) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:00 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x300}) 04:59:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4400) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000080)) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) rt_sigpending(&(0x7f0000000000), 0x8) read$char_usb(r2, 0x0, 0x0) 04:59:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'pmask', 0x3d, 0x8cffffff}}]}) [ 2727.935719] hfsplus: umask requires a value [ 2727.951194] hfsplus: unable to parse mount options [ 2727.994318] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2728.005704] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2728.022253] hfsplus: umask requires a value [ 2728.028181] hfsplus: unable to parse mount options [ 2728.041233] CPU: 0 PID: 24144 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2728.048185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2728.057543] Call Trace: [ 2728.060142] dump_stack+0x172/0x1f0 [ 2728.063784] warn_alloc.cold+0x7b/0x173 [ 2728.067779] ? zone_watermark_ok_safe+0x260/0x260 [ 2728.072637] ? lock_downgrade+0x810/0x810 [ 2728.076810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2728.082356] ? avc_has_perm+0x404/0x610 [ 2728.086348] __vmalloc_node_range+0x486/0x790 [ 2728.090863] ? sel_write_load+0x1de/0x470 [ 2728.095020] vmalloc+0x6b/0x90 [ 2728.098221] ? sel_write_load+0x1de/0x470 [ 2728.102379] sel_write_load+0x1de/0x470 [ 2728.106366] __vfs_write+0x114/0x810 [ 2728.110091] ? sel_make_policy_nodes+0x1520/0x1520 [ 2728.115028] ? kernel_read+0x120/0x120 [ 2728.118928] ? __lock_is_held+0xb6/0x140 [ 2728.123005] ? rcu_read_lock_sched_held+0x110/0x130 [ 2728.128027] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2728.132798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2728.138344] ? __sb_start_write+0x1a9/0x360 [ 2728.142681] vfs_write+0x20c/0x560 [ 2728.146237] ksys_write+0x14f/0x2d0 [ 2728.149877] ? __ia32_sys_read+0xb0/0xb0 [ 2728.153948] ? do_syscall_64+0x26/0x620 [ 2728.157927] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2728.163297] ? do_syscall_64+0x26/0x620 [ 2728.167284] __x64_sys_write+0x73/0xb0 [ 2728.171181] do_syscall_64+0xfd/0x620 [ 2728.174997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2728.180191] RIP: 0033:0x4598e9 [ 2728.183388] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2728.202312] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2728.210037] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2728.217309] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 2728.224581] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2728.231857] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 04:59:00 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2728.239133] R13: 00000000004c9b57 R14: 00000000004e12c8 R15: 00000000ffffffff [ 2728.251606] Mem-Info: [ 2728.254951] active_anon:121948 inactive_anon:192 isolated_anon:0 [ 2728.254951] active_file:5198 inactive_file:12620 isolated_file:0 [ 2728.254951] unevictable:0 dirty:180 writeback:0 unstable:0 [ 2728.254951] slab_reclaimable:21561 slab_unreclaimable:428573 [ 2728.254951] mapped:59550 shmem:245 pagetables:5311 bounce:0 [ 2728.254951] free:929592 free_pcp:606 free_cma:0 04:59:00 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x500}) [ 2728.311942] hfsplus: unable to parse mount options [ 2728.355693] Node 0 active_anon:463816kB inactive_anon:768kB active_file:20412kB inactive_file:28372kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238200kB dirty:704kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2728.386541] Node 1 active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:16kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2728.420495] Node 0 DMA free:11072kB min:220kB low:272kB high:324kB active_anon:2052kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2728.469176] protocol 88fb is buggy, dev hsr_slave_0 [ 2728.474347] protocol 88fb is buggy, dev hsr_slave_1 [ 2728.479537] protocol 88fb is buggy, dev hsr_slave_0 [ 2728.484631] protocol 88fb is buggy, dev hsr_slave_1 04:59:01 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x02\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2728.525531] hfsplus: umask requires a value [ 2728.531591] hfsplus: unable to parse mount options [ 2728.540149] lowmem_reserve[]: 0 2555 2557 2557 [ 2728.546570] Node 0 DMA32 free:54800kB min:36248kB low:45308kB high:54368kB active_anon:462064kB inactive_anon:768kB active_file:20412kB inactive_file:28360kB unevictable:0kB writepending:704kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10400kB pagetables:16356kB bounce:0kB free_pcp:2508kB local_pcp:1268kB free_cma:0kB 04:59:01 executing program 2: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xb41, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r0, 0x1) recvfrom$inet6(r0, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r0) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000080)=""/178, 0xb2}, {&(0x7f0000000140)=""/48, 0xfffffffffffffffd}, {&(0x7f0000000180)=""/67, 0x43}, {&(0x7f0000000200)=""/86, 0x3b9}, {&(0x7f0000000300)=""/74, 0x2a}, {&(0x7f0000000300)}, {&(0x7f0000000500)=""/52, 0x34}, {&(0x7f0000000380)=""/232, 0xe8}], 0x8, 0x2) [ 2728.610306] lowmem_reserve[]: 0 0 2 2 [ 2728.625096] hfsplus: umask requires a value [ 2728.639906] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 04:59:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'smask', 0x3d, 0x8cffffff}}]}) [ 2728.683517] hfsplus: unable to parse mount options [ 2728.699163] lowmem_reserve[]: 0 0 0 0 [ 2728.705043] Node 1 Normal free:3650924kB min:53608kB low:67008kB high:80408kB active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB writepending:16kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2464kB pagetables:4884kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2728.737269] lowmem_reserve[]: 0 0 0 0 04:59:01 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x600}) [ 2728.750019] Node 0 DMA: 14*4kB (UME) 114*8kB (UME) 60*16kB [ 2728.785681] (UME) 28*32kB (UM) 5*64kB (UM) 4*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 11080kB 04:59:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f00000000c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast}) r2 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r2, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2728.836281] Node 0 DMA32: 4407*4kB (UMEH) 752*8kB (UMEH) 462*16kB (UMEH) 395*32kB (UMH) 193*64kB (UME) 4*128kB (M) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 56540kB [ 2728.860478] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2728.873828] Node 1 Normal: 677*4kB (UME) 3421*8kB (UME) 2549*16kB (UME) 1199*32kB (UME) 515*64kB (UME) 168*128kB (UME) 32*256kB (UME) 15*512kB (UM) 10*1024kB (UM) 2*2048kB (UE) 844*4096kB (UM) = 3650924kB [ 2728.894686] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2728.904685] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2728.914070] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2728.925638] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2728.946889] 18072 total pagecache pages [ 2728.958240] 0 pages in swap cache [ 2728.962327] Swap cache stats: add 0, delete 0, find 0/0 [ 2728.968351] Free swap = 0kB [ 2728.972029] Total swap = 0kB [ 2728.975463] 1965979 pages RAM [ 2728.980005] 0 pages HighMem/MovableOnly [ 2728.983502] hfsplus: unable to parse mount options [ 2728.986171] 338856 pages reserved 04:59:01 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x0) 04:59:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000000c0)) listen(r0, 0x0) r2 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f0000000000)={0x13d0b9a58c8a3d0f, @null, @rose={'rose', 0x0}, 0x3f, 'syz0\x00', @null, 0x9, 0x1, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r4 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r4, 0x0, 0x0) [ 2728.994637] 0 pages cma reserved [ 2729.037994] hfsplus: umask requires a value [ 2729.066103] hfsplus: unable to parse mount options [ 2729.091125] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2729.102446] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2729.117930] hfsplus: umask requires a value 04:59:01 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x10, 0x500000) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x0, 0x8400) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8102001}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xe0, r2, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x11, 0x3}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x29}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xb448}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xa4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffffc}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9f6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x11d}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x719}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7ff}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4840}, 0x4) [ 2729.136638] hfsplus: unable to parse mount options [ 2729.144464] CPU: 0 PID: 24768 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2729.152121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2729.161486] Call Trace: [ 2729.164097] dump_stack+0x172/0x1f0 [ 2729.167753] warn_alloc.cold+0x7b/0x173 [ 2729.171752] ? zone_watermark_ok_safe+0x260/0x260 [ 2729.176622] ? lock_downgrade+0x810/0x810 [ 2729.180891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2729.186440] ? avc_has_perm+0x404/0x610 [ 2729.190437] __vmalloc_node_range+0x486/0x790 [ 2729.194952] ? sel_write_load+0x1de/0x470 [ 2729.199112] vmalloc+0x6b/0x90 [ 2729.202311] ? sel_write_load+0x1de/0x470 [ 2729.206469] sel_write_load+0x1de/0x470 [ 2729.210459] __vfs_write+0x114/0x810 [ 2729.214183] ? sel_make_policy_nodes+0x1520/0x1520 [ 2729.219118] ? kernel_read+0x120/0x120 [ 2729.223028] ? __lock_is_held+0xb6/0x140 [ 2729.227109] ? rcu_read_lock_sched_held+0x110/0x130 [ 2729.232139] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2729.236906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2729.242450] ? __sb_start_write+0x1a9/0x360 [ 2729.246786] vfs_write+0x20c/0x560 [ 2729.250348] ksys_write+0x14f/0x2d0 [ 2729.253983] ? __ia32_sys_read+0xb0/0xb0 [ 2729.258054] ? do_syscall_64+0x26/0x620 [ 2729.262039] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2729.267406] ? do_syscall_64+0x26/0x620 [ 2729.271397] __x64_sys_write+0x73/0xb0 [ 2729.275295] do_syscall_64+0xfd/0x620 [ 2729.279105] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2729.284302] RIP: 0033:0x4598e9 [ 2729.287518] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2729.306522] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2729.314248] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2729.321536] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2729.328807] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:59:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'xmask', 0x3d, 0x8cffffff}}]}) [ 2729.336082] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2729.343368] R13: 00000000004c9b57 R14: 00000000004e12c8 R15: 00000000ffffffff [ 2729.365652] Mem-Info: [ 2729.370255] active_anon:121903 inactive_anon:192 isolated_anon:0 [ 2729.370255] active_file:5198 inactive_file:12631 isolated_file:0 [ 2729.370255] unevictable:0 dirty:180 writeback:0 unstable:0 [ 2729.370255] slab_reclaimable:21537 slab_unreclaimable:429000 [ 2729.370255] mapped:59550 shmem:245 pagetables:5274 bounce:0 [ 2729.370255] free:929306 free_pcp:565 free_cma:0 [ 2729.405878] Node 0 active_anon:463636kB inactive_anon:768kB active_file:20412kB inactive_file:28416kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238200kB dirty:704kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2729.440489] Node 1 active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:16kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 04:59:02 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r0, &(0x7f0000000180), 0x8) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, r0}) ioctl(r1, 0x8, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r2, 0x0, 0x342) 04:59:02 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x700}) 04:59:02 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x03\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2729.609270] Node 0 DMA free:11080kB min:220kB low:272kB high:324kB active_anon:2052kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2729.638863] lowmem_reserve[]: 0 2555 2557 2557 [ 2729.645399] Node 0 DMA32 free:55528kB min:36248kB low:45308kB high:54368kB active_anon:461516kB inactive_anon:768kB active_file:20412kB inactive_file:28444kB unevictable:0kB writepending:704kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10368kB pagetables:16316kB bounce:0kB free_pcp:2120kB local_pcp:1144kB free_cma:0kB [ 2729.684084] hfsplus: unable to parse mount options [ 2729.694733] hfsplus: umask requires a value 04:59:02 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffff) [ 2729.712192] hfsplus: unable to parse mount options [ 2729.713948] lowmem_reserve[]: 0 0 2 2 [ 2729.723257] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2729.761880] lowmem_reserve[]: 0 0 0 0 [ 2729.769828] Node 1 Normal free:3650924kB min:53608kB low:67008kB high:80408kB active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB writepending:16kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2464kB pagetables:4884kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2729.813639] hfsplus: umask requires a value [ 2729.818000] hfsplus: unable to parse mount options [ 2729.831919] lowmem_reserve[]: 0 0 0 0 [ 2729.836457] Node 0 DMA: 14*4kB (UME) 114*8kB (UME) 60*16kB (UME) 28*32kB (UM) 5*64kB (UM) 4*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 11080kB 04:59:02 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x900}) [ 2729.856470] Node 0 DMA32: 4344*4kB (UMEH) 763*8kB (UMEH) 420*16kB (UMEH) 393*32kB (UMH) 194*64kB (UME) 4*128kB (M) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 55704kB [ 2729.889430] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2729.920789] Node 1 Normal: 677*4kB (UME) 3421*8kB (UME) 2549*16kB (UME) 1199*32kB (UME) 515*64kB (UME) 168*128kB (UME) 32*256kB (UME) 15*512kB (UM) 10*1024kB (UM) 2*2048kB (UE) 844*4096kB (UM) = 3650924kB [ 2729.943494] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 04:59:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'u\nask', 0x3d, 0x8cffffff}}]}) [ 2729.976698] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2729.989965] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2730.001753] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2730.023042] hfsplus: umask requires a value 04:59:02 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x1) preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/83, 0x53}, {&(0x7f0000000140)=""/192, 0xc0}, {&(0x7f0000000200)=""/201, 0xc9}, {&(0x7f0000000300)=""/175, 0xaf}], 0x4, 0x0) 04:59:02 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x0) [ 2730.050210] 18082 total pagecache pages [ 2730.054308] hfsplus: unable to parse mount options [ 2730.062388] 0 pages in swap cache [ 2730.067487] Swap cache stats: add 0, delete 0, find 0/0 [ 2730.075898] Free swap = 0kB [ 2730.079668] Total swap = 0kB [ 2730.083233] 1965979 pages RAM [ 2730.086872] 0 pages HighMem/MovableOnly [ 2730.092659] 338856 pages reserved [ 2730.096383] 0 pages cma reserved 04:59:02 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xa00}) [ 2730.131830] hfsplus: umask requires a value [ 2730.133612] hfsplus: unable to parse mount options [ 2730.136182] hfsplus: unable to parse mount options 04:59:02 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x903c0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f00000000c0)={{0x3, @name="fa0fffbe2d73fbea6c4e4921486d9a3633aa814cd8de3d2070b3ec35e4f28fa1"}, 0x61, 0xffffffffffffffff, 0xfaa6}) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x48, r2, 0x10, 0x70bd28, 0x25dfdbff, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_PEER_V4={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_PEER_V4={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x29}}, @FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x48}, 0x1, 0x0, 0x0, 0xc060}, 0x4001) [ 2730.248355] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2730.266488] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2730.274761] CPU: 0 PID: 25458 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2730.281721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2730.291085] Call Trace: [ 2730.293692] dump_stack+0x172/0x1f0 [ 2730.297367] warn_alloc.cold+0x7b/0x173 [ 2730.301360] ? zone_watermark_ok_safe+0x260/0x260 [ 2730.306216] ? lock_downgrade+0x810/0x810 [ 2730.310387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2730.315935] ? avc_has_perm+0x404/0x610 [ 2730.319924] __vmalloc_node_range+0x486/0x790 [ 2730.324436] ? sel_write_load+0x1de/0x470 [ 2730.328596] vmalloc+0x6b/0x90 [ 2730.331815] ? sel_write_load+0x1de/0x470 [ 2730.335968] sel_write_load+0x1de/0x470 [ 2730.339953] __vfs_write+0x114/0x810 [ 2730.343673] ? sel_make_policy_nodes+0x1520/0x1520 [ 2730.348615] ? kernel_read+0x120/0x120 [ 2730.352511] ? __lock_is_held+0xb6/0x140 [ 2730.356589] ? rcu_read_lock_sched_held+0x110/0x130 [ 2730.361623] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2730.366385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2730.371932] ? __sb_start_write+0x1a9/0x360 [ 2730.376265] vfs_write+0x20c/0x560 [ 2730.379825] ksys_write+0x14f/0x2d0 [ 2730.383459] ? __ia32_sys_read+0xb0/0xb0 [ 2730.387532] ? do_syscall_64+0x26/0x620 [ 2730.391512] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2730.396889] ? do_syscall_64+0x26/0x620 [ 2730.400925] __x64_sys_write+0x73/0xb0 [ 2730.404824] do_syscall_64+0xfd/0x620 [ 2730.408637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2730.413833] RIP: 0033:0x4598e9 [ 2730.417033] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2730.435965] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 04:59:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'u\"ask', 0x3d, 0x8cffffff}}]}) [ 2730.443687] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2730.450976] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2730.458255] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2730.465536] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2730.472811] R13: 00000000004c9b57 R14: 00000000004e12c8 R15: 00000000ffffffff [ 2730.493068] hfsplus: umask requires a value [ 2730.516038] hfsplus: unable to parse mount options [ 2730.523918] Mem-Info: [ 2730.536751] active_anon:121911 inactive_anon:192 isolated_anon:0 [ 2730.536751] active_file:5198 inactive_file:12641 isolated_file:0 [ 2730.536751] unevictable:0 dirty:180 writeback:0 unstable:0 [ 2730.536751] slab_reclaimable:21537 slab_unreclaimable:428882 [ 2730.536751] mapped:59550 shmem:245 pagetables:5301 bounce:0 04:59:03 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x04\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2730.536751] free:929418 free_pcp:504 free_cma:0 [ 2730.628900] hfsplus: umask requires a value [ 2730.634904] hfsplus: unable to parse mount options [ 2730.643210] Node 0 active_anon:463648kB inactive_anon:768kB active_file:20412kB inactive_file:28504kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238200kB dirty:696kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2730.673049] Node 1 active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:16kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2730.701392] Node 0 DMA free:11080kB min:220kB low:272kB high:324kB active_anon:2052kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 04:59:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r2, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r2) fcntl$getownex(r2, 0x10, &(0x7f0000000000)) 04:59:03 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x400, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r5 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000200)=r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r6, 0x0) r7 = accept(r6, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r7, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r8, 0x0) r9 = accept(r8, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup2(r10, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r12, 0x40505412, &(0x7f0000003d40)={0x3, 0xe6, 0x10000, 0x0, 0x8e02fa4ec9afbe79}) sendmsg$TIPC_CMD_SET_LINK_PRI(r9, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r13 = open(&(0x7f0000003c80)='./file0\x00', 0x200000, 0x2) sendmsg$netlink(r1, &(0x7f0000003d00)={0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f0000000100)={0x1348, 0x41, 0x2, 0x70bd25, 0x25dfdbfb, "", [@typed={0xbc, 0x4a, @binary="04f5a1a523f8e7c0d9fd516136d58582cf316beb59af8551052e1cabe53c8e285219f0c1c86e89296f97c8deece915f75932b0aeb2d84ee5c6107b3ddd95bb8dd283bb844f451cab4f9c0113c7895104dc7103d685ab272a1ab589f65a84776a936b1ce3ffc91661d0028187035c7009339d984372f0d95a33ffab5529d315ae4712d22832194b7acaf214de3213afd9797df87ef0153a767a5b47af2ddd445acb2fdd8045836ccfbdbaba3d6a7405dcb40cbb4e81"}, @generic="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", @generic="a7e936caccfaee7a5f8cd035da0c28589ba0c7523af9230c93a46455238614152d102dacc852f9ef4ab81df3ba9f5c152b458cac66411d1a987e8bc1842a1d1ac45ffbd04f7168ea6d282ba3daa7ad9251bd6e276d6769dc9d59fd8ebb04fd09fe4939ea518c764612a0d288b8482f6bd6d0c1d969aa2cd8de0fecbf663d1c7e3a9674df7165f77678e0c6e67e2193a520a328c35e310cd1063cac63627c13dbaa2c5b05d55bc3084b2d765cf9a39908d4db8f9a245bbf0a582a394a4afc83", @nested={0xf4, 0x38, [@generic="581e7c82d62e2b7ecb81a0eff49ae64708e0f7912c7ee6e333f9ce1d80f81325bc8c204b86ff4cfdebff294ea6731a790f47d39bb5cf4364ded5b09ced2bd469981981f3c9867375246ac3c42106cd5f97ee0e4cb05cb0c43798a5c963bf903e37f096325fe01bd14a5220df9da2a5cc2ab31932a28e28d9efa5a9e652914553453ec8191d0a6173c48d1ece2cec4ed85f8de4701c50b035a18bf20452ec8335b083938ad524d85296938d9c09947bf84f7e8d32d7cedcd165da52f19a0a8ea4c64e46809ebd3d92087b9e71ab956210b5586910698652677f56ef8dfc27ee6cbeba42d8b4e5684bb43d1d24090a"]}, @typed={0xc, 0x1a, @u64=0x5}, @typed={0x8, 0x33, @pid=r3}, @generic="def0e0d8abec616d54b26bd47bc63f9a26662684f1e78d4dd937e96b08b9805c384e4da64b969d2c8e5f4563b3ee4dbe4de9ae1cf8436e06ed2b127f0279bc768dcae07c4a7095d21eaa6cdc10b529c0731f348224c7859a473801944f5df62380d1f2640142f7ee0793536429f14a1725b4779d5376da0386074250160a64ec2276a79ceaec3932d69b244be8586290e6ec9212259bc25baacb4882b90dd1e93e0cc0e3f08ca1f420e69104874cdb351f2519"]}, 0x1348}, {&(0x7f0000001480)={0x13dc, 0x17, 0x20, 0x70bd27, 0x25dfdbfe, "", [@nested={0x74, 0x1b, [@typed={0x14, 0x91, @ipv6=@empty}, @typed={0x40, 0x58, @binary="d263d25f91bf4d752bb4204d8bb7249ef05426016697cec2ebcc77210a1fe1f6eec88220c471cea71d6519225ae8989f23f161953ecab0e3be12a6c9"}, @typed={0x8, 0x23, @pid}, @typed={0x14, 0x91, @ipv6=@remote}]}, @generic="ad116ed676250c91d4e910eabb449c5927cfe8fcd90c884350a7eedb0288e31adb6f2ae84dde008c9f2eebc7276135e651a2ac910ae92e9066c0eb5a34351da920c4f1855bb16d779d4a50efecbe1da1c65b5ade1d4cd8b36862220e8f4880aa84d4", @typed={0x8, 0x95, @u32}, @nested={0x2e0, 0x5, [@typed={0x4, 0x84}, @generic="e2625953437090df0caa63d1c87a5aae4abc3064c94995693eaa039a43ae26dea9e3bc62ca5131e02763193fa84eac2bc3ac02bd98a04ac7cafcf8a8b124108833125b2e09ee4604165864688843b68d0a83c750b949e5aef90e9d089863763e09ef86b11c24c3d84245afec42e7c0bca379f4739d21c7ef89aa6df1b0fadaea708a2a4294", @generic="ee3cdd008d6d97c5387e78e0ce6e238d3a007ad45d47603baf2423b51a9daf4940606011769ab737760b36a447839a8334f7ed422e37778ed6c973d9a8f38206583cbc35f4619e998a1d4dcaac634be88142a6cb74ef6a821f4472d83750bba0df06f9e6035a68a5da7d95ed29c5fa8984e4f43765a2770b6f523ce5d16bd82f67b5c71cbb7d1205c8327964b730920787a8944f0afb50f5d295a489c75a3081fc50d09e5d9e59f1272b9dca33b3903ea10a53a5e19d6f93bdc7334e99cdc070e0c745bdd8a74515c99f3702eceee0fef14e3330cf2ac49726ec9d", @generic="0bb1c28b58fa1f22c226b2c2bc667ae8e397b11531b6646a41bf98e04c5745fdb2863cffd62112fe85920e0f7b7e69966496aab028a978af78b7a72e6c4062ee33945be21de0ee7fa149d34f481517b0dc79f9241f73b73f3a8df01d3630ff5ca499f6a1d659e94b7224fcf8937fb049563018c613325a01f272829a07080f49bc73b76a3e7fd7fc32ba2a0e2075601a6a970f09ef46c403e607d4c645bc4f5eab4b2b3176ff219433decb5aad711aee15f9f3583a23ce28f4b05019226522d4d15963e287b19ce2aeb857f4a334d14805b4551acd8fbfca764236b75e3e44eb44103196", @generic="59b95da6b14f870114bdd8e487a8bf49d62d277823f2", @generic="ceeca85520fcaa29d80e5357516710504e495cc5269ba945016b096f2487b8acc90afacb55d9041196056b9a9ee4f890c57c8335a888462387b8a4693d846cb09a7bee0e19b0ed2e3c833b6f7f2689479c2ca3f9eab64364beaa3959016439da881ebea910625a77fcde06e590d351c64b2d4463938753c436e3af263b"]}, @generic="25446cf6c7a1a0f2c62bf1fb7ad57732d6f773323f9bc63837e2df4dc43a130f63abf86f1b65e17b3a5d130b6a8d3fe9e2e0431873a436992209a73f3455659df56e35af8d2f856cc27ecd9de3cec96ebc539b09adfca00765cefdcacddb848ce8e5bb4f01d1ea287051c0cca488033e74c9f426cddea98e6528b0e39620f2da43248daba3643c5cdbf55af187aaaa058556953da52bf7fb1faba4f8e018c140d24a9a2c64833902362897a73a583a48ea6a154e71377773a453cd9fe938b1b800a544c8f2802f8b385058dc6b29734dae8cc9223fe8dab1c6626fd8353a0b95f95eb8fbf40ad9068a706cf5c07b4d1c713a34ef5f75cd9c3794bf523cd6d1034d882d1b85a586d85645f22aa4a4bee247cff594a03f5018a96d595e3bdcc4aac732d991122d1b67810b312762dbeaef895dcf18e3d3a41c082b7a493b6ae9e382d88119725df0a8bd1e023bbee59fbbcd0d3449e2e83078df4419d5a6f21786e173bdda8985f8d3c290dc1d402df6ef24f7efaa95c5d4d13045170588f3e7af8a9ffa6a25ef72dc6c31825d54b00f08d3367dc8ce718d300d2c0e7c57aa7e7c5ee8381cee420ea5b377a0482db161c7f5286468bc244eb0456ddff5e67f437f591c008d55879130d14a051c27eb4c6e91e42ded873c575cb3b0744b56dea7413957e2ea1eea12b3c01ab9c13f468b59de5524df979e4fda7294e0917c792716276c058ac9648663a1a32f5e3634669680d0bdd5a3cbc80d91fbae30af1154585d36de0e458d6e8c9be5dcd985c52461d76a2cc3475692d912ba65328c9cb5730d4707e07a3d4ba1fb0f100b1d8d313411c63c14a1c521268c6d453d623c95c4003904fcea82dbf7a3d03f93ab1e24ee7d55a6fd7650bd30b5a1dea158533d5a9a1c670a0f76410f2e43508292c8ddca8fcdb86e0f5b8895e61471b7b3ba4e047609e60bf754de4fafdac9f24b20183bcffaf2e6198f497473b1416d23b23e49acb0776639a64cbe02063a837eeabeb7484d42ce6cff15f758812d9b3c19c590921e90d051c39833520da1fcf501e32c98cf94881515e5315f651299da01865da479828963d1a18602093c1beab7c212813cba77c141d82bb76e421896e7ed673cc598b055d357005eead71a5a225f03e527581df71f3e34ee0bbd1213905a1dc0906621cd205d1c4a7fb026aedab927ae4237675547da8235ba614de1ee917fbc3ee2c2ba279e776b7e98eae2201edc94f6cea43b3a9a8564fd2e7b706fc9ec2056e6b92b92b73f3ce6c9417c4342c6b869344addb4934a3ba88c8cec7cac60a211e72bcbff0446b3e84f309c53761b12ab52c8f427ccbd94c9b070e563a6faaf8dd47c6c11620c0450cf829a1aa163409b5b0c2b0d787c03190cc2776699485743b868bddedb8229dbdf824c4b2199c710e65f42def4a65f618af9a6747e4215d0ec83ca24bb99a8ffad404b3bc97c8508e13eadb182e6f4e1ff229b2d371b2e81ca0ffe5371a976bc8a6903e3567e4b69b21fedad2f0ab1d3352ef80164985bc711760809d3ff4ea8ccfd589fea3973e46ffdbf1dfad0b12b102d9fd6f1e094b4cc01ccdcaa7b26641898824885124f7a13858e83352f731aae47fb37797b1373051331a9c7366a41d6b34194d0a0564d1a2e10bd6ccafaa11956dd32b7500dbf4aaf8729558e594bb4aa191eb0be27df2689f0ec2690b3f926b26c3218775516a73d4acf1e6f8dd35c5b8e0a51244f558b4acc294217ade2f127d5d8743b7fa7a66b836d1da6bf549b9f8b5530291610b1c8c44574c1969a93933d9a5098a2ae1bddb3202ea4802853d519bfaf4d3c07b7051214982f4aea6cd1f28a84752dfd6f1be5fa7084ed2e657e0c59e57f697150360e144aca2ba457c783c874e89ddb3a03e386e0821853cf2b30dc2dfc67ef4f278ced3b32646142a6ffdffc8eb2f56dd2ce60a4fdd9ed47fbe461e8721d4e2b8d42a40762ea687daf7f70afc1d7e82a6958e583931a4a35096a5a3b5ea26b91fc3370deb6412854ea449cb29030bc6ee84e6dd9b649aac7c731965a65924527a0f661ab8b48bb999598ab9d6dfc09a1e0b18f64920f4be309d38a0fac6d23bbe277e555836cbc4fcdcb57f6727a350eb6dc83697efe77236e6b189e2ca5b4f1842016b7584e4ce1881b37b5d33bfd3b7cc7c98c27aae6cb2fe6b3b66343f57610057fddc26d31993938c0b95fdb1183231775209c7f1a6c07eb93eec511880a9a285d77739df9f1dde4a6a23dc322d90e15ea9674a60b26a413a5613bf9843a7ce2d72c3fe3a24c76a0ae1e42cd54731a4b4786e43112a28ee1c85b829794341b83504799ded90fe2281b7d16f4e75e2ae1b34e7d1e75d28093d5effb2b8908171688f035664f792d0acef39626b4e2990506702d5e0e26ad892fd526759fb92d06493d8be25ad7669e2276ee195e46f37ca1ddd1f061531bde1ebdede7108e2f63e6bfd8acbe92de404d06221f7236ed8c3e1cc0c5427091629cf84dbf95631e73484e631f18ce00a02269acecef6379ad76a411a403f6fba7cbf5dcb261872c69ee593f20d0983762fe2a0b7aea32c1df24ee6b96ca8d284389e409b4665b4f4c598dcd7f714142df60ce6e6cb8f48d07460337c839987c3214cfb84d74ea9e5389ac2d0f399e633e633d04ea1562ee9d107bad683777663650fc5b4a8459862ee477d1ce9ee39419663e887f06af1a15f3d434c844571b3c0e9be787451e6c3e2c7e7921753c564908be8cd7658deb9df70a0888367ba90a38cb5b8676db6e864139d48fa0b4258c86be881be372888eaa4617782955bcc88695943d45ec88978403c73a6d11d38b8ddf94d5127ae715e77ad923e2c7fd397baca98eb06f6a5e6bf45de8192cb42d142d29092e7db28c4dff970de7e0ff97fb87fcf1138f5adb5901edcc3d988fa64439f2e5534238bbce80698a04d96cc271ab982f35cdaaa635a75a27e59758803afc5f3ec31d38d3b6d88c45a2e0ad5a7e8d74225e3d14a4bf9e5283a9c1b3b4e7e80ab689f1b267e0b15613da698517f4c781f96025676d7bd2e9de0170af27f0afd76ccea770fb4e81f7eb3ba6cf28072b4f1189a1d8788c67722db9213cc1de4b5e0961533357d4a0248548194ffcab44b81112e26fc3c936eeaad5ad1b58297b98aff99027b60d256be6312f96ede808551d50fef5d8d54425f1880c7ed8469d897b9b6fcd3ce501213c0deea5a87b880b1ddd2a9170051de0299c10d1cb2d12d25d704a7571ce98536c0ec6b6e4033aa2c9c35c83fccad8e2f2e54e7e210ee9a15b38070cfcb82bf14f205976ad633121037483a61e7ba62d271de21ab9c994ca0b66235ae8c2f56d9d9876f9f57887bcf4a2e190812219f8a413a380cfc32a796386d8eb8a49d142557aa5687faac39a6c3eb65aa0c01fd227ac12cc834100416b2c22058c5be768b36b29b4390bf9633ec81ef4c9891c00682d7d852ff77597080517a91e7cc330abc5365351919799d3f3ffa7bc0302af5e24ac58b33aaf2ecd730080803f779e25223be36c5484c51c087fbe0c2ddff409cac648fc2b71885ccc6b14e9ac090c6948a4488c742d25cf9908adf9ba5f2397796437ad67075f70abc8c8887a0ea517a4461a099789984939dfd0b6aaa328f42133533ca28c56863b4bea2e43e1500c47a21704b6a226e647c19f90ff80665f60f3e5048df707337d5b988e9954ca0fee1a1c966572227b7ad081c5dd20dd86c94ca40e22a291ea72556ddd81b927df84123a7c56bf1c8df3e0b3458c379e7fee094badb89da9eeae767129212aaad60119d53e2eda2f7638d6c83a34b60f4e4bc4aaee356b38275b00f2aaa11561a248dbd804bc6b98f6461abc69bccf47da6d79eb3b399c4e22c4a566876e5a158ac8a9c34d7abba98ef2db6dfb522855a096d262d31b2cf094c4797b0d8d24cb2faf99ef4f287b8212fea5e3a1511e37c68b856527d7d3368622cc5f829adfe56bb1c960e2f11f1871531b8b92be68b97ac4c09e43842f3891d96195dedc15895a23b7213c45f7a9a7843123bf7269d2d918c57b5da1401dc25515fd859121bd744d069c608d9915e45e0fcc9eab7a7d671fc0e64aa838cf92c5ef414f5e308dec4d8030a749c56b5446f55138b563ab0c2d02344965f81a559500dd6c717e86bed965b7afdfd9a01d715595edd04f51c8b91cd39ed2f9e5959a93bf8b2fa153a7c544ba2276f15fda08ec8214c399ba7446c9aa9c2f36cf1ece31a4053aff25c17fd6f895ffd4088cd91e4627a64082c29c942d044ebc27d5b0f767c8e2bbdcc1ca4a0c6ecd7f6ab8b2b84305298d8df9ad35c9e6c5c084882aa7c3606581cafdfcdfd6f7bf71a62a86c9896384493d09170a7d9b9220ed8c71d39bcb095d8edbb6a82cf3c84a4c4111986dc3bed01f53206bb44dadcd547512991ad0c97fd21b7d6152ef8ac60fb7ca020fb8e5b5b936d985b30368ec09c1ad269746ac509122ad3aca7dd34081097196a6ebf38625ae20a1bcd233a04ba6a030249519066ff3af4507eaeb8cde62163490dcedd7dde7b1be6a45a7e60d1e790ae32e419a5f3fe3d6b23910f57560651b589dac0d271df46953ddc407dcd23076c903ceeb793f878145015b4bc4c2ff8276313cd87f13cbcb83b133a9c2b7034a486851511684db71d25cde7d3260ac79329b7ef1092786743941d905a6c6b9a463e41b8b30d6d4853986515db6caa2e610802fac5b3776e81a10930e946ad0ed50f7be9ad305b3da57f8563cafdf67dfceeef35efe24ae187c481fb8de10ba8da5fae78900cfed0fbbdcc830e0521bf63a6bef00455da1e3892ac2c14d32842985a997ca206a003967a523815e5ddc39b856af65cb56e24c7e4fad0cd25b6a077582017ce0486641dd01cadc47d0d7c4f097feecdf88b92aa2a82b094f337813b922feaa4c2bed4d1ef7debdca6b2d45a88ea8bf017fffc9205b71e0883a4fa76bb6ce3af9759d24109da2305c22c882ae7f6679f8a742bbcaabf976a159c2dcefe7afc3965879837a638bd3c6340c983818b8a319cfa0ae0fa555c413ccf36b05613cd199cf6c4097af3339e0afb23bb9277ed50076a07e2168bd207c85fb47ec4b80546eda0d6f7e1ae49c9b6d891714f737405d709ae1dfa5b47e1160d7cea7b1a9cf20c86eba8749c78a7191c9fd92cf877482ad05b7f5819c4db80af9de56a0ecb9fd413c77da489b68ecd3fc0d8d0af3d5d438747dd5fac6100dd0307704c1b43e4181fe0f3f4699f94ee3f4d7ca335321d001b41b8f8bcf1f525a6af294b916d1085cea0b1a2d6f3bc0193688cc9ed7b7e125b0a15187e3e87e7892c58c55de39e1afbac947f49bf3e9fad1f6925e3df3e81a1659f7443deed6fc52ec17c886d66da7ec49a6b538d8d9b78d53b9dcbf8daa4817e3c9224998f2403fefc679b218e2fca653e7209aca2479e84b08b26f64ef8d38bf1d5cb7100c10257c3e8712f81587f7e6807db481e37b0772792923ff683aa59120b1c3a6539eb8d17f66484ec439e16c3dbe23e7debed9096926a3b3f7a63da8fc614e6e512b362ce2ad5ab74b56323e3e47df53175bf10a5f864c48f1742a57876e572fd3bcc04c054ba4c7db8812cc752c3675f074afff65f820b262ef9a7b575ffe780909709ad1b2bc53f1be1170f757bcaf716d51a55d84b95b2fa93f7335dcefbd6e4443bc326369f722e25f1847750842455ab14a1c3cbba990c4fb3818f4006d4f5301467994db1e3b4e5cf45ac22185bfadc0438316b5665f26d28ef2d2be870c", @typed={0xc, 0x7e, @u64=0x7ae}]}, 0x13dc}, {&(0x7f0000002880)={0x1d0, 0x15, 0x10, 0x70bd2d, 0x25dfdbfd, "", [@typed={0x8, 0x1a, @u32=0x1}, @typed={0x10, 0x55, @str='/dev/video#\x00'}, @nested={0xd4, 0x11, [@generic="36f0e93809611e65e7f111938236b4d129df6ba5f83c8363e7d558309b2e1d0367ef5361835a2eebd554a7fb685bd813a3de55dfdbbb22ffe3a8726b0af29d5cd3d5443d8c01377569f2712aaa48d5c84256b00fc8417bd1aa21c41eea7009", @typed={0x8, 0x1c, @pid=r5}, @typed={0xc, 0x29, @u64=0xffff}, @generic="0de71c277164a3c090793e763a35ad0d5b762aca8eb1182daea1a35103499e6e87f145ed6bd250248ba9a9d8dd73790ec3166815f9cf766fd29c5bab0c77fc089c3c330adf06df196ed2610f5bd346ebb7e73efee7b0264e9a2d8f"]}, @nested={0xd4, 0x34, [@typed={0x8, 0x42, @fd}, @generic="66ed21826318e98b2322728b261ed9ed069bc64804ba1731841eac55c8b107f8cbb24defd3f41c281609d5e619a9767eac3c8ad1118fccd269e0270c70f8a43029499c270879bb0e4d368112b18e9f7fe8ffef39e2e8c6012da349cb5bf8d82528f376286f46b2230ba31bef5b0421a9f5e35af632f24f5cbb259b024a9cce4041980f96a47844a5d6d8187d3b62445d9b3ddda2fec9d5", @typed={0x8, 0xc, @ipv4=@multicast2}, @typed={0x4, 0x6f}, @typed={0xc, 0x4f, @u64=0x562}, @typed={0x8, 0x72, @uid}, @typed={0x4, 0x2b}, @typed={0x4, 0x3b}, @typed={0x8, 0x54, @ipv4=@broadcast}]}]}, 0x1d0}, {&(0x7f0000002a80)={0x1124, 0x22, 0x200, 0x70bd25, 0x25dfdbfd, "", [@nested={0xc0, 0x1a, [@generic="778d094a884faa61b7dfce45038c5416efb4a2d099b34815cadaa6462c40c6c830b44e676186f2c98cab697a1e4381bded95a2fea83c4398c2bdec2ec41d677f43a7b3bafb5294e0958abf9e9e8feb743fbb75739020637acf41fbbf139cad6b27561d3c2d685082ee5b98dfdcee022d1b19ea19f18493ae03069e3ce783124702", @generic="0b5cf61a9cb8a7d80f21efe764592cdb35e0090b4e6900d876856825eba538b53a70045adf8c56385c39862f53e0195e78f0ed0a4c647e16e207"]}, @typed={0x8, 0x6b, @u32=0x4}, @nested={0x1004, 0x65, [@generic="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"]}, @nested={0x48, 0x70, [@generic="1a9e92b203eb45483150e9555a5b1684d7535a16c32e58fc1eb371ecc29f3234810356f255438b0e8f471dfa3278ee902d4d1ec9579209808faaef4b23393f5eecdb"]}]}, 0x1124}, {&(0x7f0000003bc0)={0x14, 0x11, 0x400, 0x70bd28, 0x25dfdbfd, "", [@typed={0x4, 0x8c}]}, 0x14}], 0x5, &(0x7f0000003cc0)=[@rights={{0x24, 0x1, 0x1, [r0, r7, r9, r0, r13]}}], 0x28, 0x7f02eb01da4d2cf5}, 0x4000000) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xe11}) [ 2730.742845] hfsplus: unable to parse mount options [ 2730.750963] lowmem_reserve[]: 0 2555 2557 2557 [ 2730.755711] Node 0 DMA32 free:56924kB min:36248kB low:45308kB high:54368kB active_anon:461596kB inactive_anon:768kB active_file:20412kB inactive_file:28492kB unevictable:0kB writepending:696kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10304kB pagetables:16372kB bounce:0kB free_pcp:1728kB local_pcp:1124kB free_cma:0kB [ 2730.809696] lowmem_reserve[]: 0 0 2 2 [ 2730.863225] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2730.907324] hfsplus: umask requires a value [ 2730.917334] hfsplus: unable to parse mount options [ 2730.944243] lowmem_reserve[]: 0 0 0 0 04:59:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'u%ask', 0x3d, 0x8cffffff}}]}) 04:59:03 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r1 = semget$private(0x0, 0x7, 0x0) semop(r1, &(0x7f0000000080)=[{0x0, 0x80}, {}], 0x2) semtimedop(r1, &(0x7f00000000c0)=[{0x4, 0x7fffffff}], 0x1, 0x0) semop(r1, &(0x7f0000000240)=[{0x0, 0x7fff}], 0x1) semctl$GETZCNT(r1, 0x0, 0xf, &(0x7f00000000c0)=""/63) [ 2730.965376] Node 1 Normal free:3650924kB min:53608kB low:67008kB high:80408kB active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB writepending:16kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2464kB pagetables:4884kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2731.059265] lowmem_reserve[]: 0 0 0 0 [ 2731.064937] Node 0 DMA: 14*4kB (UME) 114*8kB (UME) 60*16kB (UME) 28*32kB (UM) 5*64kB (UM) 4*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 11080kB [ 2731.104654] Node 0 DMA32: 4466*4kB (UMEH) 919*8kB (UMEH) 377*16kB (UMEH) 401*32kB (UMH) 194*64kB (UME) 4*128kB (M) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 57008kB [ 2731.121649] hfsplus: umask requires a value [ 2731.130485] hfsplus: unable to parse mount options [ 2731.138123] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB 04:59:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca5fa5d0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003700)={@empty, 0x0}, &(0x7f0000003740)=0x14) recvfrom(r3, &(0x7f0000000000)=""/184, 0xb8, 0x1, &(0x7f0000003780)=@xdp={0x2c, 0x1bbda932a1a0fb2b, r4, 0x27}, 0x80) [ 2731.151241] Node 1 Normal: 677*4kB (UME) 3421*8kB (UME) 2549*16kB (UME) 1199*32kB (UME) 515*64kB (UME) 168*128kB (UME) 32*256kB (UME) 15*512kB (UM) 10*1024kB (UM) 2*2048kB (UE) 844*4096kB (UM) = 3650924kB [ 2731.170611] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2731.186348] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 04:59:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x110e}) [ 2731.205890] hfsplus: unable to parse mount options [ 2731.217531] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2731.241363] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2731.263207] 18094 total pagecache pages [ 2731.267539] 0 pages in swap cache [ 2731.271690] Swap cache stats: add 0, delete 0, find 0/0 [ 2731.277542] Free swap = 0kB [ 2731.281482] Total swap = 0kB [ 2731.284914] 1965979 pages RAM [ 2731.288741] 0 pages HighMem/MovableOnly [ 2731.293368] 338856 pages reserved [ 2731.297492] 0 pages cma reserved 04:59:03 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x0) 04:59:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_TRY_FMT(r2, 0xc0d05640, &(0x7f00000000c0)={0x0, @vbi={0x9, 0x0, 0x4, 0x31363553, [0x6, 0x3], [0xe4, 0xfff], 0x1}}) r3 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r3, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2731.385498] hfsplus: umask requires a value [ 2731.408405] hfsplus: unable to parse mount options 04:59:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'u,ask', 0x3d, 0x8cffffff}}]}) [ 2731.452818] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2731.477382] hfsplus: umask requires a value [ 2731.482623] hfsplus: unable to parse mount options [ 2731.499593] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2731.515326] CPU: 0 PID: 26366 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2731.522306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2731.531673] Call Trace: [ 2731.534279] dump_stack+0x172/0x1f0 [ 2731.538009] warn_alloc.cold+0x7b/0x173 [ 2731.541995] ? zone_watermark_ok_safe+0x260/0x260 [ 2731.546851] ? lock_downgrade+0x810/0x810 [ 2731.551022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2731.556569] ? avc_has_perm+0x404/0x610 [ 2731.560566] __vmalloc_node_range+0x486/0x790 [ 2731.565077] ? sel_write_load+0x1de/0x470 [ 2731.569236] vmalloc+0x6b/0x90 [ 2731.572433] ? sel_write_load+0x1de/0x470 [ 2731.576597] sel_write_load+0x1de/0x470 [ 2731.580594] __vfs_write+0x114/0x810 [ 2731.584318] ? sel_make_policy_nodes+0x1520/0x1520 [ 2731.589271] ? kernel_read+0x120/0x120 [ 2731.593167] ? __lock_is_held+0xb6/0x140 [ 2731.597244] ? rcu_read_lock_sched_held+0x110/0x130 [ 2731.602272] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2731.607036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2731.612584] ? __sb_start_write+0x1a9/0x360 [ 2731.616929] vfs_write+0x20c/0x560 [ 2731.620488] ksys_write+0x14f/0x2d0 [ 2731.624147] ? __ia32_sys_read+0xb0/0xb0 [ 2731.628220] ? do_syscall_64+0x26/0x620 [ 2731.632205] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2731.637579] ? do_syscall_64+0x26/0x620 [ 2731.641570] __x64_sys_write+0x73/0xb0 [ 2731.645479] do_syscall_64+0xfd/0x620 [ 2731.649293] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2731.654496] RIP: 0033:0x4598e9 [ 2731.657699] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2731.676617] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2731.684340] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2731.691613] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 04:59:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x8000) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000040)="e1c0e5dbcd20971b94a927533d8762dd", 0x10) r3 = shmget$private(0x0, 0x1000, 0x1000, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000300)=""/98) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x1d) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f00000000c0)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-vsock\x00', 0x2, 0x0) read$char_usb(r1, 0x0, 0x0) recvfrom$netrom(r2, &(0x7f0000000180)=""/150, 0x96, 0x10000, &(0x7f0000000240)={{0x3, @null, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) [ 2731.698887] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2731.706164] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2731.713442] R13: 00000000004c9b57 R14: 00000000004e12c8 R15: 00000000ffffffff 04:59:04 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x05\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:04 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r3, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r3, 0x1) recvfrom$inet6(r3, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r3) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f00000001c0)=0xe8) ioctl$HCIINQUIRY(r2, 0x800448f0, &(0x7f0000000200)={r4, 0xfff, 0x3, 0xa9, 0x5, 0x0, 0x2}) 04:59:04 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x1f00}) [ 2731.799880] Mem-Info: [ 2731.802833] active_anon:121881 inactive_anon:192 isolated_anon:0 [ 2731.802833] active_file:5198 inactive_file:12661 isolated_file:0 [ 2731.802833] unevictable:0 dirty:187 writeback:0 unstable:0 [ 2731.802833] slab_reclaimable:21540 slab_unreclaimable:428919 [ 2731.802833] mapped:59550 shmem:245 pagetables:5248 bounce:0 [ 2731.802833] free:929418 free_pcp:548 free_cma:0 [ 2731.846598] hfsplus: unable to parse mount options [ 2731.870778] Node 0 active_anon:463548kB inactive_anon:768kB active_file:20412kB inactive_file:28536kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238200kB dirty:732kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2731.944512] Node 1 active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:16kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2731.979288] Node 0 DMA free:11080kB min:220kB low:272kB high:324kB active_anon:2052kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2732.013934] hfsplus: umask requires a value [ 2732.018535] hfsplus: unable to parse mount options 04:59:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getpeername$tipc(r1, &(0x7f0000000040)=@name, &(0x7f0000000080)=0x10) read$char_usb(r1, 0x0, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000000)=0x5) 04:59:04 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x2) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2732.094966] hfsplus: umask requires a value [ 2732.101222] lowmem_reserve[]: 0 2555 2557 2557 [ 2732.115691] hfsplus: unable to parse mount options 04:59:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'um\nsk', 0x3d, 0x8cffffff}}]}) [ 2732.123487] Node 0 DMA32 free:55572kB min:36248kB low:45308kB high:54368kB active_anon:461496kB inactive_anon:768kB active_file:20412kB inactive_file:28524kB unevictable:0kB writepending:732kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10336kB pagetables:16252kB bounce:0kB free_pcp:2320kB local_pcp:948kB free_cma:0kB [ 2732.179351] lowmem_reserve[]: 0 0 2 2 [ 2732.183949] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 04:59:04 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x2000}) [ 2732.270282] lowmem_reserve[]: 0 0 0 0 [ 2732.274544] Node 1 Normal free:3650924kB min:53608kB low:67008kB high:80408kB active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB writepending:16kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2464kB pagetables:4884kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 04:59:04 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x101000, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000100)) [ 2732.322155] lowmem_reserve[]: 0 0 0 0 [ 2732.334447] Node 0 DMA: 14*4kB (UME) 114*8kB (UME) 60*16kB (UME) 28*32kB (UM) 5*64kB (UM) 4*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 11080kB [ 2732.360729] Node 0 DMA32: 4521*4kB (UMEH) 762*8kB (UMEH) 346*16kB (UMEH) 403*32kB (UMH) 193*64kB (UME) 4*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 55476kB [ 2732.383301] hfsplus: unable to parse mount options [ 2732.392957] Node 0 Normal: 1*4kB (U) [ 2732.412904] 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2732.455636] hfsplus: umask requires a value [ 2732.456588] Node 1 [ 2732.460604] hfsplus: unable to parse mount options [ 2732.482012] Normal: 677*4kB (UME) 3421*8kB (UME) 2549*16kB (UME) 1199*32kB (UME) 515*64kB (UME) 168*128kB (UME) 32*256kB (UME) 15*512kB (UM) 10*1024kB (UM) 2*2048kB (UE) 844*4096kB (UM) = 3650924kB [ 2732.510216] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2732.525220] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2732.534163] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2732.551369] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2732.566094] 18102 total pagecache pages [ 2732.570546] 0 pages in swap cache [ 2732.574247] Swap cache stats: add 0, delete 0, find 0/0 [ 2732.602085] Free swap = 0kB [ 2732.611130] Total swap = 0kB [ 2732.614413] 1965979 pages RAM [ 2732.617945] 0 pages HighMem/MovableOnly [ 2732.625810] 338856 pages reserved [ 2732.632134] 0 pages cma reserved 04:59:05 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) 04:59:05 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getuid() r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) 04:59:05 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000040)={0x0, 0xffffffffffffffff}) preadv(r0, &(0x7f0000000080), 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13835ad469b50e2a34286582f1493e2cfb1782f26f2f6ca242a9c9876f08dcc5f56d28c22d0b52b93d28b04c4f048ce75a31e5f54df86b2d5b87c736fe0a34dac579151226a69cb9d45168a4493a"], 0x1}}, 0x8000) r3 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0x9101) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x200, 0x0) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f0000000240)={0xa22662d141b4aea6, r4}) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x20) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r7, 0x0, 0x8}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000100)={r8, 0x1, 0x8a, "1cf3bfe65cc382707d2bff61923152086c0e0630aa088f19ccc806a8391bcef8216f23720a7cba5b813a23b0a1e91da247a5aa265d34319de9f24744ba7e4c93e65493451090506649457e655bf5cb7a8db580078dd1d8b2170a5f101b9732ddab9869413ca59f8f218d23ef61c4e9a2dadcc300f3e7bcc04450ab8bae79ec36f4b3d89ca6bd449ee0a2"}, 0x92) 04:59:05 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x2200}) [ 2732.736055] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2732.755362] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2732.763608] CPU: 1 PID: 27107 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2732.770564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2732.779916] Call Trace: [ 2732.779939] dump_stack+0x172/0x1f0 [ 2732.779962] warn_alloc.cold+0x7b/0x173 [ 2732.779978] ? zone_watermark_ok_safe+0x260/0x260 [ 2732.779994] ? lock_downgrade+0x810/0x810 [ 2732.780018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2732.780035] ? avc_has_perm+0x404/0x610 [ 2732.780063] __vmalloc_node_range+0x486/0x790 [ 2732.780082] ? sel_write_load+0x1de/0x470 [ 2732.780098] vmalloc+0x6b/0x90 [ 2732.790270] ? sel_write_load+0x1de/0x470 [ 2732.790287] sel_write_load+0x1de/0x470 [ 2732.790307] __vfs_write+0x114/0x810 [ 2732.790324] ? sel_make_policy_nodes+0x1520/0x1520 [ 2732.790339] ? kernel_read+0x120/0x120 [ 2732.790363] ? __lock_is_held+0xb6/0x140 [ 2732.790388] ? rcu_read_lock_sched_held+0x110/0x130 [ 2732.790400] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2732.790419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2732.799384] ? __sb_start_write+0x1a9/0x360 [ 2732.799403] vfs_write+0x20c/0x560 [ 2732.799423] ksys_write+0x14f/0x2d0 [ 2732.799441] ? __ia32_sys_read+0xb0/0xb0 [ 2732.799458] ? do_syscall_64+0x26/0x620 [ 2732.799474] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2732.799487] ? do_syscall_64+0x26/0x620 [ 2732.799505] __x64_sys_write+0x73/0xb0 [ 2732.799521] do_syscall_64+0xfd/0x620 [ 2732.799538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2732.799552] RIP: 0033:0x4598e9 [ 2732.906007] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2732.924919] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 04:59:05 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x06\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'um\"sk', 0x3d, 0x8cffffff}}]}) [ 2732.932634] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2732.939905] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2732.947262] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2732.954531] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2732.961801] R13: 00000000004c9b57 R14: 00000000004e12c8 R15: 00000000ffffffff [ 2733.018981] hfsplus: umask requires a value [ 2733.028095] hfsplus: unable to parse mount options [ 2733.038138] Mem-Info: [ 2733.046764] active_anon:121954 inactive_anon:192 isolated_anon:0 [ 2733.046764] active_file:5198 inactive_file:12674 isolated_file:0 [ 2733.046764] unevictable:0 dirty:187 writeback:0 unstable:0 [ 2733.046764] slab_reclaimable:21517 slab_unreclaimable:428828 [ 2733.046764] mapped:59550 shmem:245 pagetables:5359 bounce:0 [ 2733.046764] free:929533 free_pcp:376 free_cma:0 [ 2733.089371] Node 0 active_anon:463840kB inactive_anon:768kB active_file:20412kB inactive_file:28588kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238200kB dirty:732kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 04:59:05 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x1ff) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2733.138831] Node 1 active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:16kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2733.139637] hfsplus: unable to parse mount options 04:59:05 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x2c00}) [ 2733.173275] Node 0 DMA free:11080kB min:220kB low:272kB high:324kB active_anon:2052kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2733.217607] lowmem_reserve[]: 0 2555 2557 2557 [ 2733.223612] Node 0 DMA32 free:56660kB min:36248kB low:45308kB high:54368kB active_anon:461588kB inactive_anon:768kB active_file:20412kB inactive_file:28576kB unevictable:0kB writepending:732kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10304kB pagetables:16104kB bounce:0kB free_pcp:2164kB local_pcp:1088kB free_cma:0kB [ 2733.254215] lowmem_reserve[]: 0 0 2 2 [ 2733.258697] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2733.286233] lowmem_reserve[]: 0 0 0 0 04:59:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$MON_IOCH_MFLUSH(r3, 0x9208, 0xaf) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/m\x82p^t/mice\xfe', 0x0, 0x78244bd0c641bfbc) read$char_usb(r4, 0x0, 0x0) [ 2733.290868] Node 1 Normal free:3650924kB min:53608kB low:67008kB high:80408kB active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB writepending:16kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2464kB pagetables:4884kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2733.321521] lowmem_reserve[]: 0 0 0 0 [ 2733.326324] Node 0 DMA: 14*4kB (UME) 114*8kB (UME) 60*16kB (UME) 28*32kB (UM) [ 2733.350315] 5*64kB (UM) 4*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 11080kB 04:59:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$char_usb(r1, &(0x7f0000000140)=""/4096, 0x1000) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dece\x00\x00\xb4^y\'\xb8\x00', 0x0, 0x0) read$char_usb(r2, 0x0, 0x0) [ 2733.392968] Node 0 DMA32: 4269*4kB (UMEH) 883*8kB (UMEH) 298*16kB (UMEH) 401*32kB (UMH) 193*64kB (UME) 4*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 54604kB [ 2733.421948] hfsplus: umask requires a value [ 2733.437326] hfsplus: unable to parse mount options [ 2733.441403] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2733.459876] Node 1 Normal: 677*4kB (UME) 3421*8kB (UME) 2549*16kB (UME) 1199*32kB (UME) 515*64kB (UME) 168*128kB (UME) 32*256kB (UME) 15*512kB (UM) 10*1024kB (UM) 2*2048kB (UE) 844*4096kB (UM) = 3650924kB [ 2733.481794] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 04:59:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'um%sk', 0x3d, 0x8cffffff}}]}) [ 2733.493074] hfsplus: umask requires a value [ 2733.497417] hfsplus: unable to parse mount options [ 2733.507379] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2733.519567] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2733.528430] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 04:59:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x3f00}) [ 2733.564960] 18115 total pagecache pages [ 2733.576068] 0 pages in swap cache [ 2733.580784] Swap cache stats: add 0, delete 0, find 0/0 [ 2733.587022] Free swap = 0kB [ 2733.618867] Total swap = 0kB [ 2733.623804] 1965979 pages RAM [ 2733.651233] 0 pages HighMem/MovableOnly [ 2733.652255] hfsplus: umask requires a value 04:59:06 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) 04:59:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x220802, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000200)=0x52a, 0x4) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x80840, 0x0) openat$cgroup_ro(r5, &(0x7f00000001c0)='memory.stat\x00', 0x0, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fcntl$dupfd(r6, 0x406, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r7, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KDSKBMETA(r9, 0x4b63, &(0x7f0000000240)) read$eventfd(r4, &(0x7f0000000180), 0x8) write$P9_RSYMLINK(r4, &(0x7f0000000080)={0x14, 0x11, 0x2, {0x21, 0x2}}, 0x14) read$char_usb(r3, 0x0, 0x0) [ 2733.666382] 338856 pages reserved [ 2733.685992] hfsplus: unable to parse mount options [ 2733.687227] 0 pages cma reserved [ 2733.701577] hfsplus: unable to parse mount options 04:59:06 executing program 2: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x401, 0x4100) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/139}, {&(0x7f0000000200)=""/67}, {&(0x7f0000000280)=""/236}, {&(0x7f0000000380)=""/177}, {&(0x7f0000000440)=""/175}, {&(0x7f0000000500)=""/182}], 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x4681, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) [ 2733.796871] hfsplus: umask requires a value [ 2733.822397] hfsplus: unable to parse mount options 04:59:06 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\a\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x4000}) [ 2733.872813] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2733.899919] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2733.929967] CPU: 1 PID: 27884 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2733.936936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2733.946375] Call Trace: [ 2733.948976] dump_stack+0x172/0x1f0 [ 2733.952617] warn_alloc.cold+0x7b/0x173 [ 2733.956604] ? zone_watermark_ok_safe+0x260/0x260 [ 2733.961455] ? lock_downgrade+0x810/0x810 [ 2733.965624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2733.971350] ? avc_has_perm+0x404/0x610 [ 2733.975372] __vmalloc_node_range+0x486/0x790 [ 2733.979943] ? extcon_get_property+0x2a8/0x600 [ 2733.984544] ? sel_write_load+0x1de/0x470 [ 2733.988705] vmalloc+0x6b/0x90 [ 2733.991909] ? sel_write_load+0x1de/0x470 [ 2733.996069] sel_write_load+0x1de/0x470 [ 2734.000055] __vfs_write+0x114/0x810 [ 2734.003783] ? sel_make_policy_nodes+0x1520/0x1520 [ 2734.008716] ? kernel_read+0x120/0x120 [ 2734.012614] ? __lock_is_held+0xb6/0x140 [ 2734.016690] ? rcu_read_lock_sched_held+0x110/0x130 [ 2734.021713] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2734.026473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2734.032017] ? __sb_start_write+0x1a9/0x360 [ 2734.036349] vfs_write+0x20c/0x560 [ 2734.039900] ksys_write+0x14f/0x2d0 [ 2734.043539] ? __ia32_sys_read+0xb0/0xb0 [ 2734.047606] ? do_syscall_64+0x26/0x620 [ 2734.051584] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2734.056950] ? do_syscall_64+0x26/0x620 [ 2734.060939] __x64_sys_write+0x73/0xb0 [ 2734.064832] do_syscall_64+0xfd/0x620 [ 2734.068643] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2734.073833] RIP: 0033:0x4598e9 [ 2734.077032] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2734.095939] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2734.103657] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2734.110935] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2734.118205] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2734.125475] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2734.132749] R13: 00000000004c9b57 R14: 00000000004e12c8 R15: 00000000ffffffff [ 2734.149902] Mem-Info: [ 2734.157662] active_anon:121894 inactive_anon:192 isolated_anon:0 [ 2734.157662] active_file:5198 inactive_file:12684 isolated_file:0 [ 2734.157662] unevictable:0 dirty:187 writeback:0 unstable:0 [ 2734.157662] slab_reclaimable:21523 slab_unreclaimable:428770 [ 2734.157662] mapped:59550 shmem:245 pagetables:5309 bounce:0 [ 2734.157662] free:929532 free_pcp:467 free_cma:0 04:59:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'um,sk', 0x3d, 0x8cffffff}}]}) 04:59:06 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$packet_int(r2, 0x107, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 04:59:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000080)=ANY=[@ANYBLOB="18030000000000004d240000000000000100000000000000", @ANYRES32=r2, @ANYBLOB="0000000007000000000000000000b7ee00"/28]) read$char_usb(r1, 0x0, 0x0) [ 2734.262467] Node 0 active_anon:463600kB inactive_anon:768kB active_file:20412kB inactive_file:28628kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238200kB dirty:732kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2734.292761] hfsplus: umask requires a value [ 2734.297190] hfsplus: unable to parse mount options [ 2734.348800] Node 1 active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:16kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2734.377834] Node 0 DMA free:11080kB min:220kB low:272kB high:324kB active_anon:2052kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2734.409141] lowmem_reserve[]: 0 2555 2557 2557 [ 2734.415687] Node 0 DMA32 free:55252kB min:36248kB low:45308kB high:54368kB active_anon:461548kB inactive_anon:768kB active_file:20412kB inactive_file:28616kB unevictable:0kB writepending:732kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10432kB pagetables:16200kB bounce:0kB free_pcp:1800kB local_pcp:576kB free_cma:0kB [ 2734.466494] hfsplus: umask requires a value [ 2734.480720] hfsplus: unable to parse mount options [ 2734.482581] lowmem_reserve[]: 0 0 2 2 [ 2734.493816] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2734.522493] lowmem_reserve[]: 0 0 0 0 [ 2734.527871] Node 1 Normal free:3650924kB min:53608kB low:67008kB high:80408kB active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB writepending:16kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2464kB pagetables:4884kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2734.558258] lowmem_reserve[]: 0 0 0 0 04:59:07 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x4800}) [ 2734.563215] Node 0 DMA: 14*4kB (UME) 115*8kB (UME) 60*16kB (UME) 28*32kB (UM) 5*64kB (UM) 4*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 11088kB 04:59:07 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xb0e, 0x44080) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000100)={0x0, 0x7fffffff, [0x7, 0x4, 0x20, 0x9, 0x7]}) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000140)={0x1, 0x0, 0x3, 0x7, {0xa779, 0x100, 0x3, 0x6}}) ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000180)=0x3f) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma\nk', 0x3d, 0x8cffffff}}]}) [ 2734.619506] Node 0 DMA32: 4080*4kB (UMEH) 969*8kB (UMEH) 282*16kB (UMEH) 406*32kB (UMH) 193*64kB (UME) 4*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 54440kB [ 2734.709127] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2734.737700] Node 1 Normal: 677*4kB (UME) 3421*8kB (UME) 2549*16kB (UME) 1199*32kB (UME) 515*64kB (UME) [ 2734.739883] hfsplus: umask requires a value [ 2734.755017] hfsplus: unable to parse mount options [ 2734.779396] 168*128kB (UME) 32*256kB (UME) 15*512kB (UM) 10*1024kB (UM) 2*2048kB (UE) 844*4096kB (UM) = 3650924kB [ 2734.791279] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 04:59:07 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\b\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2734.804049] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2734.813749] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2734.825741] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2734.836952] hfsplus: umask requires a value [ 2734.842879] hfsplus: unable to parse mount options [ 2734.856839] hfsplus: unable to parse mount options [ 2734.863441] 18136 total pagecache pages [ 2734.868262] 0 pages in swap cache [ 2734.878542] Swap cache stats: add 0, delete 0, find 0/0 [ 2734.904775] Free swap = 0kB [ 2734.916534] Total swap = 0kB [ 2734.979318] 1965979 pages RAM [ 2734.982727] 0 pages HighMem/MovableOnly [ 2734.987092] 338856 pages reserved [ 2734.999803] 0 pages cma reserved 04:59:07 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000100)}, {&(0x7f0000001480)=""/4096}, {&(0x7f0000000140)=""/179}, {&(0x7f00000012c0)=""/161, 0xffffffffffffff84}, {&(0x7f0000000200)=""/61}], 0x226, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$PPPIOCCONNECT(r3, 0x4004743a, &(0x7f00000000c0)=0x4) 04:59:07 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x4c00}) 04:59:07 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) 04:59:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma\"k', 0x3d, 0x8cffffff}}]}) [ 2735.107367] hfsplus: umask requires a value [ 2735.128539] hfsplus: unable to parse mount options 04:59:07 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0xd, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x66c74691b5044bd9}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xc8, r3, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8001}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2d}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nlmon0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffffe}]}, 0xc8}, 0x1, 0x0, 0x0, 0x20008c40}, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000080)={0x1, 0xffffffffffffffff, 0x1}) preadv(r4, &(0x7f0000000080), 0x0, 0x0) [ 2735.206689] hfsplus: unable to parse mount options [ 2735.212705] hfsplus: umask requires a value [ 2735.217856] hfsplus: unable to parse mount options 04:59:07 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x6000}) 04:59:07 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f00000000c0)={0x58000003}) [ 2735.427570] hfsplus: umask requires a value [ 2735.433036] hfsplus: unable to parse mount options 04:59:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigaction(0x40, 0x0, 0x0, 0x8, &(0x7f0000000440)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xa7, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000080)={0x5, 0xb3, 0x6, 0x400}) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r4, 0x0, 0x0) 04:59:07 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff7"], 0x31) 04:59:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma#k', 0x3d, 0x8cffffff}}]}) 04:59:08 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff7"], 0x31) [ 2735.504719] hfsplus: umask requires a value [ 2735.512873] hfsplus: unable to parse mount options [ 2735.532772] SELinux: failed to load policy [ 2735.632786] SELinux: failed to load policy [ 2735.672226] hfsplus: unable to parse mount options 04:59:08 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\t\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:08 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r0, &(0x7f0000000180), 0x8) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000000c0)={0x4, @vbi={0x0, 0x6, 0x4, 0x37303250, [0x9, 0x9], [0x101, 0x2], 0x13a}}) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:08 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff7"], 0x31) 04:59:08 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x6800}) 04:59:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) ioctl(r1, 0x1, &(0x7f0000000180)="87979f5376f94d05ce8fa91fb5684789a7b8db3c246df3fd1f23078320a52fea9c9c9fd6dcd3aea34b020be03e34b3fff082ffcc37ac4d1b12f501fa3a02f1223cc19f5648edfff06656582a5b673f2be76663a55b1db3e337f6ad8d29c49015b29ed3f9e7dd016902a6942893e779d12c842b9adb0c10edc0eaeb60a252a9fe999eb3e99a62a201bb8f84fff7a06648b6066044ed71a76df3ea2a51f5d224de80b48147f04549265dff4d871b59caae6d5475f3269a7453b4045eb1431b927ebc1cd45068093911c3be279ac94242370c3fd827a7c592033c0e86eb4229645679a2a180948a12c9887642adff2612564aa8f262f4d3bb59d2e2c21ed67df1dd89632e4a57bbc2f05a96a3a7344adb93cabecf7eaa9ef1d6347eaf62c4b380eaefa39a4373d931996c39dcd942908cb1404886ab55b6c8108b0884abac3d4290f347fb5e80b4a88fff1cad7e2dc921246367ac1b07f56669ffb2d5481bb860a2e982463f6602dc9be3b90c99594bcae8d918e5a5426d594fd68ebbf3788e987939f3ca3899bf65caa1cd003fc6e318a4d3437372d8c0e8f3466cdc244115953b5f9596290202d3d3e4ce3872d59b811f85b632bc5367fab3c0129f598e1de4ce1d8d5ea136a3bdbd9d33383282008057605675d9040ff34c77e564f3b028133abd2ae2f89a9b4c7b32fe0300199b3f896ec5d2dff246464f26d6f332ce587d35a8f7f5fe3fec2fbeef6ebb0c35f0c0b54721300ffb7adbcf8be9b522feff36fd42080a2e5d211bc16f0ced0c0d719585163941a1c5b035a3a0084368cb6a1dce59005a55c4451fc064c9fd4ca1065ed5d9dc74cdd335f934986e6b2f9d53fda9bb03bb221455fb34f8a8d28bb16341085bc4bf6aac59fffcbfeb3c2d3e8935668478eec178f011a451e16ff9282c8d89fc38c001e4e7db77bfa3c73a42b80655667399bc60d8b04f499e97378c81407ca2c33af247b5e60bc9925c613765b134be59af1a9954d1fc59553a334107ef105249283aad46907da88894db842cff19f6143f103ca610afdbfbe45c941770c9411e6ecf6a410840655c4ff9d33e7abf3df00cc2243b6ca34e745d0e8b9907eb8a1eeb1b98b440e3c24d20ff27c86e7cd11c729919358b9f8eb2847e644137423c1b30b1f3f02558cff5f82f3572c70e27b7bad52cd77abe19e2b5428eddc067774c624e297f9ff1a226e7d3ca92e4e8380826cc89962654cb3c159f7979e7c8678a8165c0062c2fb3a80a963e324d31abf5083244def36c359bc47fbdca3a76af0b24447741009dacd68c1c376abc81d0f79641b68c76da946c21f50364dc6abd128ea1b1c642b0021fe7b2f0ec2329ffe902a1f42350c9c5d62bb5ad024e8b4ca3fef188f3a3a78b1448b3c1d98128041d81c1fa1211324ba8c75bbe9dd0d25c6a8717d1259a571cb72026712953d05ed84870d23d14ed0f9ecf2595545e00766fac5f291fee2cb6eeceec2b6f672578e9bf21be5672dd17fb80a200a720ced247f676a80c810384f2a635a7777bf56c1e14cb4d406b5756d3f611cb75fb36d4fa96ac1c7226a1940d14849b0c13695f6c4ba13a583d8e605e321dc38a482c09691822466565b23d805e149faf762ad172b8df87dcc89b3ca0b41807d4b7646aec97cee27a829475780390e9db9994760961e88996016466a9222d22953f965d44c56a76afc00f48ff9bbf48000d976d7835a2f7acfb3b58d4aa981632f57feebe54affbf41f0fb501036a3ee268d2043b6476e29997f588fa0e70df4f627d61c41e66a8d58ad0d612e20a13c5f23745f626e7ef8274e4f5b3efaca7b1a6f59399ca8f26b849de7f6bff078a47881c59258a46b3fa1b4882f1220ff41b80ba6ea0246c684fd41a66abd604ceffc116e31258321db9bc5dfe694e3a4c1741bd13dbee7e0c5681d1b4a6ccc95045353926e1bdbbe889167515f21ba01da2f79e874a88e3567b3c00db805e5ae532071a487b023157d204f465c2ffc255d7f1b2450124acd0ac34989134d0ea8bcfe2df1b24c2c3a55d389c762abb926eaa4310e1d9578a682888a48b4e7dedc0077d789e84104e009d038b4c5e9f153830c87521efddf6a923dcaee3636be8ca6463a075f6f0998eee6155ab7980c135795918de287fdcb7e33744cb151745db9cd03375f705d5f21faf1e3df708e56eef2faf4ad498d8ae32327603dc66df99cbdba5df963abfb376820eb4ab21ac09d8d2d5bf5717123957a2a75ccaa4e4e9754385d7f0621e7f79821fc22e0795a19fd21e806a292958b710d8151f8fc0649fe79f955b4cc0bc2144906f83cb621eae45aba9d240e7dad6b5cc64e3de461084c77087466c473ac85853fc5b235f010501da623ff1ab3ed9d588e60cf7a63ad1cc5ed15acd71ed3c048b6b87459b5f8705b7dab2d1df36ccfecca98baf569e8113a37d2c7b92e2a5b6e903be6b4178093386e2b7a656b3664f410cab733fc4ae5a9ae7dace65d271bf184e987c72bd82c8ce8d0cc4d3131082d6cdaf0a6a9dcf0ed0213f110973b8489eeeee433ada1a322d773a627c84b32ef81ed9b751e67b879c277f769085a96d8a4bae757c118e4ac963334536b4d2863710b8165f8f72abd71024cdfaacd14c2ba26a3b84334bf3a54af6560bf3094a5832a4381a5a94d61815a75219abcc9c068b04cb36710a957a3960eb72790500c3fc6f8b55a9a7ca9fd13318f4e2f61e37bd86f3d362913f3611abb3d5970ee2bfffd260f15fc21ce4ecba720e64fb37d4f1354643be7b8ee039bfd9dac76f0db831385096e194c02b98976db9684c4214bec42cccf9951f9aee0610d10d1fa692696118517380237c02e4e9fe29b75ab4030c6ec817b661a09c0b879f110609504c1f8308429f62e4f250d06a304badf90188417814e1e0efa978c97932fc5cd3ec6bdb04415893d1b288886219883f7b57beeeef81aff0a98b05751fb3615750eeb69740e0752fbfc054ccd425152832b191794bd9e98a8aff900185dde3151740b9b01721037e689c50cb492aa22788503a8aa60a894320ecad7f004bdd43a0e3f1e465014daf741074209ee9fc14b46f1d1b942e7c7c8af6e945524b849d7b02626adc49a616162773c9324f192da4ed0768029031e19c4e16e3cac674d34cf381f5abe2a51b243c858095fb0bff7c3cfc9b6e45274069fdd97e48901d18a6f79d0b3c51c106a7e15a4e4a996673a2ee8cc11a57755a85bcf38f27d8fe4041c0fbb2a89ae41532fa697d74db159175d792bae38f47573c96c42f06372f175685b0dfdff928845e1c250aac1fe9e5609258ad540d75df758958df3cc868ca4b26cafdb39edc49d8835a6b48917379a6e96b2954c3a943bdcc8527dfe5a8ebf5e1bbfb171be7b9abc9119a743d2681030683f38b325331f6a2ffcc4ffc599b4561088b702191266ba0633d05a9b8688e4e586ef6f34b1613a756aad4716f33246c857dab06d9538cafc4e3f12398b040e63ee69d283c4b610c7e7ebd3b99725f492522c296674af644a1308e97637a5f51bfb767b57720548527f8f99bfbcffcebc75244150fc6119c16ce613eaf55d52deb706dce90f81753942fe5587b2573754f7e20dd735947402e02f4220fd23277073e712428c44ef1d34345e3e8cec3ae28289c784f73efd4047d97527a43d61ab17dd97519c272642cf618cbc57c4fc2abaa21d431f1e15a725708f4231dcd589592146a007de5e40af97c4e9bc3c5c56d736bf4258d350d9cef582a92a1ed7e22330ff8fbd66324938acc719afa6e6fe18734e3c525e37e2b61e6d83cd5f20450f70c1f123ab2711583f16601095645e5994f6b230bd668742bcfea99a1e5b5e6d156949164531db049c1d539b0f0f9965507a1a7a4e8b1d8c7a9606322c399d3cb2c4cd98737a3c4a17c6bdb045e513525b8b565ec31c9a5c6e1f5afb03f19075b81c1929abdfae2681ae5dc2a583898c7ba13e4a71f8a1dc67eff8620127add510f52be10a85d23f9c969f65bc6b36db221163f4d01d471693f51e3650ac049976dc3b8b970c9524c0eb56a213b7426eecf9a7bc1a4cdb2778f7e3e686adc83c501962eb7add5ea992f063464ddc90b3d2cf87f32784e617fd592e0109b57805002b34b6223fa3da2278842e9269d5e022d387c59f3892f40a9b556fa8cc61d3695a9c33baf3c5d672a4fa288fbbc010396e969eabe0cdc5d1464dfa8f3c26e3a5cf8aee0d75b8f531077d68f82a0b1feec3e4e3d2e64b72587e7563db674ec22875bd39d47e77e27c403fba984cb2443edbe7245279ae1c94b34d46a52b6c02b1904cb799387747a375029d41dc496b3625b151f4a81ded48bb2951c11971e36f0f65f45b49e09da021871e569389ca0e7769cb454498eb2902de456ad866bd567993794d229cc6b043b21df51d1138ead7d8aca568797b38bbd0b404e26e594bc6092921438fc98d00ba4b1deba5aa3a374ef76f7dcd8debc3ed967dbe5087c6255bdcd244c92a663bd60a3bfc3801dc852263b362777d4f5a1cb1904d81b377847fbefbe1f7f480c6f32a5bd38703e0ac69ba4952193665b4e6c70e0904f166e96664ecec90659acb028a56e6035da2e8285e4ee744be87ea319c30ea5d4c1f6e815b261c2ef849622e1c4ac98fc21054d81b61c7249640000d8eeadd4c2316300f925b63d1ed3304c3e2aaf38500f973c0fa2e107b34364d0f20f890496ec47f3bf683cfbca9fa9c4638616a8ec26d7979b47f78c65b33b653b347e3c04c9edc0fed45818ea0a1e6b3142a7e2ab238acd85685e78efad61b4eb60f8582d944f3f1847c438efb19968e86378e7ee9fa8a108b21d32ff7b97562bb62cbc0b69f5628498d31ad5a147b39aa01b48972993a1a2bea296b5d1f846226a63095aeee1810c96048974868a5fc2068d2ac6ead2f4089fbc71970fc64bd79d8140fe71d4387d497a7fbbc26d90b24a39ebce7c0fedc9de9d3048dbeb8dc1c3fdefb1388d79e5a9de2b167370c08c40616ca802f97341083b9102983aed1d6e8bcace91cbc98830f37ada74b3a388d4aaaed8591acceab831939b33380ff532ec1e72ad08451ce7fe715bc3bb3a6075b03a02822a9631edcdf4205286ff0219fb02ca7482aa35e22e75b42ab6360ebfffa380f1876006266e3ae2363ef2d584f8680ec428554619f0d2f226fe8b8809258f0b8fef655e62c8a20d7b642f84f9fb971dde9507e7bc50270c0194083b94eec85cf2e09217d9e161cc65cf2b094726861dffc3ca3675e86e02ba0d1926743b7797086b6b4b621e9c3dff4395a0112d72be834a64871dd8b909671a6afcb557dce3a1e6c4ae7425525e770146f88e2f416731d1ccbbee2a2fd6ac994c3180867d0c7a8bb3b51bd156ff0b143cd990187ca42049f4620027bad90e076c93daa6fb08d858666e1d5186e035c220136865f9c546f0801bb98138ec48e360b5639222f8a1308d2a0a5b4959d967d5fe6e1b84fcf96a3f4893afbc78b77468c4afb2f724d0c10461515477d9b52a8f25bb93c2d4e3f18185bd648d0e12827d1d84bd4977a50037f72721a31656f7f19a120dbb7c5383aece9b5d9342b740c7b69aa2e7bef576304ede49b6da4867cf3dbad0f2924ab3de676ff2cc6bead1006db12ad2aaa7cd493294edd71c636ff9791fcc690be74783b20f9b0d4dd6672bf919f81c1166245217a44fd734a0bd452129726246d9036a5c828ffaf4a52b9ce713d7c76bfad2748b5d84e001cef3bcb79589e16bedfb974abaa545dc896bd74267bbdf67761451931f71") read$char_usb(r1, 0x0, 0x0) 04:59:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma%k', 0x3d, 0x8cffffff}}]}) [ 2735.836776] SELinux: failed to load policy [ 2735.852171] hfsplus: umask requires a value [ 2735.856537] hfsplus: unable to parse mount options 04:59:08 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58"], 0x49) 04:59:08 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000100)='/\xea!_0\xbc\xa5\xc3\x86o#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2735.925485] hfsplus: umask requires a value [ 2735.935277] hfsplus: unable to parse mount options [ 2735.975015] SELinux: failed to load policy 04:59:08 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58"], 0x49) 04:59:08 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x6c00}) [ 2736.030394] hfsplus: unable to parse mount options 04:59:08 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={0x0, {0x2, 0x4e24, @remote}, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e24, @local}, 0x60, 0x0, 0x0, 0x0, 0xffffffffffffffbb, &(0x7f00000000c0)='team0\x00', 0x6, 0x3eb, 0xd2}) 04:59:08 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58"], 0x49) [ 2736.120308] SELinux: failed to load policy [ 2736.125462] hfsplus: umask requires a value [ 2736.138452] hfsplus: unable to parse mount options [ 2736.220447] hfsplus: umask requires a value [ 2736.223732] SELinux: failed to load policy [ 2736.224809] hfsplus: unable to parse mount options 04:59:09 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\n\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:09 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a5800"/85], 0x55) 04:59:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma*k', 0x3d, 0x8cffffff}}]}) 04:59:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x7400}) 04:59:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000140}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x68, r2, 0x10, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0xff, @media='ib\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0xd82dce4a0998dbf1}, 0xa683408d78497770) read$char_usb(r1, 0x0, 0x0) 04:59:09 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) accept(r1, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f00000000c0)={'mangle\x00', 0xe2, "3b6b504254ec455cad722a5c065d1d5540c4b55413c0a0259fdec28293408b8f1af30ac6ed2dc2307f75cf8bbfbf5633276c08dde953eed79d8afa4bf27c329d8775b1f9d2e1fbdee08b3061e4a1a58212dd914ce620220136d44d659318cac717253a7f00d2f4b1b212870f6a641dfc86b333d42bffa8529d982d0e647100dc7ef5275bcd212ad9e9906658e177ef2b2ac27ca2414e5fca93b6b825b183275db7bf0b963ddcc8553f56208df1120b3cb49a9119e9677de0fa36e16dca5341b96876ddfdb5dbe79a7244f985542b79761b6636ca8fb9d2b5340165a7afda03c83874"}, &(0x7f0000000200)=0x106) 04:59:09 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a5800"/85], 0x55) [ 2736.830642] SELinux: failed to load policy [ 2736.835217] hfsplus: umask requires a value [ 2736.848050] hfsplus: unable to parse mount options [ 2736.859513] hfsplus: unable to parse mount options 04:59:09 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x30080, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r1, &(0x7f0000000180), 0x8) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000140)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) r2 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r2, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2736.956045] hfsplus: umask requires a value [ 2736.963967] hfsplus: unable to parse mount options [ 2737.000026] SELinux: failed to load policy 04:59:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma+k', 0x3d, 0x8cffffff}}]}) 04:59:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x7a00}) 04:59:09 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a5800"/85], 0x55) [ 2737.114610] SELinux: failed to load policy 04:59:09 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000"], 0x5b) [ 2737.144425] hfsplus: umask requires a value [ 2737.151626] hfsplus: unable to parse mount options [ 2737.169230] hfsplus: unable to parse mount options [ 2737.262105] hfsplus: umask requires a value [ 2737.270213] hfsplus: unable to parse mount options [ 2737.310753] SELinux: failed to load policy 04:59:10 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\v\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:10 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xedc0}) 04:59:10 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000"], 0x5b) 04:59:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma,k', 0x3d, 0x8cffffff}}]}) 04:59:10 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x2a280) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000001c0)="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") r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) r3 = dup2(r2, 0xffffffffffffffff) read$eventfd(r3, &(0x7f0000000180), 0xfffffffffffffc49) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000000)={&(0x7f0000ffa000/0x4000)=nil, 0x7, 0x1, 0x6a, &(0x7f0000ff9000/0x2000)=nil, 0x2}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000b00)=ANY=[@ANYBLOB="0000000000000006056cff21ac1e0101000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000002004e21ac1e010100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa9de52e22ab6bd7ad36636d490000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414130000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a33e00000000000000000000000000000000000000cf3b219423df2dd7a85ccbe3ba43998a8b2b413acf6f2b018caa006e8ab3dd658f9cc754d05a4904899b426775ca451d69144164e1eeec7dcbb7071bcd8b2f8dcfe037e4b5e467fb36f7febbd4b9cd6024172bd188bcfbf2"], 0x490) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") open(&(0x7f0000000040)='./file0\x00', 0x4000, 0x4) r5 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r5, 0x0, 0x0) 04:59:10 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000"], 0x5b) [ 2737.824223] hfsplus: unable to parse mount options [ 2737.829853] hfsplus: umask requires a value [ 2737.848784] hfsplus: unable to parse mount options [ 2737.897712] vivid-000: kernel_thread() failed 04:59:10 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x100000) fcntl$setflags(r3, 0x2, 0x1) r4 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$rose(0xffffffffffffffff, 0x104, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$DRM_IOCTL_SET_VERSION(r4, 0xc0106407, &(0x7f0000000100)={0x4, 0x80000001, 0x6, 0xfffffffffffffffe}) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x100, 0x80000) 04:59:10 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000000000"], 0x5e) [ 2737.959903] hfsplus: umask requires a value [ 2737.979793] hfsplus: unable to parse mount options 04:59:10 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x40000}) 04:59:10 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000000000"], 0x5e) 04:59:10 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x6, 0x6101) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2738.184438] hfsplus: umask requires a value [ 2738.188907] hfsplus: unable to parse mount options [ 2738.314329] hfsplus: umask requires a value [ 2738.318696] hfsplus: unable to parse mount options 04:59:11 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma-k', 0x3d, 0x8cffffff}}]}) 04:59:11 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a58000000000000000000000000000001000000000000"], 0x5e) 04:59:11 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) sysfs$1(0x1, &(0x7f00000000c0)='/dev/video#\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x10202, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000200)=0x99) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r3 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a9078d15c967cf0c2ffa319e516c56abe5eca3d839ab216d029ae7bfca26467ade28cdbb87847f0000000100000031016cd664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f600000000000000003ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f2443d07007a50728c19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551008000b3cd00a04703"], 0x1}}, 0x8000) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x404000, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000140)=r4, 0x4) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:11 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x7ffff}) [ 2738.816839] hfsplus: umask requires a value [ 2738.837017] hfsplus: unable to parse mount options [ 2738.848295] hfsplus: unable to parse mount options 04:59:11 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) lsetxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x1015, 0x0, 0xffffffff, "d51695dabcb5fde861acb4062686aea8", "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"}, 0x1015, 0x2) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x10840, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x10) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vo37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r2, 0xc038563c, &(0x7f00000000c0)={0x1, 0x0, {0x2, 0x7fff, 0x101, 0x7ff}}) read$char_usb(r1, 0x0, 0x0) 04:59:11 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a580000000000000000000000000000010000000000000000"], 0x60) 04:59:11 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x1fffff}) 04:59:11 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x224084, 0x0) connect$vsock_dgram(r0, &(0x7f0000000100)={0x28, 0x0, 0x0, @reserved}, 0x10) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x801, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r3, &(0x7f0000000180), 0x8) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x304f9b2399ac0756, 0x76f1a89db5239fd9, r3, 0x0) connect$netrom(r2, &(0x7f0000000180)={{0x3, @null, 0x1}, [@null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:11 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a580000000000000000000000000000010000000000000000"], 0x60) 04:59:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma.k', 0x3d, 0x8cffffff}}]}) [ 2739.078782] hfsplus: umask requires a value [ 2739.100440] hfsplus: unable to parse mount options 04:59:11 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000881997e3bacc9842a1614fc6fae5385a580000000000000000000000000000010000000000000000"], 0x60) [ 2739.184342] hfsplus: umask requires a value [ 2739.197944] hfsplus: unable to parse mount options [ 2739.205697] hfsplus: unable to parse mount options 04:59:12 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\r\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:12 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x400000}) 04:59:12 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4f, 0x100) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) socketpair$unix(0x1, 0xc9f6d4d473f9ef1a, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$UI_SET_PROPBIT(r6, 0x4004556e, 0x11) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDDISABIO(r3, 0x4b37) 04:59:12 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa0000800060000000000009a1e5"], 0x2ab) 04:59:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'uma0k', 0x3d, 0x8cffffff}}]}) [ 2739.713708] hfsplus: umask requires a value [ 2739.719725] SELinux: unknown common [ 2739.732557] hfsplus: unable to parse mount options [ 2739.762033] hfsplus: unable to parse mount options 04:59:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r1, &(0x7f0000000180), 0x8) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000040)={0x7, 0x4c4afe1adfabf676, 0x5, "56cc738ba91269751ebeb4ecd36d56af2e9c4e585dcef37afe00d5ca1912fad0", 0x31384142}) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r2, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x10000, 0x0) 04:59:12 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='rdma.current\x00', 0x0, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r3, 0x0) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r4, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r5, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfff}]}, 0x44}, 0x1, 0x0, 0x0, 0x40}, 0x171b7d5013f36f4d) ioctl$VIDIOC_G_FREQUENCY(r2, 0xc02c5638, &(0x7f0000000100)={0xff, 0xf, 0x48e4}) 04:59:12 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa0000800060000000000009a1e5"], 0x2ab) 04:59:12 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x6b6b6b}) 04:59:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umaXk', 0x3d, 0x8cffffff}}]}) [ 2739.983721] SELinux: unknown common 04:59:12 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa0000800060000000000009a1e5"], 0x2ab) [ 2740.012463] hfsplus: umask requires a value [ 2740.022888] hfsplus: unable to parse mount options [ 2740.095020] hfsplus: umask requires a value [ 2740.114265] hfsplus: unable to parse mount options 04:59:12 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r1, &(0x7f0000000180), 0x8) r2 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x0, 0x84440) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f00000001c0)=r1) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x10100, 0x50) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x2901) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000340)=[0x401, 0x8, 0x7, 0x3], 0x4, 0x6, 0x9, 0x3, 0x8, 0x9, {0x0, 0x0, 0x7fffffff, 0x5, 0x5, 0x8, 0x4, 0x4f1d, 0xd6c8, 0x100000000, 0x5, 0xa07, 0xdb, 0xa8a, "a4402362b47d7f9f6e8f6d5616462e5b4598370f1679d9e9b9ad2cc8baeeb4d7"}}) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000280)=""/93) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x800, 0x0) bind$rxrpc(r4, &(0x7f0000000100)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0x0, @rand_addr="9f108016a7a6925da2c2225582df2105", 0x101}}, 0x24) setsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000140)=0x200, 0x4) ustat(0x800, &(0x7f0000000240)) [ 2740.138392] SELinux: unknown common [ 2740.140919] hfsplus: unable to parse mount options 04:59:13 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0e\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:13 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa0000800060000000000009a1e5"], 0x2ab) 04:59:13 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x1000000}) 04:59:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r2, &(0x7f0000000180), 0x8) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000000)=0x31c7) 04:59:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umack', 0x3d, 0x8cffffff}}]}) 04:59:13 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x100080, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000100)={0x1, 0x3, 0x5000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2740.702518] hfsplus: umask requires a value [ 2740.706893] hfsplus: unable to parse mount options [ 2740.718781] SELinux: unknown common [ 2740.739478] sel_write_load: 11 callbacks suppressed [ 2740.739483] SELinux: failed to load policy [ 2740.747512] hfsplus: unable to parse mount options 04:59:13 executing program 4: write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa0000800060000000000009a1e5"], 0x2ab) [ 2740.821603] hfsplus: umask requires a value [ 2740.826229] hfsplus: unable to parse mount options 04:59:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f0000000240)={0x2, 0x1}) r2 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x100) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r3, 0x0) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) pwrite64(r5, &(0x7f0000000100)="3e53c99539fbd2f88bb00ead12d4f17b54b361263d3b8f3f0a6d9fab04f0c1838a25658870f8ee1776b20c317c787d5555b1173664188c", 0x37, 0x0) ioctl$SIOCGETLINKNAME(r4, 0x89e0, &(0x7f00000001c0)={0x3, 0x3}) preadv(r2, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x13}], 0x1, 0x0) 04:59:13 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x2000000}) 04:59:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000000)={0x7, 0x4d, 0x2}, 0x7) read$char_usb(r1, 0x0, 0x0) 04:59:13 executing program 4: write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa0000800060000000000009a1e5"], 0x2ab) 04:59:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umadk', 0x3d, 0x8cffffff}}]}) [ 2741.022136] hfsplus: umask requires a value [ 2741.035315] hfsplus: unable to parse mount options [ 2741.098332] hfsplus: umask requires a value [ 2741.109316] hfsplus: unable to parse mount options [ 2741.231332] hfsplus: unable to parse mount options 04:59:14 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x10\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:14 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x3000000}) 04:59:14 executing program 4: write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa0000800060000000000009a1e5"], 0x2ab) 04:59:14 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r0, &(0x7f0000000180), 0x8) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f00000000c0)={0x9, [0x81, 0xf9, 0x800, 0x7ff, 0x0, 0xb, 0x2, 0x4, 0x40, 0x61cf, 0xfff, 0x8, 0x6, 0x6, 0x100000000000000, 0xd0ad, 0x100000001, 0xfffffffffffffff7, 0x101, 0x29, 0x3, 0x9, 0x10000, 0x1, 0xffffffff, 0x3, 0x5, 0x200, 0x1, 0x2, 0x9351, 0x72, 0xff, 0x22, 0x1, 0x40, 0x0, 0x80000001, 0x0, 0xffffffff, 0x8, 0x8001, 0x8000, 0x1f, 0x4, 0x1, 0x401, 0x2]}) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umaik', 0x3d, 0x8cffffff}}]}) [ 2741.615736] hfsplus: umask requires a value 04:59:14 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa0000800060000000000009a1e5"], 0x2ab) [ 2741.638890] hfsplus: unable to parse mount options [ 2741.647756] hfsplus: unable to parse mount options 04:59:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = accept(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB="818fd6f567e9eeba3190cb5bb8236a0232744cf9adb32ca8993dae905cad7b48f9f961e9696a619f54281f91be69ed31bd2e00e187b5e116112424cf3797bb0f6aa6e26f314fd91bcfadef9218f6879026f5142cea29e75bcc823e1ccde331f6d76e35dbc85fa282dafc2732d48686174bc3b6ec201385", @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYPTR64, @ANYRES32], @ANYPTR64, @ANYRES64=0x0], 0x4}, 0x1, 0x0, 0x0, 0x80}, 0x8000) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000200)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000140)=0xe8) sendto$packet(r1, &(0x7f0000000040)="27d4fe885d590c18b57c7918437778fd6ab43f932c3ce2d7abaa19f5097f874b505c41fcee625f9efe7817289f7b2ea8365dae2441dfb9c1186453d732d94d0f9e99fd4f04344b776c67805b191781d643538d2d661a56932ff99cabedc1a9aa9f68613f89c62de7c41fe549cf1794c817af3d33268ac9d20d45b419966b7b492df079158f42fcee4114e15ee25006c2cbf7cc474900d698", 0x98, 0x4, &(0x7f0000000480)={0x11, 0x1a, r5, 0x1, 0x9, 0x6, @dev={[], 0x1b}}, 0x14) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x100) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e22, 0x20000000000000, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r6, 0x0) accept(r6, 0x0, 0x0) r7 = syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x1, 0x104201) preadv(r7, &(0x7f0000000340)=[{&(0x7f0000000180)=""/87, 0x3ad}, {&(0x7f0000000380)=""/233, 0xe9}, {&(0x7f0000000300)=""/32, 0xd}], 0x100003a3, 0x80000) 04:59:14 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x4000000}) 04:59:14 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa0000800060000000000009a1e5"], 0x2ab) [ 2741.897353] hfsplus: umask requires a value [ 2741.908123] hfsplus: unable to parse mount options 04:59:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000040)='security.SMACK64MMAP\x00', &(0x7f0000000080)='user\x00', 0x5, 0x1) read$char_usb(r1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000000)={0x3, [0x4, 0x5, 0x4]}, 0xa) 04:59:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umalk', 0x3d, 0x8cffffff}}]}) 04:59:14 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000580)=[{&(0x7f00000001c0)=""/86, 0x56}, {&(0x7f0000000240)=""/246, 0xf6}, {&(0x7f00000000c0)=""/63, 0x3f}, {&(0x7f0000000340)=""/50, 0x32}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/205, 0xcd}], 0x6, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="7684a746cdd2b9087f133eaa21880b81f748961ce16432a7d1a81b8b9467600000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r8, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r8, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@rand_addr="42d994c6e10d32db22e34c3045323718", @in6=@mcast2, 0x4e23, 0x8, 0x4e23, 0x3, 0xa, 0x20, 0xc4a98f701e28bba0, 0x5e, r8}, {0x9, 0x5, 0x5, 0xffff, 0x8000, 0x6, 0x6, 0x1ff}, {0x91e, 0x4, 0x7, 0x6}, 0xfff, 0x0, 0x1, 0x0, 0x335c7c8590dec653, 0x4}, {{@in=@multicast2, 0x4d4, 0x33}, 0xa, @in=@broadcast, 0x0, 0x3, 0x0, 0x81, 0x8, 0x2}}, 0xe8) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r13}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r13, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r14 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r15, r16) setsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@rand_addr="42d994c6e10d32db22e34c3045323718", @in6=@mcast2, 0x4e23, 0x8, 0x4e23, 0x3, 0xa, 0x20, 0xc4a98f701e28bba0, 0x5e, r13, r15}, {0x9, 0x5, 0x5, 0xffff, 0x8000, 0x6, 0x6, 0x1ff}, {0x91e, 0x4, 0x7, 0x6}, 0xfff, 0x0, 0x1, 0x0, 0x335c7c8590dec653, 0x4}, {{@in=@multicast2, 0x4d4, 0x33}, 0xa, @in=@broadcast, 0x0, 0x3, 0x0, 0x81, 0x8, 0x2}}, 0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000040)={{{@in=@multicast2, @in6=@mcast1, 0x4e20, 0x3, 0x4e21, 0x40, 0xd, 0x0, 0x74631cc7744eee29, 0x87, r8, r15}, {0x7, 0xfdf2, 0x7, 0xfac033e, 0x5c45, 0x9, 0xf96, 0x81}, {0x9, 0xd8, 0x100000001, 0x4}, 0x1, 0x6e6bb7, 0x0, 0x0, 0x1, 0x6}, {{@in6=@mcast2, 0x4d3, 0x32}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x1f}, 0x3506, 0x3, 0x0, 0x100000001, 0x10000, 0x7, 0xffff}}, 0xe8) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@rand_addr="5369e4604114a7432765a61c2435ecf5", @remote, @ipv4={[], [], @multicast2}, 0x401, 0x7fff, 0x3d, 0x100, 0x7fffffff, 0x1200000, r8}) listen(r1, 0x0) r17 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r17, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) accept4$rose(r1, 0xfffffffffffffffe, &(0x7f0000000140), 0xc0800) [ 2741.967623] hfsplus: umask requires a value [ 2741.972920] hfsplus: unable to parse mount options [ 2742.096944] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2742.100847] hfsplus: unable to parse mount options 04:59:14 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x11\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:14 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa0000800060000000000009a1e5"], 0x2ab) 04:59:14 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x5000000}) 04:59:14 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) sendto$netrom(r0, &(0x7f00000000c0)="dc08c55a94c346350624536781ab52ba9c9e6904d2ada27e85a66d477695bf023af9287e419bb2af90744fc7302933e71db70430ab2ec9ce815e50404f1e0f21fc3a7b983244d5280c502c782d458471303ce6c9dcc269fb407673cde1689b5ccfae291dfb4893431632806ab6c2deb41b401ef2f024ffa901ab3239a95a9a010b0ffd11dc4ee2f468c46562863c940a9a27c4ccaa7314166f0fe0aadfca1ceb3bc6585e7e140132ae06e9b3191ec755ea8b4fbb1899eb68dea26af377468a1ddb998426cce9d23431722cf8394b892cef396dc6b7fcb33b62a9cca367b6cd18b1eb5f7ad5", 0xe5, 0x80, &(0x7f00000001c0)={{0x3, @default, 0x2}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast]}, 0x48) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x40, &(0x7f0000000240), &(0x7f0000000280)=0x4) 04:59:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x18) read$char_usb(r1, 0x0, 0x0) 04:59:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umaok', 0x3d, 0x8cffffff}}]}) 04:59:15 executing program 4: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa0000800060000000000009a1e5"], 0x2ab) [ 2742.559556] hfsplus: umask requires a value [ 2742.563981] hfsplus: unable to parse mount options [ 2742.662886] hfsplus: umask requires a value [ 2742.667253] hfsplus: unable to parse mount options [ 2742.672809] hfsplus: unable to parse mount options 04:59:15 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f00000024c0)=[{&(0x7f00000000c0)=""/47, 0x2f}, {&(0x7f0000000100)=""/165, 0xa5}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/107, 0x6b}, {&(0x7f0000001240)=""/255, 0xff}, {&(0x7f0000001340)=""/223, 0x7c}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/114, 0x72}], 0x8, 0x0) 04:59:15 executing program 4: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa0000800060000000000009a1e5"], 0x2ab) 04:59:15 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x6000000}) 04:59:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umapk', 0x3d, 0x8cffffff}}]}) 04:59:15 executing program 4: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa0000800060000000000009a1e5"], 0x2ab) [ 2742.907763] hfsplus: umask requires a value [ 2742.915409] hfsplus: unable to parse mount options [ 2742.981320] hfsplus: umask requires a value [ 2742.985936] hfsplus: unable to parse mount options [ 2742.993203] hfsplus: unable to parse mount options 04:59:16 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000200)=0xcc1312cc80a05e58, 0x4) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r2, &(0x7f0000000180), 0x8) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x1000, 0x1}) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000100), &(0x7f0000000140)=0x4) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:16 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 04:59:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x7000000}) 04:59:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umauk', 0x3d, 0x8cffffff}}]}) 04:59:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getown(r2, 0x9) read$char_usb(r1, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) 04:59:16 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x12\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2743.598240] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2743.617898] hfsplus: umask requires a value [ 2743.642302] hfsplus: unable to parse mount options [ 2743.644915] hfsplus: unable to parse mount options [ 2743.657930] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2743.672919] CPU: 0 PID: 1314 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2743.679800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2743.689193] Call Trace: [ 2743.691799] dump_stack+0x172/0x1f0 [ 2743.695443] warn_alloc.cold+0x7b/0x173 [ 2743.699427] ? zone_watermark_ok_safe+0x260/0x260 [ 2743.704283] ? lock_downgrade+0x810/0x810 [ 2743.708453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2743.714000] ? avc_has_perm+0x404/0x610 [ 2743.717989] __vmalloc_node_range+0x486/0x790 [ 2743.722499] ? sel_write_load+0x1de/0x470 [ 2743.726659] vmalloc+0x6b/0x90 [ 2743.729857] ? sel_write_load+0x1de/0x470 [ 2743.734010] sel_write_load+0x1de/0x470 [ 2743.737996] __vfs_write+0x114/0x810 [ 2743.741718] ? sel_make_policy_nodes+0x1520/0x1520 [ 2743.746651] ? kernel_read+0x120/0x120 [ 2743.750562] ? __lock_is_held+0xb6/0x140 [ 2743.754646] ? rcu_read_lock_sched_held+0x110/0x130 [ 2743.759667] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2743.764426] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2743.769969] ? __sb_start_write+0x1a9/0x360 [ 2743.775865] vfs_write+0x20c/0x560 [ 2743.779428] ksys_write+0x14f/0x2d0 [ 2743.783067] ? __ia32_sys_read+0xb0/0xb0 [ 2743.787828] ? do_syscall_64+0x26/0x620 [ 2743.791806] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2743.797177] ? do_syscall_64+0x26/0x620 [ 2743.801165] __x64_sys_write+0x73/0xb0 [ 2743.805062] do_syscall_64+0xfd/0x620 [ 2743.808871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2743.814063] RIP: 0033:0x4598e9 [ 2743.817258] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2743.836165] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2743.843906] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2743.851178] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 2743.858449] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2743.865720] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2743.872992] R13: 00000000004c9b57 R14: 00000000004e12c8 R15: 00000000ffffffff 04:59:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bind$inet(r1, &(0x7f00000015c0)={0x2, 0x4e21, @local}, 0x10) preadv(r0, &(0x7f0000001500)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/10, 0xa}, {&(0x7f0000001100)=""/22, 0x16}, {&(0x7f0000001140)=""/47, 0x2f}, {&(0x7f0000001180)=""/111, 0x6f}, {&(0x7f0000001200)=""/153, 0x99}, {&(0x7f00000012c0)=""/133, 0x85}, {&(0x7f0000001380)=""/56, 0x38}, {&(0x7f00000013c0)=""/178, 0xb2}, {&(0x7f0000001480)=""/124, 0x7c}], 0xa, 0x4e) r2 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r3, 0x0) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x8000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r6, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$inet6_mreq(r6, 0x29, 0xe, &(0x7f0000001a80)={@mcast1}, &(0x7f0000001ac0)=0x14) connect$nfc_llcp(r4, &(0x7f0000001600)={0x27, 0x0, 0x2, 0x3, 0x8001, 0x7fff, "dfb3176db9ea786f15612281d65febad88ee16d9eb32bb4a2d28a9e99743e4dfc80e1cdf17804d88ece6cd5ffc610f2a486f2dfbe6416ba91d8d00f52e32a5", 0x3d}, 0x60) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r8, 0x0) r9 = accept(r8, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r9, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5ec030039ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b4494358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b1e56a20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$inet6_buf(r9, 0x29, 0x4d, &(0x7f0000001b40)=""/151, &(0x7f0000001c00)=0x97) syz_open_dev$radio(&(0x7f0000001b00)='/dev/radio#\x00', 0x3, 0x2) bind$inet6(r7, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r7, 0x0) r10 = accept(r7, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r10, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001c40)=ANY=[@ANYBLOB="977d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c5684e5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a6813ad93defbb582c91e2c446d38c31bb7c16250c445907007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600684c230647f160e7f79c16908272319f6270ea82a0c85cfd0000"], 0x1}}, 0x8000) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001800)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r10, &(0x7f0000001a40)={&(0x7f00000017c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001a00)={&(0x7f0000001840)={0x1bc, r11, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0xe8, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdb}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf52e}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_BEARER={0x6c, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'gre0\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6c5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x40}]}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x40000005}, 0x5000) preadv(r2, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2743.920190] Mem-Info: [ 2743.942942] active_anon:121906 inactive_anon:192 isolated_anon:0 [ 2743.942942] active_file:5198 inactive_file:12750 isolated_file:0 [ 2743.942942] unevictable:0 dirty:177 writeback:0 unstable:0 [ 2743.942942] slab_reclaimable:21531 slab_unreclaimable:429101 [ 2743.942942] mapped:59550 shmem:245 pagetables:5341 bounce:0 [ 2743.942942] free:929215 free_pcp:417 free_cma:0 04:59:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x8000000}) 04:59:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umaxk', 0x3d, 0x8cffffff}}]}) [ 2743.989726] Node 0 active_anon:463748kB inactive_anon:768kB active_file:20412kB inactive_file:28892kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238200kB dirty:696kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2744.094776] Node 1 active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:12kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 04:59:16 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f0000000080), 0x80000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) ioctl(r1, 0x1000008915, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0xdd0c8e5b26c2678c}, 0x10) [ 2744.154011] hfsplus: umask requires a value [ 2744.162258] hfsplus: unable to parse mount options [ 2744.215575] Node 0 DMA free:11248kB min:220kB low:272kB high:324kB active_anon:2052kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2744.251255] lowmem_reserve[]: 0 2555 2557 2557 04:59:16 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) times(&(0x7f00000000c0)) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x3, 0x8000) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000100)={0x1, 0x0, {0xffffffffffffffe0, 0x81, 0x2024, 0x1, 0x8, 0x1, 0x3, 0x5}}) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2744.265140] Node 0 DMA32 free:55328kB min:36248kB low:45308kB high:54368kB active_anon:461596kB inactive_anon:768kB active_file:20412kB inactive_file:28880kB unevictable:0kB writepending:696kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10400kB pagetables:16328kB bounce:0kB free_pcp:1404kB local_pcp:1100kB free_cma:0kB [ 2744.303489] hfsplus: unable to parse mount options 04:59:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x9000000}) [ 2744.329529] lowmem_reserve[]: 0 0 2 2 [ 2744.337414] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2744.365468] lowmem_reserve[]: 0 0 0 0 [ 2744.375591] Node 1 Normal free:3650924kB min:53608kB low:67008kB high:80408kB active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB writepending:12kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2464kB pagetables:4884kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2744.412775] lowmem_reserve[]: 0 0 0 0 [ 2744.417188] Node 0 DMA: 14*4kB (UME) 127*8kB (UME) 64*16kB (UME) 28*32kB (UM) 5*64kB (UM) 4*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 11248kB [ 2744.444271] Node 0 DMA32: 4119*4kB (UMEH) 631*8kB (UMEH) 253*16kB (UMEH) 432*32kB (UMH) 197*64kB (UME) 4*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 52516kB [ 2744.463730] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB 04:59:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="eaf7c61d688a195923a7b20ca92774a5d5b9f79921ec9770106eb1f57725f039cc9236cf078f36517c9ff4968064162a95233cdb4f82c8dcad782916d68d2c68d6625ac9cf85f1e71f09ce723e2bcbb3d81d0d5078cdbcb96dd0e3426fdd364b4468cc3829c92e85800277ac59ef07337abbc5d4c6fb11d787f238652233504695b4") r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0xac524ec18e2e4f48, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000000c0)={r4, 0x0, 0x5976c3ade426790e, 0x80000000, 0xfffffffffffffffa}, &(0x7f0000000100)=0x18) r5 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) iopl(0x3) read$char_usb(r5, 0x0, 0x0) r6 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000040), 0x4) [ 2744.481206] Node 1 Normal: 677*4kB (UME) 3421*8kB (UME) 2549*16kB (UME) 1199*32kB (UME) 515*64kB (UME) 168*128kB (UME) 32*256kB (UME) 15*512kB (UM) 10*1024kB (UM) 2*2048kB (UE) 844*4096kB (UM) = 3650924kB [ 2744.504892] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2744.515041] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2744.524779] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2744.535163] hfsplus: umask requires a value [ 2744.540884] hfsplus: unable to parse mount options [ 2744.546606] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2744.556899] 18191 total pagecache pages [ 2744.561978] 0 pages in swap cache [ 2744.566022] Swap cache stats: add 0, delete 0, find 0/0 [ 2744.572463] Free swap = 0kB [ 2744.578274] Total swap = 0kB [ 2744.598133] hfsplus: umask requires a value [ 2744.605504] 1965979 pages RAM [ 2744.610775] hfsplus: unable to parse mount options [ 2744.611747] 0 pages HighMem/MovableOnly [ 2744.628969] vivid-000: kernel_thread() failed 04:59:17 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 04:59:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umas\n', 0x3d, 0x8cffffff}}]}) 04:59:17 executing program 2: pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x8000) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000180)=0x100000001, 0x4) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="02d0e9500f29bae36d170ee612d8bfa49f4f0ba35ba21dfbe69b639fee3deee7afedb1491124086ca8c6414b695113478cef92c10d6b18d5ba7b1ab27c7af1080ccf36653c8e33d1a1ece4592bcbc86b62f1e8c51098b7b6371fe3eef29e19d1a34d651ccd612229a92bd039ae3d8ac25ea3ec7d5621375efb5ee1d5a64f2c0a8b2f3424c0abf00df52cd4238b149ecaa3d7bd7d0e8e176305b3e692aba5cff28829681ab107b17095faf2f5adde6330e2e9ecb0e8613626d8f5cda20bd78ca5394e338d7640ee726c17"], 0x6, 0x3) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x44001, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r2, &(0x7f0000000180), 0x8) lgetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.advise\x00', &(0x7f0000000600)=""/244, 0xf4) ioctl$VIDIOC_DBG_S_REGISTER(r2, 0x4038564f, &(0x7f0000000100)={{0x2, @name="0fe50879e8ff1bff52802bebac3d8a339c138824cccf16b02288e19686c6dccd"}, 0x8, 0x1, 0x100000000000006}) [ 2744.651025] 338856 pages reserved [ 2744.654516] 0 pages cma reserved 04:59:17 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xa000000}) [ 2744.778084] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) 04:59:17 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\ny\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2744.824785] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2744.832478] CPU: 1 PID: 2178 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2744.839343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2744.839349] Call Trace: [ 2744.839373] dump_stack+0x172/0x1f0 [ 2744.839396] warn_alloc.cold+0x7b/0x173 [ 2744.839411] ? zone_watermark_ok_safe+0x260/0x260 [ 2744.839427] ? lock_downgrade+0x810/0x810 [ 2744.839454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2744.839472] ? avc_has_perm+0x404/0x610 [ 2744.839498] __vmalloc_node_range+0x486/0x790 [ 2744.839518] ? sel_write_load+0x1de/0x470 [ 2744.839533] vmalloc+0x6b/0x90 [ 2744.839548] ? sel_write_load+0x1de/0x470 [ 2744.839562] sel_write_load+0x1de/0x470 [ 2744.839581] __vfs_write+0x114/0x810 [ 2744.839597] ? sel_make_policy_nodes+0x1520/0x1520 [ 2744.839612] ? kernel_read+0x120/0x120 [ 2744.839629] ? __lock_is_held+0xb6/0x140 [ 2744.839653] ? rcu_read_lock_sched_held+0x110/0x130 [ 2744.839667] ? rcu_sync_lockdep_assert+0x6d/0xb0 04:59:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umas\"', 0x3d, 0x8cffffff}}]}) [ 2744.839679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2744.839696] ? __sb_start_write+0x1a9/0x360 [ 2744.914216] vfs_write+0x20c/0x560 [ 2744.914235] ksys_write+0x14f/0x2d0 [ 2744.940990] ? __ia32_sys_read+0xb0/0xb0 [ 2744.945072] ? do_syscall_64+0x26/0x620 [ 2744.949060] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2744.954435] ? do_syscall_64+0x26/0x620 [ 2744.958426] __x64_sys_write+0x73/0xb0 [ 2744.962327] do_syscall_64+0xfd/0x620 [ 2744.966133] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2744.966144] RIP: 0033:0x4598e9 [ 2744.966157] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2744.966164] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2744.966178] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2744.966190] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 2744.966198] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:59:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) r2 = fanotify_init(0x2, 0x0) write$binfmt_elf32(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x29f) read$char_usb(r1, 0x0, 0x0) r3 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x10040, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$FS_IOC_SETVERSION(r5, 0x40087602, &(0x7f0000000180)=0x81) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000000c0)) sendfile(r3, r4, &(0x7f0000000040), 0x0) [ 2744.966205] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2744.966213] R13: 00000000004c9b57 R14: 00000000004e12c8 R15: 00000000ffffffff [ 2745.011524] hfsplus: umask requires a value [ 2745.017201] Mem-Info: [ 2745.047578] hfsplus: unable to parse mount options [ 2745.055588] active_anon:121994 inactive_anon:192 isolated_anon:0 [ 2745.055588] active_file:5198 inactive_file:12761 isolated_file:0 [ 2745.055588] unevictable:0 dirty:177 writeback:0 unstable:0 [ 2745.055588] slab_reclaimable:21533 slab_unreclaimable:429298 [ 2745.055588] mapped:59550 shmem:245 pagetables:5283 bounce:0 [ 2745.055588] free:928729 free_pcp:656 free_cma:0 04:59:17 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') accept(r3, 0x0, 0x0) socketpair$unix(0x1, 0xd40ddb388caea1b8, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = fcntl$dupfd(r2, 0x203, r4) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f0000000100)={0x6, {0x2, 0x2, 0x81, 0x6}, {0x9, 0x0, 0x80000000, 0x2}, {0x20, 0x5}}) getpriority(0x2, r1) [ 2745.115294] Node 0 active_anon:463700kB inactive_anon:768kB active_file:20412kB inactive_file:28936kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238200kB dirty:696kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2745.166281] Node 1 active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:12kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2745.202292] Node 0 DMA free:11248kB min:220kB low:272kB high:324kB active_anon:2052kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2745.249266] hfsplus: umask requires a value [ 2745.254461] hfsplus: unable to parse mount options [ 2745.261640] lowmem_reserve[]: 0 2555 2557 2557 [ 2745.267994] hfsplus: unable to parse mount options [ 2745.268053] Node 0 [ 2745.286278] DMA32 free:53880kB min:36248kB low:45308kB high:54368kB active_anon:461648kB inactive_anon:768kB active_file:20412kB inactive_file:28924kB unevictable:0kB writepending:696kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10464kB pagetables:16392kB bounce:0kB free_pcp:2428kB local_pcp:504kB free_cma:0kB [ 2745.328905] lowmem_reserve[]: 0 0 2 2 [ 2745.335278] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2745.368041] lowmem_reserve[]: 0 0 0 0 04:59:17 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x10000000}) [ 2745.372417] Node 1 Normal free:3650924kB min:53608kB low:67008kB high:80408kB active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB writepending:12kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2464kB pagetables:4884kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2745.428809] lowmem_reserve[]: 0 0 0 0 [ 2745.438815] Node 0 DMA: 14*4kB (UME) 127*8kB [ 2745.444409] (UME) 64*16kB (UME) 28*32kB (UM) 5*64kB (UM) 4*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 11248kB 04:59:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umas%', 0x3d, 0x8cffffff}}]}) 04:59:18 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x9, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_getsetattr(r3, &(0x7f00000000c0)={0x9, 0x2b, 0x3, 0x7ff, 0x20, 0x4, 0x8, 0x6}, &(0x7f0000000100)) [ 2745.468801] Node 0 DMA32: 4117*4kB (UMEH) 582*8kB (UMEH) 233*16kB (UMEH) 433*32kB (UMH) 198*64kB (UME) 4*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51892kB [ 2745.516395] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB 04:59:18 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r0, &(0x7f0000000180), 0x8) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000040)=0x80000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}, 0x20) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000000)={r6, 0x7}, 0x8) r7 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r7, 0x0, 0x0) [ 2745.574391] Node 1 Normal: 677*4kB (UME) 3421*8kB (UME) 2549*16kB (UME) 1199*32kB (UME) 515*64kB (UME) 168*128kB (UME) 32*256kB (UME) 15*512kB (UM) 10*1024kB (UM) 2*2048kB (UE) 844*4096kB (UM) = 3650924kB [ 2745.604767] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2745.607260] hfsplus: umask requires a value [ 2745.616784] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2745.632355] hfsplus: unable to parse mount options [ 2745.640391] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2745.685020] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2745.698797] hfsplus: umask requires a value [ 2745.704707] hfsplus: unable to parse mount options [ 2745.706579] 18212 total pagecache pages [ 2745.718110] 0 pages in swap cache [ 2745.724693] hfsplus: unable to parse mount options 04:59:18 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x110e0000}) 04:59:18 executing program 2: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) accept(r0, 0x0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)=""/19, 0xa}], 0xa7, 0x200000084) 04:59:18 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 2745.733445] Swap cache stats: add 0, delete 0, find 0/0 [ 2745.738912] Free swap = 0kB [ 2745.744136] Total swap = 0kB [ 2745.747282] 1965979 pages RAM [ 2745.754772] 0 pages HighMem/MovableOnly [ 2745.758866] 338856 pages reserved [ 2745.765231] 0 pages cma reserved 04:59:18 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)=0x8) ioctl(r0, 0x4000000000007, &(0x7f0000000380)="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") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x4000) read$char_usb(r1, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000000)={{0xfffffffffffffff8, 0x772d}, 0x0, 0x10001, 0x4, {0x8, 0xa37}, 0x0, 0x5}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r3, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r3, 0x1) recvfrom$inet6(r3, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_G_JPEGCOMP(0xffffffffffffffff, 0x808c563d, &(0x7f00000002c0)) listen(r4, 0x0) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r6 = dup2(r5, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TUNGETSNDBUF(r6, 0x800454d3, &(0x7f00000000c0)) [ 2745.910954] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2745.945511] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2745.951619] CPU: 0 PID: 2939 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2745.958486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2745.967857] Call Trace: [ 2745.970470] dump_stack+0x172/0x1f0 [ 2745.974126] warn_alloc.cold+0x7b/0x173 [ 2745.978123] ? zone_watermark_ok_safe+0x260/0x260 [ 2745.982979] ? lock_downgrade+0x810/0x810 [ 2745.987155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2745.992708] ? avc_has_perm+0x404/0x610 [ 2745.996708] __vmalloc_node_range+0x486/0x790 [ 2746.001232] ? sel_write_load+0x1de/0x470 [ 2746.005394] vmalloc+0x6b/0x90 [ 2746.008599] ? sel_write_load+0x1de/0x470 [ 2746.012759] sel_write_load+0x1de/0x470 [ 2746.016750] __vfs_write+0x114/0x810 [ 2746.020478] ? sel_make_policy_nodes+0x1520/0x1520 [ 2746.025422] ? kernel_read+0x120/0x120 [ 2746.029416] ? __lock_is_held+0xb6/0x140 [ 2746.033497] ? rcu_read_lock_sched_held+0x110/0x130 [ 2746.038525] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2746.043298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2746.048850] ? __sb_start_write+0x1a9/0x360 [ 2746.053185] vfs_write+0x20c/0x560 [ 2746.056746] ksys_write+0x14f/0x2d0 04:59:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r1 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000200)=r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r5, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup2(r8, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r11, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r11, 0x0) r12 = accept(r11, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r12, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b9abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r12, 0x0, 0x488, &(0x7f0000000340)={{0x11, @loopback, 0x4e21, 0x3, 'wrr\x00', 0x12, 0xfffffffffffffffc, 0x71}, {@local, 0x4e23, 0x1, 0x67, 0x1, 0x7}}, 0x44) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x8, &(0x7f0000000100)=@raw=[@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4}, @exit, @map_val={0x18, 0x1, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x3f}, @map={0x18, 0x5, 0x1, 0x0, r10}], &(0x7f0000000200)='GPLz', 0x5, 0xc3, &(0x7f00000006c0)=""/195, 0x1e00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffff800, 0x200000000000}, 0x10}, 0x70) r13 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r10, &(0x7f0000000680), 0xf4) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r13, 0x1da5c043695e6395, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x115) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)=r14, 0x4) r15 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r15, &(0x7f0000000180), 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r1, r15, 0x0, 0x8, &(0x7f0000000180)='trusted\x00', r14}, 0x30) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) exit(0x0) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000600)='./file0\x00', 0x10001, 0x2, &(0x7f00000008c0)=[{&(0x7f00000007c0)="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", 0xff, 0x40}, {&(0x7f0000000640)="8f41284e817170d4965b1745e942d1e773c0c034431094b03310d96b51bb30f65f565c786fdd60073c5f9cfda0ad", 0x2e, 0x5}], 0x20000, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2746.060390] ? __ia32_sys_read+0xb0/0xb0 [ 2746.064459] ? do_syscall_64+0x26/0x620 [ 2746.068435] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2746.073805] ? do_syscall_64+0x26/0x620 [ 2746.077796] __x64_sys_write+0x73/0xb0 [ 2746.081710] do_syscall_64+0xfd/0x620 [ 2746.085530] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2746.090718] RIP: 0033:0x4598e9 [ 2746.093916] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2746.112817] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2746.120532] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2746.127800] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 2746.135072] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2746.142346] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2746.149614] R13: 00000000004c9b57 R14: 00000000004e12c8 R15: 00000000ffffffff 04:59:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umas,', 0x3d, 0x8cffffff}}]}) [ 2746.157391] protocol 88fb is buggy, dev hsr_slave_0 [ 2746.158338] hfsplus: umask requires a value [ 2746.162516] protocol 88fb is buggy, dev hsr_slave_1 [ 2746.162611] protocol 88fb is buggy, dev hsr_slave_0 [ 2746.172023] hfsplus: unable to parse mount options [ 2746.177092] protocol 88fb is buggy, dev hsr_slave_1 [ 2746.247808] hfsplus: umask requires a value [ 2746.250537] Mem-Info: [ 2746.255528] active_anon:121895 inactive_anon:192 isolated_anon:0 [ 2746.255528] active_file:5198 inactive_file:12771 isolated_file:0 [ 2746.255528] unevictable:0 dirty:171 writeback:0 unstable:0 [ 2746.255528] slab_reclaimable:21526 slab_unreclaimable:429511 [ 2746.255528] mapped:59550 shmem:245 pagetables:5344 bounce:0 [ 2746.255528] free:928848 free_pcp:368 free_cma:0 [ 2746.258046] hfsplus: unable to parse mount options 04:59:18 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000001080), &(0x7f00000010c0)=0x4) setsockopt$sock_int(r1, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r1) preadv(r1, &(0x7f0000001040)=[{&(0x7f0000000040)=""/4096, 0x1000}], 0x1, 0x0) [ 2746.367943] Node 0 active_anon:463604kB inactive_anon:768kB active_file:20412kB inactive_file:28976kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238200kB dirty:672kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 04:59:18 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7f, 0x40000) 04:59:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f0000000180)=0xfffffffffffffe9c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r3 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r3, 0x0, 0x0) [ 2746.399403] Node 1 active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:12kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2746.428250] Node 0 DMA free:11248kB min:220kB low:272kB high:324kB active_anon:2052kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2746.473977] lowmem_reserve[]: 0 2555 2557 2557 [ 2746.478790] Node 0 DMA32 free:53596kB min:36248kB low:45308kB high:54368kB active_anon:461552kB inactive_anon:768kB active_file:20412kB inactive_file:28964kB unevictable:0kB writepending:672kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10240kB pagetables:16192kB bounce:0kB free_pcp:2312kB local_pcp:1376kB free_cma:0kB 04:59:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x1f000000}) [ 2746.527947] lowmem_reserve[]: 0 0 2 2 [ 2746.541821] hfsplus: unable to parse mount options [ 2746.544711] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2746.587925] lowmem_reserve[]: 0 0 0 0 [ 2746.594784] Node 1 Normal free:3650924kB min:53608kB low:67008kB high:80408kB active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB writepending:12kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2464kB pagetables:4884kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2746.638014] lowmem_reserve[]: 0 0 0 0 [ 2746.646661] Node 0 DMA: 14*4kB (UME) 127*8kB (UME) 64*16kB (UME) 28*32kB (UM) 5*64kB (UM) 4*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 11248kB [ 2746.668545] Node 0 DMA32: 4367*4kB (UMEH) 429*8kB (UMEH) 135*16kB (UMEH) 436*32kB (UMH) 198*64kB (UME) 21*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 52372kB 04:59:19 executing program 2: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x13}], 0x1, 0x0) 04:59:19 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r3, 0x0) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001280)='/dev/btrfs-control\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f000095dffc)=0x1cf) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000040)={0x1, 0x9, 0x9, 0x8, r7}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000000c0)={r7, 0x6}, &(0x7f0000000100)=0xfffffffffffffe98) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2746.708775] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2746.733320] Node 1 Normal: 677*4kB (UME) 3421*8kB (UME) 2549*16kB (UME) 1199*32kB (UME) 515*64kB (UME) 168*128kB (UME) 32*256kB (UME) 15*512kB (UM) 10*1024kB (UM) 2*2048kB (UE) 844*4096kB (UM) = 3650924kB [ 2746.788659] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2746.798165] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2746.816440] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 04:59:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x22, 0x8cffffff}}]}) [ 2746.841893] hfsplus: umask requires a value [ 2746.846987] hfsplus: unable to parse mount options [ 2746.859449] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2746.881194] 18223 total pagecache pages [ 2746.886146] 0 pages in swap cache [ 2746.891219] Swap cache stats: add 0, delete 0, find 0/0 [ 2746.916068] hfsplus: umask requires a value [ 2746.922986] Free swap = 0kB [ 2746.929227] hfsplus: unable to parse mount options [ 2746.935226] Total swap = 0kB [ 2746.952746] 1965979 pages RAM [ 2746.971838] 0 pages HighMem/MovableOnly 04:59:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x20000000}) [ 2746.997242] 338856 pages reserved 04:59:19 executing program 2: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x100000000d, 0x105000) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000040)={0x516b, 0x6, 0x4, 0x0, {}, {0x1, 0x0, 0x8, 0x66, 0x20, 0x3, "de3fc7e1"}, 0x3224, 0x3, @offset=0x6, 0x4}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r0, 0x1) recvfrom$inet6(r0, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x101, 0x1, 0x8000000000000000}) 04:59:19 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a79480ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x800c840) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000000c0), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x1, 0x0) r5 = accept$ax25(r4, &(0x7f00000001c0)={{0x3, @null}, [@null, @rose, @rose, @default, @bcast, @rose, @bcast, @rose]}, &(0x7f0000000340)=0x48) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f0000000440)={'erspan0\x00', 0x7}) exit(0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8}, 0x20) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000140)={r8, 0x0, 0x8}, 0x8) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:19 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x0) [ 2747.018476] 0 pages cma reserved [ 2747.074461] hfsplus: unable to parse mount options [ 2747.148844] hfsplus: umask requires a value [ 2747.156156] hfsplus: unable to parse mount options [ 2747.164212] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2747.197995] hfsplus: umask requires a value [ 2747.212732] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2747.221587] hfsplus: unable to parse mount options [ 2747.231974] CPU: 1 PID: 3821 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2747.238844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2747.248218] Call Trace: [ 2747.250826] dump_stack+0x172/0x1f0 [ 2747.254568] warn_alloc.cold+0x7b/0x173 [ 2747.258575] ? zone_watermark_ok_safe+0x260/0x260 [ 2747.263442] ? lock_downgrade+0x810/0x810 [ 2747.267644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2747.273194] ? avc_has_perm+0x404/0x610 [ 2747.277193] __vmalloc_node_range+0x486/0x790 [ 2747.281710] ? sel_write_load+0x1de/0x470 [ 2747.285876] vmalloc+0x6b/0x90 [ 2747.289084] ? sel_write_load+0x1de/0x470 [ 2747.293239] sel_write_load+0x1de/0x470 [ 2747.298540] __vfs_write+0x114/0x810 [ 2747.302262] ? sel_make_policy_nodes+0x1520/0x1520 [ 2747.307195] ? kernel_read+0x120/0x120 [ 2747.311080] ? __lock_is_held+0xb6/0x140 [ 2747.315138] ? rcu_read_lock_sched_held+0x110/0x130 [ 2747.320154] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2747.324924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2747.330479] ? __sb_start_write+0x1a9/0x360 [ 2747.334823] vfs_write+0x20c/0x560 [ 2747.338379] ksys_write+0x14f/0x2d0 [ 2747.342018] ? __ia32_sys_read+0xb0/0xb0 [ 2747.346119] ? do_syscall_64+0x26/0x620 [ 2747.350126] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2747.355516] ? do_syscall_64+0x26/0x620 [ 2747.359516] __x64_sys_write+0x73/0xb0 [ 2747.363419] do_syscall_64+0xfd/0x620 [ 2747.367247] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2747.372460] RIP: 0033:0x4598e9 [ 2747.375667] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:59:19 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) preadv(r0, &(0x7f0000001300)=[{&(0x7f00000000c0)=""/151, 0x97}, {&(0x7f0000000180)=""/37, 0x25}, {&(0x7f00000001c0)=""/129, 0x81}, {&(0x7f0000000280)=""/103, 0x67}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x5, 0x0) 04:59:19 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0x1, 0x4) 04:59:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x25, 0x8cffffff}}]}) [ 2747.394585] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2747.402303] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2747.409665] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2747.416936] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2747.424208] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2747.431477] R13: 00000000004c9b57 R14: 00000000004e12c8 R15: 00000000ffffffff [ 2747.440687] Mem-Info: [ 2747.443156] active_anon:121872 inactive_anon:192 isolated_anon:0 [ 2747.443156] active_file:5198 inactive_file:12782 isolated_file:0 [ 2747.443156] unevictable:0 dirty:178 writeback:0 unstable:0 [ 2747.443156] slab_reclaimable:21525 slab_unreclaimable:430031 [ 2747.443156] mapped:59550 shmem:245 pagetables:5270 bounce:0 [ 2747.443156] free:928248 free_pcp:631 free_cma:0 [ 2747.477436] Node 0 active_anon:463512kB inactive_anon:768kB active_file:20412kB inactive_file:29020kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238200kB dirty:700kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2747.477471] Node 1 active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:12kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2747.477477] Node 0 DMA free:11248kB min:220kB low:272kB high:324kB active_anon:2052kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2747.477512] lowmem_reserve[]: 0 2555 2557 2557 [ 2747.477540] Node 0 DMA32 free:50808kB min:36248kB low:45308kB high:54368kB active_anon:461460kB inactive_anon:768kB active_file:20412kB inactive_file:29008kB unevictable:0kB writepending:700kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10176kB pagetables:16192kB bounce:0kB free_pcp:2524kB local_pcp:1120kB free_cma:0kB [ 2747.595096] lowmem_reserve[]: 0 0 2 2 [ 2747.608589] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2747.644323] lowmem_reserve[]: 0 0 0 0 04:59:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000000)='\x9c\xc1\xdb\xc0\xff\xe7\x06\x00\aE\v\x00\x00\x00\x00\x10', 0x0, 0x23147) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x1, 0x0) read$char_usb(r1, 0x0, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000080)=0x80000000, 0x4) 04:59:20 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x22000000}) [ 2747.648953] Node 1 Normal free:3650924kB min:53608kB low:67008kB high:80408kB active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB writepending:12kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2464kB pagetables:4884kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2747.725389] lowmem_reserve[]: 0 0 0 0 [ 2747.744577] Node 0 DMA: 14*4kB (UME) 127*8kB (UME) 64*16kB (UME) 28*32kB (UM) 5*64kB (UM) 4*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 11248kB [ 2747.771150] Node 0 DMA32: 4115*4kB (UMEH) 664*8kB (UMEH) 115*16kB (UMEH) 426*32kB (UMH) 199*64kB (UME) 21*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 52668kB [ 2747.795455] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2747.808812] Node 1 Normal: 677*4kB (UME) 3421*8kB (UME) 2549*16kB (UME) 1199*32kB (UME) 515*64kB (UME) 168*128kB (UME) 32*256kB (UME) 15*512kB (UM) 10*1024kB (UM) 2*2048kB (UE) 844*4096kB (UM) = 3650924kB [ 2747.835954] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2747.845633] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2747.868714] hfsplus: umask requires a value [ 2747.871511] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2747.886429] hfsplus: unable to parse mount options [ 2747.894932] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2747.895129] hfsplus: unable to parse mount options [ 2747.917292] 18233 total pagecache pages [ 2747.921722] 0 pages in swap cache [ 2747.925757] Swap cache stats: add 0, delete 0, find 0/0 [ 2747.937626] Free swap = 0kB [ 2747.941293] Total swap = 0kB [ 2747.945467] 1965979 pages RAM [ 2747.965905] 0 pages HighMem/MovableOnly 04:59:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x5, 0x2001) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000180)={0x1000, 0xf000, 0x100000000, 0x1b23, 0xc0b}) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x78840cac49d82884, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r2, 0x5474e30b1af50a9e, 0x1, 0xc6c, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r3 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r3, 0x0, 0x0) [ 2747.987230] 338856 pages reserved [ 2747.995963] 0 pages cma reserved [ 2748.004722] hfsplus: umask requires a value 04:59:20 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x0) 04:59:20 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x200000) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2748.050993] hfsplus: unable to parse mount options 04:59:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x2c, 0x8cffffff}}]}) 04:59:20 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x2c000000}) [ 2748.124628] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2748.172928] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2748.192176] CPU: 1 PID: 4486 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2748.199057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2748.208426] Call Trace: [ 2748.211034] dump_stack+0x172/0x1f0 [ 2748.214700] warn_alloc.cold+0x7b/0x173 [ 2748.218689] ? zone_watermark_ok_safe+0x260/0x260 [ 2748.223541] ? lock_downgrade+0x810/0x810 [ 2748.227708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2748.233251] ? avc_has_perm+0x404/0x610 [ 2748.237243] __vmalloc_node_range+0x486/0x790 [ 2748.241756] ? sel_write_load+0x1de/0x470 [ 2748.245912] vmalloc+0x6b/0x90 [ 2748.249111] ? sel_write_load+0x1de/0x470 [ 2748.253265] sel_write_load+0x1de/0x470 [ 2748.257250] __vfs_write+0x114/0x810 [ 2748.260979] ? sel_make_policy_nodes+0x1520/0x1520 [ 2748.265915] ? kernel_read+0x120/0x120 [ 2748.269813] ? __lock_is_held+0xb6/0x140 [ 2748.273891] ? rcu_read_lock_sched_held+0x110/0x130 [ 2748.278908] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2748.283676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2748.289217] ? __sb_start_write+0x1a9/0x360 [ 2748.293566] vfs_write+0x20c/0x560 [ 2748.297121] ksys_write+0x14f/0x2d0 [ 2748.300758] ? __ia32_sys_read+0xb0/0xb0 [ 2748.304829] ? do_syscall_64+0x26/0x620 [ 2748.308809] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2748.314182] ? do_syscall_64+0x26/0x620 [ 2748.318168] __x64_sys_write+0x73/0xb0 [ 2748.322063] do_syscall_64+0xfd/0x620 [ 2748.325878] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2748.331071] RIP: 0033:0x4598e9 [ 2748.334269] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2748.353171] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2748.360885] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 04:59:20 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="000161ea5b5f3af4f117457478721c9ccc96903df60a4920093345fedac5743d256cc8583d47143fba1c78cadbf7b0c0b8fc6ae7075d59ddc40801434b1335b7cb6e2f13638c49695da7fc60f41e534e138308aa2b6b82b6eaa417687bd86af8bb11aef5f7c5f9345cac7b5e02e18e899a7630d9dfdf7f7b3d8ed0d63921a19796c6be59b27c02d2c127466ffc5387772cd5495fa166cd1cd8ca302641f87d7192537d35fa55e978c0bb533ec1b6ce5ca3a9a6349937d610ae729ca8051f35306cbbde13e40bd6ec26d44d83bd0e576e7fe0d5b172d7c9c283f1521c5d480ec12c2f88a3c15dd0b59b216b9b5b09759ba233", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x20) r4 = getegid() r5 = getgid() setgroups(0x3, &(0x7f0000000140)=[r4, 0x0, r5]) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r3, 0x6, 0x80000001, 0xfff}, &(0x7f0000000100)=0x10) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x19) [ 2748.368157] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2748.375443] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2748.382717] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2748.389987] R13: 00000000004c9b57 R14: 00000000004e12c8 R15: 00000000ffffffff 04:59:20 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x0) [ 2748.435382] hfsplus: unable to parse mount options [ 2748.536306] hfsplus: umask requires a value [ 2748.559045] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2748.574107] hfsplus: unable to parse mount options [ 2748.599348] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2748.604785] CPU: 1 PID: 4612 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2748.611632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2748.620999] Call Trace: [ 2748.623607] dump_stack+0x172/0x1f0 [ 2748.627260] warn_alloc.cold+0x7b/0x173 [ 2748.631258] ? zone_watermark_ok_safe+0x260/0x260 [ 2748.636231] ? lock_downgrade+0x810/0x810 [ 2748.640404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2748.645954] ? avc_has_perm+0x404/0x610 [ 2748.650036] __vmalloc_node_range+0x486/0x790 [ 2748.654549] ? sel_write_load+0x1de/0x470 [ 2748.658707] vmalloc+0x6b/0x90 [ 2748.661905] ? sel_write_load+0x1de/0x470 [ 2748.666059] sel_write_load+0x1de/0x470 [ 2748.670046] __vfs_write+0x114/0x810 [ 2748.673773] ? sel_make_policy_nodes+0x1520/0x1520 [ 2748.678715] ? kernel_read+0x120/0x120 [ 2748.682630] ? __lock_is_held+0xb6/0x140 [ 2748.686705] ? rcu_read_lock_sched_held+0x110/0x130 [ 2748.691723] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2748.696481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2748.702023] ? __sb_start_write+0x1a9/0x360 [ 2748.706354] vfs_write+0x20c/0x560 [ 2748.709907] ksys_write+0x14f/0x2d0 [ 2748.713544] ? __ia32_sys_read+0xb0/0xb0 [ 2748.717615] ? do_syscall_64+0x26/0x620 [ 2748.721592] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2748.726958] ? do_syscall_64+0x26/0x620 [ 2748.730945] __x64_sys_write+0x73/0xb0 [ 2748.734840] do_syscall_64+0xfd/0x620 [ 2748.738689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2748.743887] RIP: 0033:0x4598e9 04:59:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r1 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000200)=r1) syz_open_procfs(r1, &(0x7f0000000040)='smZps_rollup\x00\x95d\x92\xa1\xa5\xa9\xa3l\xb1\xe3\x99\x143\a\x7fW\v\x03\xc6\x17\ff\x90\x8cA\xf5\xf4\xaa+4\xe4\x8aC^\xb4\xb3*e\x8dZ\x17\xeb\xd8\xe2\x04\xa2\x16m\xd1\xbb.\x12\xad\xabW\n\xd2m\xef\xc7\xcd\x85\x16E\xed\xea\x83\xf2Lc\f\x8d\x88\xcb\x18D\xf9$`\x17\x146\xd5=\xc3<\'\xb3y\xc9T\xef\xf6\xd0<\xf1\xc1\x9d\x1e\xca4\xed\x86%\xdf\xb5:\x13\xe34\xf5V\xa6\x9c*\x1a\xee\x01\xc4\\E\xfe\xe6\xa7\x90CW)\x06d\b\xebqQ\x92\x91\xf3C\x04nx\x89A\xc4*J\x14R9\x00\xc6\x8f\xcf\xdf\xbd\r\x88\xd8\xf2\"\r\xc6\xeaF\x0e\xbd:\xe4@u*$x\xba:\x17s\x00\x00\x00\x80\x00\x00\x00\x00O{\xdbC\x9f\"\xa6C\xac\"Z\xd3\x03\x86\xd42L7{@\xb5\x82I\x96\xd5\xe1>\"\x05\xc1\xd1\v\xee\xea\xeb\x9d\xe2\x84\xa1\x16\xbe\x03t\x9b3FB\xde\xd9\x87e\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000340)=""/155) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2748.747086] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2748.765989] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2748.773706] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2748.780980] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2748.788248] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2748.795518] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2748.802968] R13: 00000000004c9b57 R14: 00000000004e12c8 R15: 00000000ffffffff 04:59:21 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f00000000c0)={0xf7, "9c71eed9d9909062a6e37a02ee03b369ed40c0759663d00fff26934637d46279", 0x1d1d273adb1654e2, 0x3ff, 0x1, 0x800, 0x8}) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) socketpair(0x2, 0x80004, 0xfff, &(0x7f0000000140)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000180), &(0x7f00000001c0)=0x4) [ 2748.820602] warn_alloc_show_mem: 1 callbacks suppressed [ 2748.820606] Mem-Info: [ 2748.856408] active_anon:121881 inactive_anon:192 isolated_anon:0 [ 2748.856408] active_file:5198 inactive_file:12804 isolated_file:0 04:59:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3a, 0x8cffffff}}]}) [ 2748.856408] unevictable:0 dirty:187 writeback:0 unstable:0 [ 2748.856408] slab_reclaimable:21487 slab_unreclaimable:429382 [ 2748.856408] mapped:59550 shmem:245 pagetables:5274 bounce:0 [ 2748.856408] free:929031 free_pcp:529 free_cma:0 [ 2748.858844] hfsplus: umask requires a value [ 2748.975317] hfsplus: unable to parse mount options [ 2748.979037] Node 0 active_anon:464148kB inactive_anon:768kB active_file:20412kB inactive_file:29108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238200kB dirty:736kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2748.984756] hfsplus: unable to parse mount options [ 2749.026152] Node 1 active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:12kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 04:59:21 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r1, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4051}, 0x10) [ 2749.061328] Node 0 DMA free:11256kB min:220kB low:272kB high:324kB active_anon:2052kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 04:59:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000040)={0x0, 0x3447504d, 0x1, @stepwise={0x1, 0x7, 0x5389, 0x4, 0xffffffff, 0x3}}) read$char_usb(r1, 0x0, 0x0) [ 2749.117801] lowmem_reserve[]: 0 2555 2557 2557 04:59:21 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x3f000000}) [ 2749.159340] Node 0 DMA32 free:54240kB min:36248kB low:45308kB high:54368kB active_anon:461596kB inactive_anon:768kB active_file:20412kB inactive_file:29096kB unevictable:0kB writepending:736kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10336kB pagetables:16356kB bounce:0kB free_pcp:2072kB local_pcp:1420kB free_cma:0kB 04:59:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}, 0x22}]}) [ 2749.251856] lowmem_reserve[]: 0 0 2 2 [ 2749.265382] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2749.295294] lowmem_reserve[]: 0 0 0 0 [ 2749.299735] Node 1 Normal free:3650924kB min:53608kB low:67008kB high:80408kB active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB writepending:12kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2464kB pagetables:4884kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2749.330984] hfsplus: umask requires a value [ 2749.335325] hfsplus: unable to parse mount options [ 2749.342156] lowmem_reserve[]: 0 0 0 0 04:59:21 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x280, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r4, r5) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0) write$P9_RSTATu(r1, &(0x7f0000000280)={0x91, 0x7d, 0x1, {{0x0, 0x6c, 0xfffffffffffffeff, 0x5, {0x6, 0x2, 0x6}, 0x140100000, 0xfffffffffffffe32, 0x80000001, 0x4, 0xb, 'system{eth1', 0x1a, ':vboxnet1posix_acl_access#', 0x8, 'em0*{-[}', 0xc, '/dev/video#\x00'}, 0x10, 'eth0-trusted\xa9,-]', r2, r5, r6}}, 0x91) [ 2749.346223] Node 0 DMA: 14*4kB (UME) 128*8kB (UME) 64*16kB (UME) 28*32kB (UM) 5*64kB (UM) 4*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 11256kB [ 2749.378432] Node 0 DMA32: 4050*4kB (UMEH) 630*8kB (UMEH) 130*16kB (UMEH) 405*32kB (UMH) 199*64kB (UME) 25*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 52216kB [ 2749.423560] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2749.435488] Node 1 Normal: 677*4kB (UME) 3421*8kB (UME) 2549*16kB (UME) 1199*32kB (UME) 515*64kB (UME) 168*128kB (UME) 32*256kB (UME) 15*512kB (UM) 10*1024kB (UM) 2*2048kB (UE) 844*4096kB (UM) = 3650924kB [ 2749.455296] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2749.480054] hfsplus: unable to parse mount options [ 2749.480238] hfsplus: umask requires a value [ 2749.492863] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2749.500803] hfsplus: unable to parse mount options [ 2749.518020] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2749.536289] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2749.564060] 18245 total pagecache pages [ 2749.569385] 0 pages in swap cache [ 2749.579595] Swap cache stats: add 0, delete 0, find 0/0 04:59:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x40000000}) [ 2749.591336] Free swap = 0kB [ 2749.601689] Total swap = 0kB [ 2749.608459] 1965979 pages RAM [ 2749.618183] 0 pages HighMem/MovableOnly [ 2749.638931] 338856 pages reserved [ 2749.645359] 0 pages cma reserved 04:59:22 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) 04:59:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}, 0x2f}]}) [ 2749.728625] hfsplus: umask requires a value [ 2749.739569] hfsplus: unable to parse mount options [ 2749.797701] hfsplus: umask requires a value [ 2749.804017] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2749.816974] hfsplus: unable to parse mount options [ 2749.846076] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2749.854779] CPU: 1 PID: 5364 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2749.861664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2749.871116] Call Trace: [ 2749.873717] dump_stack+0x172/0x1f0 [ 2749.877366] warn_alloc.cold+0x7b/0x173 [ 2749.881357] ? zone_watermark_ok_safe+0x260/0x260 [ 2749.886215] ? lock_downgrade+0x810/0x810 [ 2749.890381] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2749.895922] ? avc_has_perm+0x404/0x610 [ 2749.899916] __vmalloc_node_range+0x486/0x790 [ 2749.904424] ? sel_write_load+0x1de/0x470 [ 2749.908583] vmalloc+0x6b/0x90 [ 2749.911801] ? sel_write_load+0x1de/0x470 [ 2749.915960] sel_write_load+0x1de/0x470 [ 2749.919951] __vfs_write+0x114/0x810 [ 2749.923676] ? sel_make_policy_nodes+0x1520/0x1520 [ 2749.928615] ? kernel_read+0x120/0x120 [ 2749.932518] ? __lock_is_held+0xb6/0x140 [ 2749.936603] ? rcu_read_lock_sched_held+0x110/0x130 [ 2749.941629] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2749.946398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2749.951945] ? __sb_start_write+0x1a9/0x360 [ 2749.956280] vfs_write+0x20c/0x560 [ 2749.959833] ksys_write+0x14f/0x2d0 [ 2749.963474] ? __ia32_sys_read+0xb0/0xb0 [ 2749.967550] ? do_syscall_64+0x26/0x620 [ 2749.971545] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2749.976920] ? do_syscall_64+0x26/0x620 [ 2749.980909] __x64_sys_write+0x73/0xb0 [ 2749.984813] do_syscall_64+0xfd/0x620 [ 2749.988631] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2749.993823] RIP: 0033:0x4598e9 [ 2749.997122] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2750.016031] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2750.023754] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2750.031028] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2750.038307] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2750.045587] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2750.052869] R13: 00000000004c9b57 R14: 00000000004e12c8 R15: 00000000ffffffff [ 2750.069421] Mem-Info: [ 2750.084033] active_anon:122036 inactive_anon:192 isolated_anon:0 [ 2750.084033] active_file:5198 inactive_file:12804 isolated_file:0 04:59:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}, 0x36}]}) 04:59:22 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000100)='self\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r2 = msgget(0x3, 0x224) msgctl$IPC_INFO(r2, 0x3, 0x0) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000140)=""/114) 04:59:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x48000000}) 04:59:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) exit(0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r0, &(0x7f0000000180), 0x55fe7e6ce18d367e) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000040)=0x8) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2750.084033] unevictable:0 dirty:187 writeback:0 unstable:0 [ 2750.084033] slab_reclaimable:21482 slab_unreclaimable:429525 [ 2750.084033] mapped:59550 shmem:245 pagetables:5292 bounce:0 [ 2750.084033] free:928518 free_pcp:420 free_cma:0 04:59:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x800000000000000, 0x602100) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0}, &(0x7f00000003c0)=0xc) syz_open_procfs(r3, &(0x7f0000000400)='net/ipx\x00') r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r8, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r10, r11) setsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@rand_addr="42d994c6e10d32db22e34c3045323718", @in6=@mcast2, 0x4e23, 0x8, 0x4e23, 0x3, 0xa, 0x20, 0xc4a98f701e28bba0, 0x5e, r8, r10}, {0x9, 0x5, 0x5, 0xffff, 0x8000, 0x6, 0x6, 0x1ff}, {0x91e, 0x4, 0x7, 0x6}, 0xfff, 0x0, 0x1, 0x0, 0x335c7c8590dec653, 0x4}, {{@in=@multicast2, 0x4d4, 0x33}, 0xa, @in=@broadcast, 0x0, 0x3, 0x0, 0x81, 0x8, 0x2}}, 0xe8) sendmsg$nl_route(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@ipv6_getaddr={0x70, 0x16, 0x9ad2c2471f088f4f, 0x70bd2a, 0x25dfdbfb, {0xa, 0x40, 0x40, 0x80, r8}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_FLAGS={0x8, 0x8, 0x100}, @IFA_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_ADDRESS={0x14, 0x1, @rand_addr="eec743692291fa7b03921ce1d77e8b20"}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 2750.203794] Node 0 active_anon:463468kB inactive_anon:768kB active_file:20412kB inactive_file:29108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238200kB dirty:736kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2750.254845] Node 1 active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:12kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2750.288548] Node 0 DMA free:11256kB min:220kB low:272kB high:324kB active_anon:2052kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2750.329366] lowmem_reserve[]: 0 2555 2557 2557 [ 2750.341267] Node 0 DMA32 free:54008kB min:36248kB low:45308kB high:54368kB active_anon:462016kB inactive_anon:768kB active_file:20412kB inactive_file:29096kB unevictable:0kB writepending:736kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10432kB pagetables:16280kB bounce:0kB free_pcp:1212kB local_pcp:1096kB free_cma:0kB [ 2750.372181] hfsplus: umask requires a value [ 2750.376528] hfsplus: unable to parse mount options [ 2750.387789] lowmem_reserve[]: 0 0 2 2 [ 2750.392024] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2750.395965] hfsplus: umask requires a value [ 2750.419518] lowmem_reserve[]: 0 0 0 0 [ 2750.437463] hfsplus: umask requires a value [ 2750.443204] Node 1 Normal free:3650924kB min:53608kB low:67008kB high:80408kB active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB writepending:12kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2464kB pagetables:4884kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2750.453587] hfsplus: unable to parse mount options [ 2750.474691] hfsplus: unable to parse mount options [ 2750.496591] lowmem_reserve[]: 0 0 0 0 04:59:23 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x4c000000}) [ 2750.512544] Node 0 DMA: 14*4kB (UME) 128*8kB (UME) 64*16kB (UME) 28*32kB (UM) 5*64kB (UM) 4*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 11256kB 04:59:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getgroups(0x0, 0x0) memfd_create(0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x80, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, 0x0) pipe(0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030000002ff96e27bf28b285fe39", 0x1b}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f00000055c0)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000001380)='/dev/input/mouse#\x00', 0xff, 0x8000) ioctl$IMGETDEVINFO(r3, 0x80044944, &(0x7f00000013c0)={0x1}) preadv(r2, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2750.612690] Node 0 DMA32: 4235*4kB (UMEH) 658*8kB (UMEH) 196*16kB (UMEH) 395*32kB (UMH) 199*64kB (UME) 25*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 53916kB [ 2750.664851] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2750.670595] hfsplus: umask requires a value 04:59:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x2}) [ 2750.705669] hfsplus: unable to parse mount options [ 2750.717690] Node 1 Normal: 677*4kB (UME) 3421*8kB (UME) 2549*16kB (UME) 1199*32kB (UME) 515*64kB (UME) 168*128kB (UME) 32*256kB (UME) 15*512kB (UM) 10*1024kB (UM) 2*2048kB (UE) 844*4096kB (UM) = 3650924kB [ 2750.738765] bridge0: port 2(bridge_slave_1) entered disabled state [ 2750.745997] bridge0: port 1(bridge_slave_0) entered disabled state 04:59:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) accept(r2, 0x0, 0x0) fsetxattr$security_evm(r2, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@sha1={0x1, "126a5ab831a73a7f166cdc16e031144cc1445ce6"}, 0x15, 0x1) socket$inet_udp(0x2, 0x2, 0x0) read$char_usb(r1, 0x0, 0x0) [ 2750.760568] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2750.795318] hfsplus: umask requires a value [ 2750.816329] hfsplus: unable to parse mount options [ 2750.818342] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2750.843687] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 04:59:23 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x60000000}) [ 2750.884674] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2750.965850] 18265 total pagecache pages [ 2751.009998] 0 pages in swap cache [ 2751.028930] Swap cache stats: add 0, delete 0, find 0/0 [ 2751.053568] hfsplus: umask requires a value [ 2751.064908] Free swap = 0kB [ 2751.078577] Total swap = 0kB [ 2751.085090] hfsplus: unable to parse mount options [ 2751.099147] 1965979 pages RAM [ 2751.111663] 0 pages HighMem/MovableOnly [ 2751.126460] 338856 pages reserved [ 2751.143385] 0 pages cma reserved 04:59:23 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) [ 2751.173924] hfsplus: umask requires a value [ 2751.178506] hfsplus: unable to parse mount options 04:59:23 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x68000000}) [ 2751.301025] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2751.338471] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2751.373432] CPU: 0 PID: 6378 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2751.380328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2751.389695] Call Trace: [ 2751.392300] dump_stack+0x172/0x1f0 [ 2751.395950] warn_alloc.cold+0x7b/0x173 [ 2751.400197] ? zone_watermark_ok_safe+0x260/0x260 [ 2751.405052] ? lock_downgrade+0x810/0x810 [ 2751.409217] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2751.414760] ? avc_has_perm+0x404/0x610 [ 2751.418750] __vmalloc_node_range+0x486/0x790 [ 2751.423263] ? sel_write_load+0x1de/0x470 [ 2751.427426] vmalloc+0x6b/0x90 [ 2751.430627] ? sel_write_load+0x1de/0x470 [ 2751.434784] sel_write_load+0x1de/0x470 [ 2751.438765] __vfs_write+0x114/0x810 [ 2751.442486] ? sel_make_policy_nodes+0x1520/0x1520 [ 2751.447421] ? kernel_read+0x120/0x120 [ 2751.451321] ? __lock_is_held+0xb6/0x140 [ 2751.455398] ? rcu_read_lock_sched_held+0x110/0x130 [ 2751.460602] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2751.465384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2751.470929] ? __sb_start_write+0x1a9/0x360 [ 2751.475260] vfs_write+0x20c/0x560 [ 2751.478813] ksys_write+0x14f/0x2d0 [ 2751.482450] ? __ia32_sys_read+0xb0/0xb0 [ 2751.486517] ? do_syscall_64+0x26/0x620 [ 2751.490496] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2751.495861] ? do_syscall_64+0x26/0x620 [ 2751.499849] __x64_sys_write+0x73/0xb0 [ 2751.503741] do_syscall_64+0xfd/0x620 [ 2751.507552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2751.512749] RIP: 0033:0x4598e9 [ 2751.515947] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2751.534849] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2751.542567] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2751.549852] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2751.557122] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2751.564392] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2751.571665] R13: 00000000004c9b57 R14: 00000000004e12c8 R15: 00000000ffffffff [ 2751.659837] Mem-Info: [ 2751.663702] active_anon:121942 inactive_anon:192 isolated_anon:0 [ 2751.663702] active_file:5198 inactive_file:12828 isolated_file:0 [ 2751.663702] unevictable:0 dirty:185 writeback:0 unstable:0 [ 2751.663702] slab_reclaimable:21486 slab_unreclaimable:428931 [ 2751.663702] mapped:59550 shmem:245 pagetables:5290 bounce:0 [ 2751.663702] free:929329 free_pcp:491 free_cma:0 [ 2751.724097] hfsplus: umask requires a value [ 2751.732579] hfsplus: unable to parse mount options [ 2751.738226] Node 0 active_anon:463792kB inactive_anon:768kB active_file:20412kB inactive_file:29204kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238200kB dirty:728kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2751.773109] Node 1 active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:12kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2751.807173] Node 0 DMA free:11256kB min:220kB low:272kB high:324kB active_anon:2052kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2751.862766] lowmem_reserve[]: 0 2555 2557 2557 [ 2751.881661] hfsplus: umask requires a value [ 2751.886131] hfsplus: unable to parse mount options [ 2751.901694] Node 0 DMA32 free:54668kB min:36248kB low:45308kB high:54368kB active_anon:461748kB inactive_anon:768kB active_file:20412kB inactive_file:29192kB unevictable:0kB writepending:744kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10368kB pagetables:16372kB bounce:0kB free_pcp:1908kB local_pcp:1320kB free_cma:0kB [ 2751.947841] lowmem_reserve[]: 0 0 2 2 [ 2751.956195] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2751.989091] lowmem_reserve[]: 0 0 0 0 04:59:24 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x6b6b6b00}) [ 2751.993435] Node 1 Normal free:3650924kB min:53608kB low:67008kB high:80408kB active_anon:23976kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB writepending:12kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2464kB pagetables:4884kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2752.074345] lowmem_reserve[]: 0 0 0 0 [ 2752.091044] Node 0 DMA: 14*4kB (UME) 128*8kB (UME) 64*16kB (UME) 28*32kB (UM) 5*64kB (UM) 4*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 11256kB [ 2752.123731] hfsplus: umask requires a value [ 2752.137655] hfsplus: unable to parse mount options [ 2752.144614] Node 0 DMA32: 4233*4kB (UMEH) 706*8kB (UMEH) 152*16kB (UMEH) 394*32kB (UMH) 198*64kB (UME) 28*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 53876kB [ 2752.193749] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2752.194430] hfsplus: umask requires a value [ 2752.231383] hfsplus: unable to parse mount options [ 2752.237676] Node 1 Normal: 677*4kB (UME) 3421*8kB (UME) 2549*16kB (UME) 1199*32kB (UME) 515*64kB (UME) 168*128kB (UME) 32*256kB (UME) 15*512kB (UM) 10*1024kB (UM) 2*2048kB (UE) 844*4096kB (UM) = 3650924kB 04:59:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x3}) 04:59:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000000)={r4, @in6={{0xa, 0x4e23, 0x6, @mcast2, 0x4}}, 0x20, 0xb9}, &(0x7f00000000c0)=0x90) [ 2752.353939] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2752.363627] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2752.372818] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2752.382891] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2752.393197] 18269 total pagecache pages [ 2752.407493] 0 pages in swap cache [ 2752.412471] Swap cache stats: add 0, delete 0, find 0/0 [ 2752.419706] Free swap = 0kB [ 2752.424266] Total swap = 0kB [ 2752.433337] 1965979 pages RAM [ 2752.437884] 0 pages HighMem/MovableOnly 04:59:24 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x80, 0x0) 04:59:24 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x6c000000}) [ 2752.459502] 338856 pages reserved [ 2752.471485] 0 pages cma reserved 04:59:24 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000140)={{&(0x7f0000000040)=""/172, 0xac}, &(0x7f0000000100), 0x33}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_EDID(r4, 0xc0285628, &(0x7f0000000340)={0x0, 0x6, 0x10000, [], &(0x7f0000000200)=0x1}) exit(0x0) r5 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x5, 0x2002) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8}, 0x20) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f00000001c0)={r8, 0xff}, 0x8) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2752.507949] hfsplus: umask requires a value 04:59:25 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) [ 2752.536139] hfsplus: umask requires a value [ 2752.545362] hfsplus: unable to parse mount options [ 2752.566510] hfsplus: unable to parse mount options [ 2752.622317] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2752.667562] hfsplus: umask requires a value [ 2752.684758] hfsplus: unable to parse mount options [ 2752.709675] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2752.716334] CPU: 0 PID: 6598 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2752.723199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2752.732594] Call Trace: [ 2752.735199] dump_stack+0x172/0x1f0 [ 2752.738847] warn_alloc.cold+0x7b/0x173 [ 2752.742842] ? zone_watermark_ok_safe+0x260/0x260 [ 2752.747693] ? lock_downgrade+0x810/0x810 [ 2752.751867] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2752.757417] ? avc_has_perm+0x404/0x610 [ 2752.761418] __vmalloc_node_range+0x486/0x790 [ 2752.765926] ? sel_write_load+0x1de/0x470 [ 2752.770082] vmalloc+0x6b/0x90 [ 2752.773285] ? sel_write_load+0x1de/0x470 [ 2752.777439] sel_write_load+0x1de/0x470 [ 2752.781431] __vfs_write+0x114/0x810 [ 2752.785273] ? sel_make_policy_nodes+0x1520/0x1520 [ 2752.790234] ? kernel_read+0x120/0x120 [ 2752.794136] ? __lock_is_held+0xb6/0x140 [ 2752.798219] ? rcu_read_lock_sched_held+0x110/0x130 [ 2752.803244] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2752.808009] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2752.813559] ? __sb_start_write+0x1a9/0x360 [ 2752.817902] vfs_write+0x20c/0x560 [ 2752.821456] ksys_write+0x14f/0x2d0 [ 2752.825088] ? __ia32_sys_read+0xb0/0xb0 [ 2752.829159] ? do_syscall_64+0x26/0x620 [ 2752.833141] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2752.838512] ? do_syscall_64+0x26/0x620 [ 2752.842495] __x64_sys_write+0x73/0xb0 [ 2752.846388] do_syscall_64+0xfd/0x620 [ 2752.850198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2752.855389] RIP: 0033:0x4598e9 04:59:25 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smap\x8a.*\x7fllup\x00\x88\\\xc3i;6\xdbe\xea\xc1\xbe\x02\x1b6\xfc\xf8c\xa7\xc5>WT4\x83\x10\tIX\xe4\n\xb7\x89-\x8f\xfd\t\xad\xe9\xfa\xecY2\a\x1c\xf0\xc2\t\t\x19\x15\xde\xb3\x95\xed\x96W9N\x01\x00\xa0\xe1d\xa2\x1a\xf3\xae\x8eWCw\xd93t\xc8sB]\xcf\xc3\fE0\x90\xec\xba>\x88\x1e\x89;\x16\xcd\x90\xf4+\xc4s\x05N\xdd\xf0\x01\x0f\xc4X^\x9eS\\F\xd4\xbeD\xac\xe9`\xdd\xe0v\xf7\fE\x12\v\xa2#\xaa7gF\x82\xfe\x8c8\xf3A\xaf\xd1\x05\xff\xc5\xd3\x81h0G \x8a\x1d\x8c\"\xfd\xd7\xe6\xf8\x1cy\xfd\xd5#\xd3\xd4\x1bv\xd2\xa2\xfd\xf1\x89\xceOm\xf7\xe1$5\xde\xdb\xfecvKJ\x9f\x88\xc2\x82\x84\xfd$\xaa\xce&\xbbO=|\x19/\xa7W\n{\x0f\xee') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2752.858585] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2752.877492] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2752.885212] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2752.892483] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2752.899752] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:59:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x4}) [ 2752.907198] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2752.907207] R13: 00000000004c9b57 R14: 00000000004e12c8 R15: 00000000ffffffff [ 2752.942154] Mem-Info: 04:59:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x74000000}) 04:59:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000000)=0xfffffffffffffffc, 0x4) r3 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x200) read$char_usb(r3, 0x0, 0x0) [ 2752.958986] active_anon:121699 inactive_anon:192 isolated_anon:0 [ 2752.958986] active_file:5198 inactive_file:12838 isolated_file:0 [ 2752.958986] unevictable:0 dirty:189 writeback:0 unstable:0 [ 2752.958986] slab_reclaimable:21462 slab_unreclaimable:429441 [ 2752.958986] mapped:59550 shmem:245 pagetables:5090 bounce:0 [ 2752.958986] free:928872 free_pcp:687 free_cma:0 [ 2753.037166] Node 0 active_anon:460272kB inactive_anon:768kB active_file:20412kB inactive_file:29244kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238200kB dirty:744kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2753.099579] Node 1 active_anon:23876kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:12kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2753.100529] hfsplus: umask requires a value [ 2753.147650] hfsplus: unable to parse mount options [ 2753.175876] Node 0 DMA free:11264kB min:220kB low:272kB high:324kB active_anon:2052kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2753.203300] lowmem_reserve[]: 0 2555 2557 2557 [ 2753.208453] Node 0 DMA32 free:58396kB min:36248kB low:45308kB high:54368kB active_anon:454284kB inactive_anon:768kB active_file:20412kB inactive_file:29232kB unevictable:0kB writepending:744kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10112kB pagetables:14732kB bounce:0kB free_pcp:2112kB local_pcp:812kB free_cma:0kB [ 2753.241331] lowmem_reserve[]: 0 0 2 2 [ 2753.245927] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 04:59:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x800, 0x0) fcntl$setlease(r2, 0x400, 0x5) [ 2753.273838] hfsplus: umask requires a value [ 2753.287091] hfsplus: unable to parse mount options [ 2753.322818] lowmem_reserve[]: 0 0 0 0 [ 2753.327551] Node 1 Normal free:3650924kB min:53608kB low:67008kB high:80408kB active_anon:23876kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB writepending:12kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2432kB pagetables:4736kB bounce:0kB free_pcp:256kB local_pcp:144kB free_cma:0kB [ 2753.365502] lowmem_reserve[]: 0 0 0 0 [ 2753.370962] hfsplus: umask requires a value [ 2753.375305] hfsplus: unable to parse mount options [ 2753.385030] Node 0 DMA: 14*4kB (UME) 129*8kB (UME) 64*16kB (UME) 28*32kB (UM) 5*64kB (UM) 4*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 11264kB [ 2753.406444] Node 0 DMA32: 5500*4kB (UMEH) 984*8kB (UMEH) 188*16kB (UMEH) 436*32kB (UMEH) 200*64kB (UME) 30*128kB (UM) 0*256kB 0*512kB 0*1024kB 2*2048kB (M) 0*4096kB = 67568kB 04:59:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x5}) 04:59:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x7a000000}) [ 2753.504751] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2753.537190] Node 1 Normal: 677*4kB (UME) 3421*8kB (UME) 2549*16kB (UME) 1198*32kB (UME) 514*64kB (UME) 169*128kB (UME) 32*256kB (UME) 15*512kB (UM) 10*1024kB (UM) 2*2048kB (UE) 844*4096kB (UM) = 3650956kB [ 2753.571662] hfsplus: umask requires a value [ 2753.581812] hfsplus: unable to parse mount options [ 2753.626381] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2753.639275] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2753.680892] hfsplus: umask requires a value [ 2753.698291] hfsplus: unable to parse mount options [ 2753.701675] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 04:59:26 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/r1-\x1d\xd2\xc2\xc2\xc3\x00', 0x200, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)={0x50, r2, 0x31, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xffffffffffffff39, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x8, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x50}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000600)={0xfc, r2, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x2d6eafc694049185}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_DAEMON={0x90, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ifb0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0xffffffb4, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="efab695424564fd7c4a21c0ed04254d6"}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x50004841}, 0x8020) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) open_by_handle_at(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="5f0000000200000088a4e117c0af40cea02c35c5e39cd0f578838857ab3eea94b7b701dc2d10100f60994cdf537cf9c14ab499d09c2dadffebe5cc8e3ee7251c058c3e36c41f67b6ae9ff5fa03f0eef0f0ef07457285f696fe168b0ddce9dd7543e934e6be24e2005da8dc472165aa0aec26286ff8c856c2a434d404084f5ad91e8cd469a91c1cc8ba595940999d6c30ff6c1e6336baa2171ce65f192675bbef59dd6e7b1183101c418450183629e9aee90dbdc5b445347410113d48eac5037d21d1"], 0x8000) clock_nanosleep(0x1, 0x0, &(0x7f0000000300), &(0x7f0000000340)) read$char_usb(r0, &(0x7f0000000040)=""/136, 0x88) vmsplice(r0, &(0x7f00000002c0)=[{&(0x7f0000000180)="6c4cbdeec670e26efed207c470935f62ddd1c8732fd1ea13a25fbcb77633cc065cd5808a26e1314aa3203bd0982cb659bd23cada40eab16d1de57c5161dc3831b6808b63e8ff4988ec201493e360d6149f583eb84c67c43e", 0x58}, {&(0x7f0000000200)="8ac8f10cbc5b64993067606718f0f98798bd25cded8fea7b966a56e6fb9d1dcc7bde3d5caf61c80cd1a0727ff8a18082bca1ccd8e8d2afe2bda30b4160101869adc336c3076005dee3bc88f62ca9df4b0371927db11c0f7a5637e29577b1541ff3e0fb80196c4e86716d9d7ded3c2fb82ec8b7ec6b80d30739e497f4c2d410bee8a34c583f334b1b1071", 0x8a}], 0x2, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SG_GET_SG_TABLESIZE(r6, 0x227f, &(0x7f0000000700)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r8, 0x0) r9 = accept(r8, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r9, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7e16250c95f3443d07007a19b132dc2d5f2a5820c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703040000"], 0x1}}, 0x8000) r10 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r14}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r14, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r16, r17) setsockopt$inet6_IPV6_IPSEC_POLICY(r10, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@rand_addr="42d994c6e10d32db22e34c3045323718", @in6=@mcast2, 0x4e23, 0x8, 0x4e23, 0x3, 0xa, 0x20, 0xc4a98f701e28bba0, 0x5e, r14, r16}, {0x9, 0x5, 0x5, 0xffff, 0x8000, 0x6, 0x6, 0x1ff}, {0x91e, 0x4, 0x7, 0x6}, 0xfff, 0x0, 0x1, 0x0, 0x335c7c8590dec653, 0x4}, {{@in=@multicast2, 0x4d4, 0x33}, 0xa, @in=@broadcast, 0x0, 0x3, 0x0, 0x81, 0x8, 0x2}}, 0xe8) sendmsg$can_raw(r0, &(0x7f0000000840)={&(0x7f0000000740)={0x1d, r14}, 0x10, &(0x7f0000000800)={&(0x7f0000000780)=@canfd={{0x3, 0x4, 0xfb, 0x9}, 0x0, 0x2, 0x0, 0x0, "cb2cb7b5c3dc34b1206499cf72bef9b56cb7651af5765c508c5965427ae26ba01d5e9a2401a2172109a816c435e62bc6c6242dc5c865485b0aaaec49acd959e1"}, 0x48}, 0x1, 0x0, 0x0, 0x95ae8e2bf58b3b43}, 0x1) flock(r9, 0x4) r18 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r18, 0x0, 0x0) [ 2753.746006] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2753.793140] 18291 total pagecache pages [ 2753.800685] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2753.816121] 0 pages in swap cache [ 2753.826802] Swap cache stats: add 0, delete 0, find 0/0 [ 2753.845686] Free swap = 0kB [ 2753.854438] Total swap = 0kB [ 2753.865822] 1965979 pages RAM [ 2753.878586] 0 pages HighMem/MovableOnly [ 2753.896642] 338856 pages reserved [ 2753.911766] 0 pages cma reserved 04:59:26 executing program 2: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000080)={0x5c, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e22, 0x3, 'wlc\x00', 0x2, 0x0, 0x4c}, 0x2c) shutdown(0xffffffffffffffff, 0x1) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x1000000000000048, 0xfffffffffffffffd) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r3 = dup2(r0, r2) setsockopt$inet_buf(r3, 0x0, 0x25, &(0x7f0000000100), 0x0) 04:59:26 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x8cffffff}) 04:59:26 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff7"], 0x31) 04:59:26 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x6}) [ 2754.172905] SELinux: failed to load policy 04:59:26 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff7"], 0x31) [ 2754.217456] hfsplus: umask requires a value [ 2754.250652] hfsplus: unable to parse mount options [ 2754.286877] hfsplus: umask requires a value [ 2754.295135] hfsplus: unable to parse mount options [ 2754.326151] SELinux: failed to load policy [ 2754.392975] hfsplus: umask requires a value 04:59:26 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff7"], 0x31) [ 2754.420996] hfsplus: unable to parse mount options 04:59:26 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x44002) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r2, 0xd04, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xe5440d5338e20d2a}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r0}, {0x8}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xa4df1a1ef4eb486e}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x9}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffffe9}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x22000, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0xfffffffffffffffc, 0x80000009, 0x726, 0xffffffffdfffffff}) [ 2754.479011] SELinux: failed to load policy 04:59:27 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xc0ed0000}) 04:59:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x7}) 04:59:27 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a5800"/73], 0x49) [ 2754.658469] SELinux: failed to load policy [ 2754.666608] hfsplus: umask requires a value [ 2754.696818] hfsplus: umask requires a value [ 2754.697384] hfsplus: unable to parse mount options 04:59:27 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a5800"/73], 0x49) [ 2754.716904] hfsplus: unable to parse mount options 04:59:27 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xf6ffffff}) [ 2754.855173] SELinux: failed to load policy 04:59:27 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a5800"/73], 0x49) 04:59:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x8}) [ 2754.968232] hfsplus: umask requires a value [ 2754.991521] hfsplus: unable to parse mount options 04:59:27 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000040)=0x2, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RTC_WIE_ON(r5, 0x700f) [ 2755.019010] SELinux: failed to load policy 04:59:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="fae1dabe8b6a207e6d45a1b6cffd79dc4e137392cdaaa089f7b2e92a3ab07d689e7ae13857879e72b0abe2b38fae5096a08b9405f10618f0d6d8641798ffff3faa3e5956") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000080)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r4, 0x1, &(0x7f00000001c0)={{}, {r5, r6+30000000}}, 0x0) timer_delete(r4) read$char_usb(r1, 0x0, 0xffffffffffffff58) [ 2755.074926] hfsplus: umask requires a value [ 2755.093457] hfsplus: unable to parse mount options [ 2755.105412] hfsplus: umask requires a value 04:59:27 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa00"], 0x55) [ 2755.129235] hfsplus: unable to parse mount options 04:59:27 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xfcfdffff}) [ 2755.237671] SELinux: failed to load policy [ 2755.355348] hfsplus: umask requires a value [ 2755.385220] hfsplus: unable to parse mount options [ 2755.435705] hfsplus: umask requires a value [ 2755.466979] hfsplus: unable to parse mount options [ 2756.935315] audit: type=1400 audit(1568782769.399:1784): avc: denied { map } for pid=7919 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=76 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 2757.039608] IPVS: ftp: loaded support on port[0] = 21 [ 2757.278791] chnl_net:caif_netlink_parms(): no params data found [ 2757.374576] bridge0: port 1(bridge_slave_0) entered blocking state [ 2757.381337] bridge0: port 1(bridge_slave_0) entered disabled state [ 2757.397932] device bridge_slave_0 entered promiscuous mode [ 2757.410115] bridge0: port 2(bridge_slave_1) entered blocking state [ 2757.416810] bridge0: port 2(bridge_slave_1) entered disabled state [ 2757.432315] device bridge_slave_1 entered promiscuous mode [ 2757.487040] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2757.511173] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2757.569813] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2757.591323] team0: Port device team_slave_0 added [ 2757.598823] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2757.609723] team0: Port device team_slave_1 added [ 2757.618400] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2757.628318] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2757.705852] device hsr_slave_0 entered promiscuous mode [ 2757.752089] device hsr_slave_1 entered promiscuous mode [ 2757.794840] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2757.817111] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2757.888397] bridge0: port 2(bridge_slave_1) entered blocking state [ 2757.894819] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2757.901517] bridge0: port 1(bridge_slave_0) entered blocking state [ 2757.907873] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2758.013158] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2758.019738] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2758.035894] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2758.052061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2758.071983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2758.105225] bridge0: port 2(bridge_slave_1) entered disabled state [ 2758.116847] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2758.141227] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2758.147338] 8021q: adding VLAN 0 to HW filter on device team0 [ 2758.182830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2758.197979] bridge0: port 1(bridge_slave_0) entered blocking state [ 2758.204408] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2758.233119] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2758.241407] bridge0: port 2(bridge_slave_1) entered blocking state [ 2758.247762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2758.264482] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2758.272823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2758.289642] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2758.300152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2758.312946] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2758.326249] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2758.335163] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2758.346264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2758.361566] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2758.376137] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2758.385079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2758.395941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2758.413216] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2758.421800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2758.432864] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2758.446738] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2758.455568] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2758.482452] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2758.500911] 8021q: adding VLAN 0 to HW filter on device batadv0 04:59:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r5, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) read$char_usb(r3, 0x0, 0x0) 04:59:31 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa00"], 0x55) 04:59:31 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0xc) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x9}) 04:59:31 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xfdfdffff}) 04:59:31 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = request_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='vmnet0(trusted\x00', 0xfffffffffffffff8) keyctl$get_security(0x11, r1, &(0x7f0000000100)=""/202, 0xca) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2758.923368] SELinux: failed to load policy 04:59:31 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa00"], 0x55) [ 2758.953873] hfsplus: umask requires a value [ 2758.979485] hfsplus: unable to parse mount options [ 2759.020983] hfsplus: umask requires a value [ 2759.028439] hfsplus: unable to parse mount options [ 2759.039890] SELinux: failed to load policy [ 2759.045594] hfsplus: umask requires a value [ 2759.050815] hfsplus: unable to parse mount options [ 2759.064719] vivid-000: kernel_thread() failed 04:59:31 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa00008000600000"], 0x5b) 04:59:31 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1000000000000035, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f0000000140)=0x75) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x147100, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, r8, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xaba84b26f9bd82a3}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xb4, r8, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x4c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x101}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffffffffffc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffffffffeff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x482}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x338}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10001}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000}, 0x2040000) r9 = dup2(r5, r6) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KVM_ASSIGN_SET_MSIX_NR(r9, 0x4008ae73, &(0x7f0000000180)={0x8000, 0x1}) 04:59:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x8773b8c8c4e5f149, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000040)={0x2000}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r3, 0x0) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000080)=0x1, &(0x7f00000000c0)=0x4) r5 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x200) read$char_usb(r5, 0x0, 0x0) 04:59:31 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xffff0700}) [ 2759.221220] SELinux: failed to load policy 04:59:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xa}) 04:59:31 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa00008000600000"], 0x5b) [ 2759.292037] hfsplus: umask requires a value [ 2759.296401] hfsplus: unable to parse mount options [ 2759.364149] hfsplus: umask requires a value [ 2759.368516] hfsplus: unable to parse mount options 04:59:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) socketpair(0xa, 0x4, 0x5, &(0x7f0000000000)) [ 2759.419718] SELinux: failed to load policy 04:59:31 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xffff1f00}) 04:59:31 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, 0x0, 0xfffffffffffffd58, 0x40000, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x21}, 0x7fffffff}, 0xfffffffffffffdbb) setsockopt$sock_int(r1, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) accept(r2, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r4, 0x0) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x8000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r6, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r6, 0x1) recvfrom$inet6(r6, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r6) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r7, 0x0) r8 = accept(r7, 0x0, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r9, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r9, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r9, 0x1) recvfrom$inet6(r9, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r9) r10 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r10, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r11 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r11, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r11, 0x0) accept(r11, 0x0, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r13 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r13, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r13, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r13, 0x1) recvfrom$inet6(r13, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r13) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r14, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r14, 0x0) r15 = accept(r14, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r15, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r16, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r16, 0x0) r17 = accept(r16, 0x0, 0x0) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r18, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r18, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r18, 0x1) recvfrom$inet6(r18, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r18) r19 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r19, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r19, 0x0) accept(r19, 0x0, 0x0) r20 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r20, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r20, 0x0) accept(r20, 0x0, 0x0) r21 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r21, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r21, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r21, 0x1) recvfrom$inet6(r21, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r21) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000bc0)=ANY=[@ANYRES64=r5, @ANYPTR64=&(0x7f00000008c0)=ANY=[@ANYRESOCT=0x0, @ANYRESDEC=0x0], @ANYRESHEX=r6, @ANYRES64=r7, @ANYPTR64=&(0x7f0000000a40)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYPTR64, @ANYPTR64], @ANYRESOCT=r9, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYRES64=r10, @ANYRES32, @ANYRESHEX, @ANYPTR, @ANYPTR64, @ANYRESDEC=r11, @ANYPTR64, @ANYRESOCT=r12, @ANYPTR64, @ANYRES32], @ANYRES64, @ANYRES32=r5, @ANYPTR64=&(0x7f00000009c0)=ANY=[@ANYRES16=r13, @ANYRES16, @ANYRESDEC=r4, @ANYRES32=r15, @ANYRESHEX=r16, @ANYRES32=r8, @ANYRES32=r5, @ANYPTR], @ANYPTR=&(0x7f0000000a00)=ANY=[@ANYPTR64, @ANYRES64=r18, @ANYPTR, @ANYRESDEC=r19], @ANYRESDEC=r8], @ANYRESDEC, @ANYRES16, @ANYRESDEC=r0, @ANYPTR=&(0x7f0000000b80)=ANY=[@ANYPTR=&(0x7f0000000ac0)=ANY=[@ANYRES32=r17, @ANYBLOB="bba06498c795c7d104f0865d8549c0dcfc5540e970ec00000000000000092ff61e68c71f7e46280100000000000000396eaf71c95ad7e65ca8ef0e26852b90c07bfe0b28b9994ff86536368dbd48712bd9bc6038f463f52332951a6ac246e439bd041ce34109d2def43eac178fa18682df3f63b904597277bbb28f0709f5e9811e52", @ANYRES16=r10], @ANYRESHEX=r20, @ANYRES32=r6, @ANYRESHEX=0x0], @ANYRESHEX=r21], 0xa) r22 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000700)=r22, 0x4) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r25 = dup2(r23, r24) ioctl$PERF_EVENT_IOC_ENABLE(r25, 0x8912, 0x400200) ioctl$VIDIOC_G_PARM(r25, 0xc0cc5615, &(0x7f00000005c0)={0x0, @capture={0x9fdf7614e4cd21ee, 0x1, {0x8000, 0x8}, 0x7f, 0x3}}) [ 2759.471421] hfsplus: umask requires a value [ 2759.475828] hfsplus: unable to parse mount options [ 2759.594014] hfsplus: umask requires a value [ 2759.598393] hfsplus: unable to parse mount options [ 2759.625545] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2759.660464] hfsplus: umask requires a value [ 2759.664848] hfsplus: unable to parse mount options 04:59:32 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xfffffdfc}) 04:59:32 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa00008000600000"], 0x5b) 04:59:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r2, &(0x7f0000000180), 0x8) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000000)={{0x6, 0x9}, {0x5, 0x3}, 0xc813, 0x6, 0x300}) read$char_usb(r1, 0x0, 0x0) 04:59:32 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) accept(r0, 0x0, 0x0) fsetxattr(r0, &(0x7f0000000180)=@random={'user.', 'fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\a\x00\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f+\b\x00\x00\x00\x00\x00\x00\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y9\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHF\xa6\xae\xce\x9c\xae\xf5=TW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'}, &(0x7f0000000280)='smaps_rollup\x00', 0xd, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\a\x00\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f+\b\x00\x00\x00\x00\x00\x00\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y9\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHF\xa6\xae\xce\x9c\xae\xf5=TW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00\x00\x00\x00\x00') 04:59:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x10}) 04:59:32 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa00008000600000000000"], 0x5e) [ 2759.882010] SELinux: failed to load policy [ 2759.900704] hfsplus: umask requires a value [ 2759.907972] hfsplus: unable to parse mount options 04:59:32 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r1 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x60, 0x1000) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000180)={'erspan0\x00', 0x6}) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2759.971369] hfsplus: umask requires a value [ 2759.977212] hfsplus: umask requires a value [ 2759.989476] hfsplus: unable to parse mount options [ 2760.002416] hfsplus: unable to parse mount options [ 2760.040868] SELinux: failed to load policy 04:59:32 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xfffffdfd}) 04:59:32 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x3, 0x440080) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:32 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa00008000600000000000"], 0x5e) 04:59:32 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffff01, 0x400000) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f0000000100)={0x2, 0xffff, 0x3, 0x5, 0x7fffffff}) prctl$PR_SET_FPEXC(0xc, 0x2) 04:59:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x1a}) [ 2760.268514] SELinux: failed to load policy [ 2760.277379] hfsplus: umask requires a value [ 2760.304730] vivid-000: kernel_thread() failed 04:59:32 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa00008000600000000000"], 0x5e) [ 2760.320041] hfsplus: unable to parse mount options 04:59:32 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r1, &(0x7f0000000180), 0x8) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2760.340782] hfsplus: umask requires a value [ 2760.356561] hfsplus: unable to parse mount options [ 2760.412436] SELinux: failed to load policy [ 2760.420975] hfsplus: umask requires a value [ 2760.425435] hfsplus: unable to parse mount options 04:59:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000000)) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r4 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f00000000c0)=r4) r5 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r5, 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x8) 04:59:33 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa0000800060000000000009a1"], 0x60) 04:59:33 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000400)='/proc/capi/capi20ncci\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000440)={0x0, 0x100000001}, 0x8) listen(r1, 0x0) r3 = accept(r1, 0x0, 0x0) r4 = fcntl$dupfd(r1, 0x0, r0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) ioctl(r0, 0x9, &(0x7f0000000480)="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") getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000280)={r5}, &(0x7f00000002c0)=0x8) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r7, 0x0) r8 = accept(r7, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r8, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r10 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r11}, 0x20) getsockopt$inet_sctp_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000380)=@assoc_id=r11, &(0x7f00000003c0)=0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000001480)={r12, @in6={{0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x12}, 0x2}}, 0x3, 0xcf}, 0x90) socket$inet_smc(0x2b, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x24000, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001540)=0xffffffffffffffff, 0x4) lsetxattr$security_ima(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000000300)=ANY=[@ANYRESHEX=r3], 0x1, 0x1) 04:59:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x1b}) 04:59:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xffffff7f}) 04:59:33 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa0000800060000000000009a1"], 0x60) [ 2760.861325] SELinux: failed to load policy [ 2760.866883] hfsplus: umask requires a value [ 2760.890907] hfsplus: umask requires a value [ 2760.896757] hfsplus: unable to parse mount options [ 2760.899549] hfsplus: unable to parse mount options [ 2760.981846] hfsplus: umask requires a value [ 2761.000871] hfsplus: unable to parse mount options [ 2761.047321] SELinux: failed to load policy 04:59:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x1c}) 04:59:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xffffff8c}) 04:59:33 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa0000800060000000000009a1"], 0x60) 04:59:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8000, 0x70) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000180)={0x18, 0x1, 0x0, {0x80000000}}, 0x18) setsockopt$sock_int(r2, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r2) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U+', 0x59b2}, 0x28, 0x1) [ 2761.218636] hfsplus: umask requires a value [ 2761.227128] SELinux: failed to load policy [ 2761.244057] hfsplus: umask requires a value [ 2761.248615] hfsplus: unable to parse mount options [ 2761.259348] hfsplus: unable to parse mount options 04:59:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) 04:59:33 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) exit(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x8000) getsockopt$bt_sco_SCO_OPTIONS(r3, 0x11, 0x1, &(0x7f0000000040)=""/39, &(0x7f0000000080)=0x27) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x0, 0x10040) [ 2761.353467] hfsplus: umask requires a value [ 2761.357845] hfsplus: unable to parse mount options 04:59:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xfffffff6}) 04:59:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x200) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x1, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_int(r2, 0x0, 0x13, &(0x7f0000000080), 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socket$isdn_base(0x22, 0x3, 0x0) r5 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newqdisc={0x30, 0x24, 0x507, 0x70bd2c, 0x0, {0x0, r11, {0x8}, {0xffff, 0xffff}, {0x0, 0xe}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r11, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@rand_addr="42d994c6e10d32db22e34c3045323718", @in6=@mcast2, 0x4e23, 0x8, 0x4e23, 0x3, 0xa, 0x20, 0xc4a98f701e28bba0, 0x5e, r11}, {0x9, 0x5, 0x5, 0xffff, 0x8000, 0x6, 0x6, 0x1ff}, {0x91e, 0x4, 0x7, 0x6}, 0xfff, 0x0, 0x1, 0x0, 0x335c7c8590dec653, 0x4}, {{@in=@multicast2, 0x4d4, 0x33}, 0xa, @in=@broadcast, 0x0, 0x3, 0x0, 0x81, 0x8, 0x2}}, 0xe8) r12 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r16}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r13, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r16, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r17 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r18, r19) setsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@rand_addr="42d994c6e10d32db22e34c3045323718", @in6=@mcast2, 0x4e23, 0x8, 0x4e23, 0x3, 0xa, 0x20, 0xc4a98f701e28bba0, 0x5e, r16, r18}, {0x9, 0x5, 0x5, 0xffff, 0x8000, 0x6, 0x6, 0x1ff}, {0x91e, 0x4, 0x7, 0x6}, 0xfff, 0x0, 0x1, 0x0, 0x335c7c8590dec653, 0x4}, {{@in=@multicast2, 0x4d4, 0x33}, 0xa, @in=@broadcast, 0x0, 0x3, 0x0, 0x81, 0x8, 0x2}}, 0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000040)={{{@in=@multicast2, @in6=@mcast1, 0x4e20, 0x3, 0x4e21, 0x40, 0xd, 0x0, 0x74631cc7744eee29, 0x87, r11, r18}, {0x7, 0xfdf2, 0x7, 0xfac033e, 0x5c45, 0x9, 0xf96, 0x81}, {0x9, 0xd8, 0x100000001, 0x4}, 0x1, 0x6e6bb7, 0x0, 0x0, 0x1, 0x6}, {{@in6=@mcast2, 0x4d3, 0x32}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x1f}, 0x3506, 0x3, 0x0, 0x100000001, 0x10000, 0x7, 0xffff}}, 0xe8) setsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000200)={@loopback, @multicast1, r11}, 0xc) r20 = socket$packet(0x11, 0xb648748644e4e75e, 0x300) fstatfs(r20, &(0x7f0000000180)=""/105) r21 = dup2(r3, r4) ioctl$DRM_IOCTL_GET_MAP(r21, 0xc0286404, &(0x7f00000000c0)={&(0x7f0000ffb000/0x3000)=nil, 0x5, 0x4, 0x1, &(0x7f0000ffb000/0x2000)=nil, 0x8}) syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r21, 0x8912, 0x400200) read$char_usb(r21, 0x0, 0xffffffffffffffc0) [ 2761.578218] hfsplus: umask requires a value [ 2761.593775] hfsplus: unable to parse mount options [ 2761.633410] hfsplus: umask requires a value [ 2761.641431] hfsplus: unable to parse mount options 04:59:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r3, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r3, 0x1) recvfrom$inet6(r3, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r3) preadv(r3, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x13}], 0x1, 0x0) 04:59:34 executing program 4: openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000180)={0x40, 0x2, 0x0, 0x0, 0x3f, 0x22eeb3a5, 0xc2, 0x0, 0xffffffffffffff31, 0x5, 0x0, 0x8, 0x0, 0x2, &(0x7f0000000100)=""/124, 0x0, 0x1}) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x100000002) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0x86, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000200)='./file0\x00', 0x0) write$P9_RREAD(r2, &(0x7f0000000200)=ANY=[], 0x5aa78d33) ioctl(0xffffffffffffffff, 0x0, 0x0) fallocate(r2, 0x10, 0x0, 0x10fffe) creat(&(0x7f0000000140)='./file0\x00', 0x0) 04:59:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x1d}) 04:59:34 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000080)={0x0, @src_change}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:34 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x1000000000}) 04:59:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCATTACH(r2, 0x4004743d, &(0x7f0000000040)=0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, &(0x7f0000000000)=0x6) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) pipe(&(0x7f0000000080)) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x202040, 0x0) r4 = dup(0xffffffffffffffff) read$char_usb(r4, 0x0, 0x361) 04:59:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='mountinfo\x00') ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f00000001c0)) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x10241, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r3, &(0x7f0000000180), 0x8) ioctl$VIDIOC_EXPBUF(r2, 0xc0405610, &(0x7f0000000040)={0x4, 0x6, 0x0, 0x1c8000, r3}) r4 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000080)) read$char_usb(r4, 0x0, 0x0) [ 2761.861486] hfsplus: umask requires a value [ 2761.865867] hfsplus: unable to parse mount options [ 2761.920557] hfsplus: umask requires a value [ 2761.925631] hfsplus: unable to parse mount options [ 2761.937694] hfsplus: umask requires a value [ 2761.945041] hfsplus: unable to parse mount options 04:59:34 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f00000017c0)={{0x6, 0x8000, 0x7, 0x6, 0xffffffffffffffff, 0x236}, 0x3ff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x80, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r4, 0x1) recvfrom$inet6(r4, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r4) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f00000016c0)=ANY=[@ANYBLOB="060000000000000000f0000000000000e800000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00'/232], @ANYBLOB="00000000000000000400000000000000be00000000000000", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00'/190], @ANYBLOB="000000000000000004000000000000000e00000000000000", @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/14], @ANYBLOB="000000000000000040301000000000002700000000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/39], @ANYBLOB="00000000000000000040000000000000c100000000000000", @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYBLOB='\x00'/193], @ANYBLOB="000000000000000000001000000000000010000000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00'/4096], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) r5 = dup2(r2, r4) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001800)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup2(r6, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {r9, 0xa7, "d45c9a", "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"}}, 0x110) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:34 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xedc000000000}) 04:59:34 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xe7, 0x81480) ioctl$TCSETX(r1, 0x5433, &(0x7f0000000100)={0x0, 0xfaeacd9, [0x4, 0xff, 0x9ffd, 0x3, 0x7], 0x8}) 04:59:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x22}) 04:59:34 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) pipe(&(0x7f0000000140)) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007ffffff700000000000000385a58000000000000000000000000000001000000000000000000fa0000800060000000000009a1e5"], 0x2ab) 04:59:34 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) exit(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r2, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000340)={'\x00', 0x1}) r4 = accept4(r2, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x80, 0x0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f00000001c0)=0x100, 0x4) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000440)={0x6, 0x1a, "ff97b05abfdbcf9f555b5b92cd3322b4fb806ee89aaeb8a113cf"}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r6, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) bind$isdn_base(r6, &(0x7f0000000040)={0x22, 0x3ff, 0xc8, 0x442, 0x42}, 0x6) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2762.202817] hfsplus: umask requires a value [ 2762.207267] hfsplus: unable to parse mount options [ 2762.323283] hfsplus: umask requires a value [ 2762.327650] hfsplus: unable to parse mount options [ 2762.328105] hfsplus: umask requires a value [ 2762.344642] hfsplus: unable to parse mount options [ 2762.381012] SELinux: failed to load policy 04:59:34 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x4000000000000}) 04:59:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x23b) clock_gettime(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) lstat(&(0x7f0000000500)='./file0/file1\x00', 0x0) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000003000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000000340)={0x90, 0x0, 0x2}, 0x90) 04:59:35 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000100)={{0x9, 0x7ff}, {0xffffffffffffff67, 0x3}, 0x6, 0x2, 0x200}) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r3, &(0x7f0000000180), 0x8) ioctl$MON_IOCX_GETX(r3, 0x4018920a, &(0x7f0000000240)={&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000001400)=""/4096, 0x1000}) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x40000, 0x0) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f00000002c0)={{0x0, 0x48000000000}, 0x2}, 0x10) listen(r2, 0x0) r5 = accept(r2, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="04000000d7060000000083b7"], &(0x7f00000001c0)=0xc) [ 2762.567209] hfsplus: umask requires a value [ 2762.579490] hfsplus: unable to parse mount options 04:59:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x2c}) 04:59:35 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r1, &(0x7f0000000180), 0x8) read$eventfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000080)={0x0, 0x7708, 0xffff, [], &(0x7f00000000c0)=0x7ff}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r3, &(0x7f0000000180), 0x8) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r6, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) ioctl$FS_IOC_SETVERSION(r6, 0x40087602, &(0x7f0000000140)=0xac1) read$eventfd(r4, &(0x7f0000000180), 0x8) ioctl$VHOST_SET_VRING_ERR(r3, 0x4008af22, &(0x7f0000000040)={0x1, r4}) syz_open_procfs(0x0, &(0x7f0000000340)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2762.633653] hfsplus: umask requires a value [ 2762.638091] hfsplus: unable to parse mount options [ 2762.780976] hfsplus: umask requires a value [ 2762.786233] hfsplus: unable to parse mount options 04:59:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5860cfe47bf070756b6020a3a4f12712951e9342c4df5e7acbe07cee5e091ef8976b200b0904daf497af3d126d484af8d432cd93032299498b5f1b62faa10a8663e4c00d955636de96bc05d88f2cd36285d77758f388bbad9a7e37ee9f7ba79d21c44a9fbcfe217680cc085a74ccc0a11323") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x4) 04:59:35 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x0) 04:59:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x40000000000000}) 04:59:35 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x7b382, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f00000000c0)={0x1, 0xf4c, 0x1000, 0x1000, &(0x7f00000004c0)="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", 0x12, 0x0, &(0x7f0000000080)="e32a26efde83e2f9dd6a42f40a1c3f7984a6"}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2762.995958] hfsplus: umask requires a value 04:59:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x48}) [ 2763.027926] hfsplus: unable to parse mount options 04:59:35 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = epoll_create(0x1ff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x1a8) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz0\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) [ 2763.097763] hfsplus: umask requires a value [ 2763.129014] hfsplus: unable to parse mount options 04:59:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x6b6b6b00000000}) 04:59:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0xfffffffffffffffd, @loopback}, 0x1b) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000000c0)=0x7) r7 = accept(r3, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r7, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) setsockopt$inet_tcp_TLS_RX(r7, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x304}, "39f11830bfbc0c65", "9e6044eeb961fac1165abb91ef4c2d20", "b3a12433", "8603bcf882849c46"}, 0x28) r8 = accept(r2, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r8, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r8, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 2763.205180] input: syz1 as /devices/virtual/input/input7 [ 2763.275727] hfsplus: umask requires a value [ 2763.304781] hfsplus: unable to parse mount options 04:59:35 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2763.421059] hfsplus: umask requires a value [ 2763.425428] hfsplus: unable to parse mount options [ 2763.504434] hfsplus: umask requires a value [ 2763.506736] vivid-001: kernel_thread() failed [ 2763.508799] hfsplus: unable to parse mount options 04:59:36 executing program 2: epoll_create1(0x100000) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x4c}) 04:59:36 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x100000000000000}) 04:59:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x100000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x1, 0xb8}, &(0x7f0000000080)=0x2) read$char_usb(r1, 0x0, 0x0) connect$netlink(r1, &(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbff, 0x40000000}, 0xc) 04:59:36 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() gettid() epoll_wait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}, {}], 0x3, 0x0) r0 = getpid() tkill(r0, 0x10) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x400}) memfd_create(0x0, 0x16) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x840000000002, 0x3, 0x6) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r1, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) connect$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) syz_emit_ethernet(0x1, &(0x7f0000001640)=ANY=[@ANYRESDEC], 0x0) [ 2763.746780] hfsplus: umask requires a value [ 2763.755929] hfsplus: umask requires a value [ 2763.760832] hfsplus: unable to parse mount options [ 2763.767127] hfsplus: unable to parse mount options [ 2763.865088] hfsplus: umask requires a value [ 2763.872904] hfsplus: unable to parse mount options 04:59:36 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xffff) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:36 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x200000000000000}) 04:59:36 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x101200, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)='p') r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x4c000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) accept(r2, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fcntl$notify(r3, 0x402, 0x24) read$char_usb(r1, 0x0, 0xec) 04:59:36 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000e12c11000000000009000007007ffffff700000010000000385a58000000000000000000000000000001000000000000000000fa00008000600000000000"], 0x5e) 04:59:36 executing program 2: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000280)={0x0, 0x3, 0xc91, [], &(0x7f0000000080)}) r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0xd, 0x20000) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f00000000c0)={0x0, 0x0, 0x100, 0x4, {0x6, 0x1, 0x8, 0x3}}) r2 = open(&(0x7f0000000000)='./file0\x00', 0x2081, 0x104) preadv(r2, &(0x7f0000001380)=[{&(0x7f0000000140)=""/5}, {&(0x7f0000000180)=""/125, 0xfffffd76}, {&(0x7f0000000200)=""/71}, {&(0x7f0000001500)=""/4096, 0x2f7972ccd9110f57}, {&(0x7f0000001400)=""/206}], 0x1000000000000064, 0x800000000) 04:59:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x60}) [ 2764.068240] hfsplus: umask requires a value [ 2764.089439] hfsplus: unable to parse mount options 04:59:36 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) exit(0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r0, &(0x7f0000000180), 0x55fe7e6ce18d367e) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000040)=0x8) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:36 executing program 2: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000000c0)={{0xa, 0x4e21, 0x7ff, @mcast2, 0x9}, {0xa, 0x4e22, 0x4, @mcast2}, 0x80000001, [0x10000, 0xc26b, 0x683c, 0x6, 0xd07, 0x4, 0x2, 0x7]}, 0x5c) chroot(&(0x7f00000002c0)='./file0\x00') syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xb, 0x1) accept$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e) r0 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/context\x00', 0x2, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000200)=""/188}, {&(0x7f0000000040)=""/69, 0x1f9}], 0xc5, 0xfffffffffffffffc) 04:59:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x100000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000)="dee9bd56427fb2ba8750a8c0e34e5c7c173735d46b494b5a256600bd46baaeb4438b36", &(0x7f0000000040)="57c4bf0b420e7257392d26a4f76d0fafc769c2d564b268358ff05ec7428ab8", 0x2}, 0x20) read$char_usb(r1, 0x0, 0x0) [ 2764.153189] hfsplus: umask requires a value [ 2764.158100] hfsplus: unable to parse mount options 04:59:36 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x300000000000000}) [ 2764.252907] hfsplus: umask requires a value [ 2764.263650] hfsplus: unable to parse mount options 04:59:36 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x8, 0x80000) 04:59:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x68}) [ 2764.410659] hfsplus: umask requires a value [ 2764.415491] hfsplus: unable to parse mount options [ 2764.475015] vivid-000: kernel_thread() failed [ 2764.485238] hfsplus: umask requires a value [ 2764.493976] hfsplus: unable to parse mount options [ 2764.594295] hfsplus: umask requires a value [ 2764.598662] hfsplus: unable to parse mount options 04:59:37 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:37 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) ioctl$FICLONE(r2, 0x40049409, r0) 04:59:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x400000000000000}) 04:59:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x6c}) [ 2764.928950] hfsplus: umask requires a value [ 2764.934077] hfsplus: unable to parse mount options [ 2764.946173] hfsplus: umask requires a value [ 2764.955335] hfsplus: unable to parse mount options 04:59:37 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x0) [ 2765.033891] hfsplus: umask requires a value [ 2765.038257] hfsplus: unable to parse mount options 04:59:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x500000000000000}) [ 2765.154787] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2765.181041] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2765.197766] CPU: 1 PID: 12375 Comm: syz-executor.4 Not tainted 4.19.73 #0 04:59:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x74}) [ 2765.203700] hfsplus: umask requires a value [ 2765.204722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2765.204728] Call Trace: [ 2765.204750] dump_stack+0x172/0x1f0 [ 2765.204772] warn_alloc.cold+0x7b/0x173 [ 2765.204788] ? zone_watermark_ok_safe+0x260/0x260 [ 2765.204806] ? lock_downgrade+0x810/0x810 [ 2765.211125] hfsplus: unable to parse mount options [ 2765.218536] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2765.218554] ? avc_has_perm+0x404/0x610 [ 2765.218581] __vmalloc_node_range+0x486/0x790 [ 2765.218601] ? sel_write_load+0x1de/0x470 [ 2765.260766] vmalloc+0x6b/0x90 [ 2765.263972] ? sel_write_load+0x1de/0x470 [ 2765.268126] sel_write_load+0x1de/0x470 [ 2765.272110] __vfs_write+0x114/0x810 [ 2765.275842] ? sel_make_policy_nodes+0x1520/0x1520 [ 2765.280784] ? kernel_read+0x120/0x120 [ 2765.284770] ? __lock_is_held+0xb6/0x140 [ 2765.288845] ? rcu_read_lock_sched_held+0x110/0x130 [ 2765.293867] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2765.298636] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2765.304179] ? __sb_start_write+0x1a9/0x360 [ 2765.308514] vfs_write+0x20c/0x560 [ 2765.312067] ksys_write+0x14f/0x2d0 [ 2765.315705] ? __ia32_sys_read+0xb0/0xb0 [ 2765.319774] ? do_syscall_64+0x26/0x620 [ 2765.323753] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2765.329123] ? do_syscall_64+0x26/0x620 [ 2765.333106] __x64_sys_write+0x73/0xb0 [ 2765.336999] do_syscall_64+0xfd/0x620 [ 2765.340810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2765.346003] RIP: 0033:0x4598e9 [ 2765.349201] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2765.368108] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2765.375820] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2765.383095] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2765.390367] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2765.397638] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2765.405035] R13: 00000000004c9b57 R14: 00000000004e12c8 R15: 00000000ffffffff [ 2765.414327] Mem-Info: [ 2765.416944] active_anon:114197 inactive_anon:192 isolated_anon:0 [ 2765.416944] active_file:5222 inactive_file:13006 isolated_file:0 [ 2765.416944] unevictable:0 dirty:89 writeback:0 unstable:0 [ 2765.416944] slab_reclaimable:21389 slab_unreclaimable:429260 [ 2765.416944] mapped:59554 shmem:245 pagetables:4563 bounce:0 [ 2765.416944] free:937659 free_pcp:392 free_cma:0 [ 2765.451320] Node 0 active_anon:432940kB inactive_anon:768kB active_file:20508kB inactive_file:29916kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238216kB dirty:340kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2765.479783] Node 1 active_anon:23848kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:16kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2765.506768] Node 0 DMA free:11264kB min:220kB low:272kB high:324kB active_anon:2052kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2765.533924] lowmem_reserve[]: 0 2555 2557 2557 [ 2765.542628] Node 0 DMA32 free:87428kB min:36248kB low:45308kB high:54368kB active_anon:430988kB inactive_anon:768kB active_file:20508kB inactive_file:29904kB unevictable:0kB writepending:396kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:9696kB pagetables:13468kB bounce:0kB free_pcp:1772kB local_pcp:1408kB free_cma:0kB [ 2765.574366] hfsplus: umask requires a value [ 2765.578722] hfsplus: unable to parse mount options [ 2765.584479] lowmem_reserve[]: 0 0 2 2 04:59:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) [ 2765.588836] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2765.618785] lowmem_reserve[]: 0 0 0 0 [ 2765.628527] Node 1 Normal free:3651216kB min:53608kB low:67008kB high:80408kB active_anon:23848kB inactive_anon:0kB active_file:380kB inactive_file:22108kB unevictable:0kB writepending:8kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2432kB pagetables:4780kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 04:59:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x600000000000000}) [ 2765.669111] lowmem_reserve[]: 0 0 0 0 [ 2765.673737] Node 0 DMA: 14*4kB (UME) 129*8kB (UME) 64*16kB (UME) 28*32kB (UM) 5*64kB (UM) 4*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 11264kB [ 2765.712344] hfsplus: umask requires a value [ 2765.722264] vivid-000: kernel_thread() failed [ 2765.736734] hfsplus: unable to parse mount options [ 2765.747103] Node 0 DMA32: 644*4kB (UEH) 1362*8kB (UMEH) 660*16kB (UMEH) 1272*32kB (UMEH) 272*64kB (UMEH) 36*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 86752kB [ 2765.775754] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2765.797127] Node 1 Normal: 726*4kB (UME) 3415*8kB (UME) 2548*16kB (UME) 1194*32kB (UME) 518*64kB (UME) 169*128kB (UME) 32*256kB (UME) 15*512kB (UM) 10*1024kB (UM) 2*2048kB (UE) 844*4096kB (UM) = 3651216kB 04:59:38 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:38 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x8, 0x204102) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000080)=0x4) socket$pptp(0x18, 0x1, 0x2) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x2, 0x10082) [ 2765.828664] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2765.847748] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2765.858036] hfsplus: umask requires a value 04:59:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) [ 2765.870765] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2765.880132] hfsplus: unable to parse mount options [ 2765.886169] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2765.903604] 18478 total pagecache pages [ 2765.908261] 0 pages in swap cache [ 2765.918683] Swap cache stats: add 0, delete 0, find 0/0 [ 2765.935455] Free swap = 0kB [ 2765.935465] Total swap = 0kB [ 2765.944566] 1965979 pages RAM [ 2765.947855] hfsplus: umask requires a value [ 2765.947863] hfsplus: unable to parse mount options [ 2765.968700] 0 pages HighMem/MovableOnly 04:59:38 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) exit(0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000180)={0x10}) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xff, 0xbefa031d99b5cdc) r3 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0xffff, 0x800000) ioctl$VIDIOC_SUBDEV_S_FMT(r3, 0xc0585605, &(0x7f0000000340)={0x0, 0x0, {0x7f, 0x7, 0x805, 0x5, 0xb, 0x8, 0x3}}) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000080)={0x400, 0xd4, "191635488c6e1be6d6a662d345ce976e147984bc7772ba6e903e933bf73438b99a1409f365c1fad6a51a16a52b0660e30f9cbd69f161210d51d2782ad2ff8555e5b675da3610572f343c131a4ff8604fbb7a483dcf91b694c5afec57b85698355a9fb44ac6069b9e833237344c5890b7a9e16007c59b1c9b57396f09666aca23742bf16f0b7f128e7a62271233b297f9e46d130eabbb9fc0f86c26dcf519e9cd2d8fe6333aa0cdd5952d9a09da69540023ef54d45ef21d52e58b22e073937ec328d9bf656ae8c4f96e244ee4c3346169cce92232"}) 04:59:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x700000000000000}) [ 2765.992663] 338856 pages reserved [ 2766.016500] 0 pages cma reserved 04:59:38 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a79435668abbd42b361f438e3bbee4ea19c40c83539f968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a047"], 0x1}}, 0x8000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r3, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r3, 0x1) recvfrom$inet6(r3, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r3) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x1, 0x3, 0x4, 0x3, {0xa, 0x4e23, 0x8, @loopback, 0xf93}}}, 0x32) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000300)=0x5f, 0x12) 04:59:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x7a}) 04:59:38 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r1, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4051}, 0x10) [ 2766.104853] hfsplus: umask requires a value [ 2766.136684] hfsplus: unable to parse mount options [ 2766.149985] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2766.186246] hfsplus: umask requires a value [ 2766.206592] hfsplus: unable to parse mount options 04:59:38 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000200)=0xcc1312cc80a05e58, 0x4) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r2, &(0x7f0000000180), 0x8) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x1000, 0x1}) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000100), &(0x7f0000000140)=0x4) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x800000000000000}) [ 2766.283966] hfsplus: umask requires a value [ 2766.298717] hfsplus: unable to parse mount options 04:59:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x300}) [ 2766.473583] hfsplus: umask requires a value [ 2766.486740] hfsplus: unable to parse mount options 04:59:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4400) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000080)) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) rt_sigpending(&(0x7f0000000000), 0x8) read$char_usb(r2, 0x0, 0x0) [ 2766.571032] hfsplus: umask requires a value [ 2766.585974] hfsplus: umask requires a value [ 2766.592446] hfsplus: unable to parse mount options [ 2766.609786] hfsplus: unable to parse mount options 04:59:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x900000000000000}) [ 2766.945659] hfsplus: umask requires a value [ 2766.951530] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2766.969711] hfsplus: unable to parse mount options 04:59:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_VAPIC_ADDR(r4, 0x4008ae93, &(0x7f0000000000)) read$char_usb(r1, 0x0, 0x0) [ 2767.008982] hfsplus: umask requires a value [ 2767.019185] hfsplus: unable to parse mount options 04:59:39 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) exit(0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)={0x2, 0x17, 0xfffffffffffffc00, 0x9, 0x22, 0x0, 0x70bd2b, 0x25dfdbff, [@sadb_x_filter={0x5, 0x1a, @in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@loopback, 0x5, 0x4, 0x8}, @sadb_address={0x3, 0x6, 0x0, 0x20, 0x0, @in={0x2, 0x4e24, @multicast2}}, @sadb_key={0x1, 0x8}, @sadb_x_nat_t_port={0x1, 0x16, 0x4e22}, @sadb_ident={0x2, 0x1, 0x40, 0x0, 0x3}, @sadb_x_filter={0x5, 0x1a, @in6=@dev={0xfe, 0x80, [], 0x15}, @in=@remote, 0x1, 0x26}, @sadb_sa={0x2, 0x1, 0x4d2, 0xffffffffffffff9e, 0x3, 0x7d, 0x0, 0x40000001}, @sadb_lifetime={0x4, 0x3, 0x10000, 0x400, 0x100000000, 0x5}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e20, @rand_addr=0x10000}}, @sadb_lifetime={0x4, 0x2, 0x0, 0x5, 0xfffffffffffffffa, 0x5}]}, 0x110}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00c600bd850bea55a163b3fdc21ca1a177", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r6, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9e}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x8, 0x1, 0x1, 0x10000, 0x0, 0x5, 0x3, {r7, @in={{0x2, 0xbe9, @local}}, 0x2000000000008, 0x2, 0x2, 0x100000000, 0x6f0b}}, &(0x7f0000000100)=0xb0) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140)={r8, 0x4}, 0x8) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xa00000000000000}) 04:59:39 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='\b\x00', 0x4, 0x4800) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r3, 0x0) r4 = accept(r3, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYRES32], 0x1}}, 0x7e4bff68b6266cf1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0xffff, @local, 0x7}}, 0x0, 0x6, 0x6, 0x4, 0x184}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000380)={r5, @in6={{0xa, 0x4e24, 0x2, @dev={0xfe, 0x80, [], 0x17}, 0x4}}, 0x7f8, 0xb8, 0x101, 0x40, 0x152}, &(0x7f0000000440)=0x98) r6 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r6, 0xc0945662, &(0x7f0000000180)={0x9, 0x0, [], {0x0, @reserved}}) r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r7, 0xc0485661, &(0x7f0000000100)={0x5, 0x2, @stop_pts=0x4}) 04:59:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x3f8}) [ 2767.186505] hfsplus: umask requires a value [ 2767.202622] hfsplus: unable to parse mount options [ 2767.258121] hfsplus: umask requires a value [ 2767.279226] hfsplus: unable to parse mount options 04:59:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x110e000000000000}) 04:59:39 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioprio_get$uid(0x3, r2) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2767.320440] hfsplus: umask requires a value [ 2767.325089] hfsplus: unable to parse mount options [ 2767.420112] hfsplus: umask requires a value [ 2767.424483] hfsplus: unable to parse mount options 04:59:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x500}) [ 2767.497842] hfsplus: umask requires a value [ 2767.503249] hfsplus: unable to parse mount options 04:59:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x1f00000000000000}) 04:59:40 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000100)={0x8, @sdr={0x513addf7, 0xfffffffffffffc00}}) ioctl$TCGETS2(r3, 0x802c542a, &(0x7f00000000c0)) syz_open_pts(r3, 0x6b7c55b7edb0df31) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2767.648249] hfsplus: umask requires a value [ 2767.655502] hfsplus: unable to parse mount options [ 2767.657461] hfsplus: umask requires a value [ 2767.676020] hfsplus: unable to parse mount options [ 2767.764358] hfsplus: umask requires a value [ 2767.780340] hfsplus: unable to parse mount options 04:59:40 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='vhci\x00', 0x40) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x901, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000140)={0x0, 0x100000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000180)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000001c0)={r2, r6}) 04:59:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x2000000000000000}) [ 2767.977073] hfsplus: umask requires a value [ 2767.996586] hfsplus: unable to parse mount options 04:59:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x600}) 04:59:40 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='vhci\x00', 0x40) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x901, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000140)={0x0, 0x100000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000180)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000001c0)={r2, r6}) 04:59:40 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x4001, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000100)='security.SMACK64\x00', &(0x7f0000000140)='/dev/video#\x00', 0xc, 0x2) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x9, 0x880) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x50, 0x0, 0x3db7a097df5843bf, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x555}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) [ 2768.071047] hfsplus: umask requires a value [ 2768.075404] hfsplus: unable to parse mount options 04:59:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'\xd0u\xf1', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$unlink(0x6, r2, 0x0) keyctl$instantiate_iov(0x14, r2, 0x0, 0xc40eba7, r2) r3 = request_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)='/dev/input/mice\x00', r2) keyctl$set_timeout(0xf, r3, 0xdbc000000000) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000040}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x4c, r1, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @empty}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr="aaba6ea16d43b9491cc521059aa9d222"}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xee}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x808) r4 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r4, 0x0, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r5, &(0x7f0000000180), 0x8) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f00000002c0)=0xc4f7) [ 2768.151543] hfsplus: umask requires a value 04:59:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x2200000000000000}) 04:59:40 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='vhci\x00', 0x40) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x901, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000140)={0x0, 0x100000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000180)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000001c0)={r2, r6}) [ 2768.173536] hfsplus: unable to parse mount options 04:59:40 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x40) keyctl$invalidate(0x15, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) preadv(r2, &(0x7f0000000100), 0x1, 0x0) 04:59:40 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x8, 0x20000) mmap(&(0x7f0000ff4000/0xb000)=nil, 0xb000, 0x4, 0x2010, r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl(r1, 0x9, &(0x7f0000000380)="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") r2 = syz_open_dev$mice(&(0x7f0000000140)='.de\xff\x01\xff\xffO}te\x00!\x00', 0x0, 0x20000) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x40) read$char_usb(r2, 0x0, 0x0) 04:59:40 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='vhci\x00', 0x40) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x901, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000140)={0x0, 0x100000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_CHILD_SUBREAPER(0x25) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000180)) [ 2768.369863] hfsplus: umask requires a value [ 2768.388891] hfsplus: unable to parse mount options [ 2768.407080] RDS: rds_bind could not find a transport for fe80::, load rds_tcp or rds_rdma? [ 2768.443614] hfsplus: umask requires a value [ 2768.465208] hfsplus: unable to parse mount options 04:59:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x700}) 04:59:41 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='vhci\x00', 0x40) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x901, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000140)={0x0, 0x100000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_CHILD_SUBREAPER(0x25) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 04:59:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x2c00000000000000}) 04:59:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r5, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) read$char_usb(r7, 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) 04:59:41 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='vhci\x00', 0x40) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x901, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000140)={0x0, 0x100000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_CHILD_SUBREAPER(0x25) dup2(r1, r2) [ 2768.657596] hfsplus: umask requires a value [ 2768.669390] hfsplus: unable to parse mount options 04:59:41 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='vhci\x00', 0x40) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x901, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000140)={0x0, 0x100000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) prctl$PR_GET_CHILD_SUBREAPER(0x25) [ 2768.736702] hfsplus: umask requires a value [ 2768.749378] hfsplus: unable to parse mount options [ 2768.817374] hfsplus: umask requires a value [ 2768.821942] hfsplus: unable to parse mount options 04:59:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x3f00000000000000}) 04:59:41 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='vhci\x00', 0x40) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x901, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000140)={0x0, 0x100000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) [ 2769.025938] hfsplus: umask requires a value [ 2769.040908] hfsplus: unable to parse mount options [ 2769.101142] hfsplus: umask requires a value [ 2769.105703] hfsplus: unable to parse mount options 04:59:41 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) exit(0x0) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000040)={0xfffffffffffffff7, 0x7, 0x7, 0x20}) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:41 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x20040, 0x202) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) 04:59:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x900}) 04:59:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x4000000000000000}) 04:59:41 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='vhci\x00', 0x40) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x901, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000140)={0x0, 0x100000}) 04:59:41 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x80, 0x0) syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x217, 0x440180) 04:59:41 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='vhci\x00', 0x40) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x901, 0x0) [ 2769.355057] hfsplus: umask requires a value [ 2769.369172] hfsplus: unable to parse mount options [ 2769.420509] hfsplus: umask requires a value [ 2769.425002] hfsplus: unable to parse mount options [ 2769.432121] hfsplus: umask requires a value [ 2769.437804] hfsplus: unable to parse mount options 04:59:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x4800000000000000}) 04:59:42 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='vhci\x00', 0x40) [ 2769.574100] vivid-000: kernel_thread() failed 04:59:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xa00}) 04:59:42 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080), 0x0, 0x0) [ 2769.639888] hfsplus: umask requires a value [ 2769.654442] hfsplus: unable to parse mount options 04:59:42 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x7ffd, 0x210100) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2769.717240] hfsplus: umask requires a value [ 2769.725107] hfsplus: unable to parse mount options [ 2769.802999] hfsplus: umask requires a value [ 2769.833909] hfsplus: unable to parse mount options 04:59:42 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r0, &(0x7f0000000180), 0x8) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) syz_open_procfs(r1, &(0x7f0000000000)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) socket$inet(0x2, 0x80007, 0xcf) 04:59:42 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x4c00000000000000}) 04:59:42 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x100) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xe11}) [ 2770.381481] hfsplus: umask requires a value 04:59:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x3, &(0x7f0000000040)="71b29bffc454bfaf02dd34bd1f7a94378f86") ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e26, 0x0, @local}, 0x1000001cd) listen(r2, 0x0) accept(r2, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000000)=0x4830, 0x4) read$char_usb(r1, 0x0, 0xffffffffffffffad) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = geteuid() getresgid(&(0x7f00000000c0)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) r7 = getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r10, r11) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r13) r14 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r15, r16) r17 = getuid() getresgid(&(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) r19 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r20) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r3, &(0x7f00000004c0)={0x400, 0x0, 0x4, [{{0x0, 0x0, 0x8001, 0x8, 0x4, 0x7, {0x2, 0xa, 0x7, 0x20, 0x10000, 0x0, 0x6, 0xff, 0x1, 0xe674, 0x1, r4, r5, 0x98, 0x3}}, {0x2, 0x0, 0xd, 0x8, 'usersecurity!'}}, {{0x0, 0x1, 0xb4, 0x7, 0x8, 0x362, {0x3, 0x0, 0x446, 0x80000000, 0x200, 0x0, 0x6, 0x3f, 0x80000001, 0x8, 0x7fffffff, r6, r7, 0xfffffffffffffc01, 0x7}}, {0x4, 0x9, 0x10, 0x5, '/dev/input/mice\x00'}}, {{0x5, 0x2, 0x923, 0x2, 0x9, 0xffff, {0x5, 0x1, 0x0, 0xff, 0x5, 0x3, 0x3ff, 0x4, 0x7, 0x100, 0x2, r8, r11, 0x9, 0x3}}, {0x5, 0x18000000000, 0x17, 0x9, 'selfkeyring*lo%keyring!'}}, {{0x3, 0x2, 0x100000000, 0x90000000000000, 0x4, 0x8, {0x1, 0x2, 0x101, 0x6, 0x1ff, 0x1, 0x4, 0x7, 0x4e, 0x0, 0x6, r13, r16, 0x4a, 0x8}}, {0x5, 0x800, 0x10, 0x4, '/dev/input/mice\x00'}}, {{0x0, 0x2, 0x3, 0x0, 0x95, 0x3f, {0x0, 0x8001, 0x5, 0x1000, 0x8, 0x9, 0x931, 0x8, 0xff, 0x2, 0x8, r17, r18, 0xfff, 0x7fff}}, {0x5, 0x2, 0x0, 0x1f}}, {{0x2, 0x0, 0x7fffffff, 0x8001, 0x3, 0x6, {0x4, 0xc3f, 0xffffffff8c47a115, 0x6, 0x3, 0x0, 0x10001, 0x2a, 0x200, 0x9, 0x5, r20, r21, 0x7, 0x6}}, {0x0, 0x2, 0x11, 0x6, '!}wlan1md5sumppp1'}}]}, 0x400) 04:59:42 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:42 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) write$P9_RCREATE(r0, &(0x7f0000000100)={0x18, 0x73, 0x2, {{0x2, 0x0, 0x6}, 0x2}}, 0x18) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r2, 0x1, 0x1d, &(0x7f0000000140)=0xfffffffffffff772, 0x4) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) close(r2) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) [ 2770.405388] hfsplus: umask requires a value [ 2770.419237] hfsplus: unable to parse mount options [ 2770.429803] hfsplus: unable to parse mount options 04:59:43 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2770.536818] hfsplus: umask requires a value [ 2770.552029] hfsplus: unable to parse mount options 04:59:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x110e}) 04:59:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x6000000000000000}) 04:59:43 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000009912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) [ 2770.720734] hfsplus: umask requires a value [ 2770.731597] hfsplus: unable to parse mount options [ 2770.784577] hfsplus: umask requires a value [ 2770.796299] hfsplus: unable to parse mount options [ 2770.816154] vivid-000: kernel_thread() failed [ 2770.866475] hfsplus: umask requires a value [ 2770.881058] hfsplus: unable to parse mount options 04:59:43 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r2 = getpgrp(0x0) fadvise64(r0, 0x4, 0x3, 0x1) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000200)=r2) syz_open_procfs(r2, &(0x7f0000000040)='net/dev_snmp6\x00') 04:59:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x800, 0x2, &(0x7f0000000300)=[{&(0x7f0000000140)="63f3cede892be92a4a6cdc5e7b452051d4b4cb07b32af7fef7bcc5b9b03497e186d3ad74fdab72bbd36e785efc963548aa5b703d0df65b537c1f107333aba1954ffc91cde171da2b95818b04a2b4d445fd17c2d898b8d69cec9e14a46639a3c2fc899dad9575258c79a0ca2c179977666b2c13506c8b66fc59e3c2d2a9054bff90b4117c0fcbb4e4571088aca97d9b52190f45ac1270f9e3b92721212812ada88c4e93ce86f87f64db087719eba9e7e7dfd5349cc8ef91b0baed", 0xba, 0x2}, {&(0x7f0000000200)="68b14a21ac11b127da834e6ac8b25f03523c44e4205a2d38263ea61d81589f63728a30d8faab66460af3821e59013b54e7690190b02879674dcb39a62ece610160ac873ae26312e3c1c9b4aef9c903417a8a545b1b168d9a14ed9fa98192f4144c154a6940b8cf06b37ca4b6ee187294c61d85fa3d3845eaaf6217cc8863417fe47f350c56bf8f5e99e55df5cc4f97859e4dae3feeb811ef479fbd2036452ddb91ee0db584a26a430674a4d2d60d91fe7e10b6551ada6cac75ed2a1ad8757478d156b22d19a23147694ab810b24cfec43046b065a57d532772cffa1b7db59b", 0xdf, 0x3}], 0x20000, &(0x7f00000003c0)={[{@session={'session', 0x3d, 0x1000}}, {@dir_umask={'dir_umask', 0x3d, 0x5d0d}}, {@umask={'umask', 0x3d, 0x200000}}, {@dir_umask={'dir_umask', 0x3d, 0x3}}, {@gid={'gid', 0x3d, r1}}], [{@measure='measure'}, {@measure='measure'}, {@dont_appraise='dont_appraise'}]}) r2 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r2, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:43 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x1a00}) 04:59:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x6800000000000000}) 04:59:43 executing program 4: r0 = syz_open_dev$video(0x0, 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2771.330544] hfsplus: umask requires a value [ 2771.334989] hfsplus: unable to parse mount options 04:59:43 executing program 4: r0 = syz_open_dev$video(0x0, 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2771.421018] hfsplus: umask requires a value [ 2771.425389] hfsplus: unable to parse mount options [ 2771.435606] hfsplus: umask requires a value [ 2771.442137] hfsplus: unable to parse mount options 04:59:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x6c00000000000000}) 04:59:44 executing program 4: r0 = syz_open_dev$video(0x0, 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:44 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x111000) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/19, 0x13}], 0x1, 0x0) 04:59:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x1b00}) 04:59:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) [ 2771.744367] hfsplus: umask requires a value [ 2771.764566] hfsplus: umask requires a value [ 2771.773482] hfsplus: unable to parse mount options [ 2771.792755] hfsplus: unable to parse mount options [ 2771.860006] hfsplus: umask requires a value [ 2771.864380] hfsplus: unable to parse mount options 04:59:44 executing program 0: pipe2$9p(&(0x7f0000000040), 0x5000) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:44 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:44 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KDDISABIO(r1, 0x4b37) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x1c00}) 04:59:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x7400000000000000}) 04:59:44 executing program 1: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x18600) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000890e, &(0x7f0000000100)="5431850d5f0b7d007bfd70") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) 04:59:44 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2772.269299] hfsplus: umask requires a value [ 2772.273662] hfsplus: unable to parse mount options [ 2772.295414] hfsplus: umask requires a value 04:59:44 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x3, 0x1) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0xcad46) r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000007f98ff43bccda103b9469eed98470000f265000002000000"]) [ 2772.318124] hfsplus: unable to parse mount options 04:59:44 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2772.432699] hfsplus: umask requires a value [ 2772.437061] hfsplus: unable to parse mount options 04:59:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x7a00000000000000}) 04:59:45 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x1d00}) [ 2772.590230] hfsplus: umask requires a value [ 2772.605995] hfsplus: unable to parse mount options [ 2772.672745] vivid-000: kernel_thread() failed [ 2772.678649] hfsplus: umask requires a value [ 2772.691885] hfsplus: unable to parse mount options [ 2772.749731] hfsplus: umask requires a value [ 2772.773735] hfsplus: unable to parse mount options 04:59:45 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:45 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0xc4843, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r4, 0x0) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r6 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x60) ioctl$sock_bt_cmtp_CMTPCONNADD(r5, 0x400443c8, &(0x7f0000000240)={r6, 0x8}) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) ioprio_set$pid(0x6, r3, 0x6) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000100), 0x4) 04:59:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x8cffffff00000000}) 04:59:45 executing program 4: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x1f00}) 04:59:45 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:45 executing program 4: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2773.271575] hfsplus: umask requires a value [ 2773.288392] hfsplus: unable to parse mount options [ 2773.330564] hfsplus: umask requires a value [ 2773.336793] hfsplus: unable to parse mount options [ 2773.344589] hfsplus: umask requires a value [ 2773.355083] hfsplus: unable to parse mount options 04:59:45 executing program 4: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xf6ffffff00000000}) 04:59:46 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x2000}) 04:59:46 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, 0x0, 0x0, 0x0) [ 2773.603831] hfsplus: umask requires a value [ 2773.631794] hfsplus: unable to parse mount options [ 2773.689311] hfsplus: umask requires a value [ 2773.693861] hfsplus: unable to parse mount options [ 2773.746077] hfsplus: umask requires a value [ 2773.763194] hfsplus: unable to parse mount options [ 2774.059817] vivid-000: kernel_thread() failed 04:59:46 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dro\x8f\x00', 0x200880, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)=0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f00000001c0)=0x7fffffff) r4 = fcntl$getown(0xffffffffffffffff, 0x9) r5 = syz_open_procfs(r4, &(0x7f0000000100)='numa_mapc\x00') socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$vsock_dgram(r5, &(0x7f0000000000)={0x28, 0x0, 0x2711}, 0x10) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r7, 0x0) accept(r7, 0x0, 0x0) fcntl$getown(r7, 0x9) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xfcfdffff00000000}) 04:59:46 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:46 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, 0x0, 0x0, 0x0) 04:59:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x2200}) 04:59:46 executing program 2: socket$pppoe(0x18, 0x1, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/117, 0x75) flistxattr(0xffffffffffffffff, &(0x7f0000000140)=""/221, 0xdd) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2774.183945] hfsplus: umask requires a value [ 2774.188303] hfsplus: unable to parse mount options 04:59:46 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:46 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, 0x0, 0x0, 0x0) [ 2774.272895] hfsplus: umask requires a value [ 2774.277257] hfsplus: unable to parse mount options [ 2774.284780] hfsplus: umask requires a value [ 2774.291301] hfsplus: unable to parse mount options 04:59:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xfdfdffff00000000}) 04:59:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x2c00}) 04:59:46 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2774.511459] hfsplus: umask requires a value [ 2774.530557] hfsplus: unable to parse mount options 04:59:47 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080), 0x0, 0x0) 04:59:47 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2774.616689] hfsplus: umask requires a value [ 2774.621899] hfsplus: umask requires a value [ 2774.632135] hfsplus: unable to parse mount options [ 2774.646956] hfsplus: unable to parse mount options 04:59:47 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x200, 0xa95b86f5bed9d2f0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/ip_vs_stats\x00') preadv(r1, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0xfc) r4 = dup2(r2, r3) r5 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x174, 0x200000) socket$packet(0x11, 0x0, 0x300) getsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f00000000c0)={0x8001003, 0xffffffffffff1bed, 0xef05c9c9735a3bed}) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r11, r12) r13 = socket(0x10, 0x4, 0x0) r14 = syz_open_dev$media(&(0x7f00000005c0)='/dev/media#\x00', 0x3, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r14, 0x84, 0x12, &(0x7f0000000600)=0x5, 0x4) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) stat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f00000002c0)='./file0\x00', r15, r17) r18 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r19, r20) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x8) chown(&(0x7f00000002c0)='./file0\x00', r23, r24) setgroups(0x7, &(0x7f0000000580)=[r6, r9, r12, r16, r20, r21, r24]) 04:59:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xffff070000000000}) 04:59:47 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080), 0x0, 0x0) 04:59:47 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x1, 0x112401) 04:59:47 executing program 1: r0 = syz_open_dev$video(0x0, 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2774.897079] hfsplus: umask requires a value 04:59:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x3f00}) 04:59:47 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080), 0x0, 0x0) [ 2774.917625] hfsplus: unable to parse mount options 04:59:47 executing program 1: r0 = syz_open_dev$video(0x0, 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:47 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) [ 2775.011256] hfsplus: umask requires a value [ 2775.018937] hfsplus: unable to parse mount options 04:59:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xffff1f0000000000}) [ 2775.111792] hfsplus: umask requires a value 04:59:47 executing program 1: r0 = syz_open_dev$video(0x0, 0x5, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:47 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) [ 2775.133284] vivid-000: kernel_thread() failed [ 2775.149266] hfsplus: unable to parse mount options 04:59:47 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioprio_get$uid(0x3, r2) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2775.235058] hfsplus: umask requires a value [ 2775.259304] hfsplus: unable to parse mount options 04:59:47 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:47 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) [ 2775.314173] hfsplus: umask requires a value [ 2775.328893] hfsplus: unable to parse mount options 04:59:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x4000}) 04:59:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xffffff7f00000000}) 04:59:47 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:47 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x02bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2775.527681] hfsplus: umask requires a value [ 2775.547907] hfsplus: unable to parse mount options 04:59:48 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x8040) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2775.608310] hfsplus: umask requires a value [ 2775.617672] hfsplus: umask requires a value [ 2775.618574] hfsplus: unable to parse mount options 04:59:48 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xffffffff00000000}) [ 2775.659340] hfsplus: unable to parse mount options 04:59:48 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2775.773232] hfsplus: umask requires a value [ 2775.784681] hfsplus: unable to parse mount options 04:59:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x4800}) [ 2775.849699] hfsplus: umask requires a value [ 2775.858229] hfsplus: unable to parse mount options 04:59:48 executing program 1: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2776.027875] hfsplus: umask requires a value [ 2776.046198] hfsplus: unable to parse mount options 04:59:48 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioprio_get$uid(0x3, r2) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:48 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xffffffffffffffff}) 04:59:48 executing program 1: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:48 executing program 1: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2776.244188] hfsplus: umask requires a value [ 2776.248548] hfsplus: unable to parse mount options 04:59:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x4c00}) [ 2776.345633] hfsplus: umask requires a value [ 2776.352830] hfsplus: unable to parse mount options 04:59:48 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x300) 04:59:48 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, 0x0, 0x0, 0x0) [ 2776.436132] hfsplus: umask requires a value [ 2776.454479] hfsplus: unable to parse mount options 04:59:49 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x5) 04:59:49 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, 0x0, 0x0, 0x0) 04:59:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x6000}) 04:59:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000a80)={{0x1f, 0xd47}, 'port1\x00', 0x6c, 0x1008, 0x100000000, 0x5, 0x400, 0x8, 0x9, 0x0, 0x4, 0x3}) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) syz_mount_image$f2fs(&(0x7f00000006c0)='f2fs\x00', &(0x7f0000000700)='./file0\x00', 0xfffffffffffffffc, 0x5, &(0x7f00000008c0)=[{&(0x7f0000000740)="ab4957402c85a95e7c3a43885d442ffaaad278e19b131cc4231b076bcb413ea8748435f6038d6f3448551ef1a793d447e570f97506e6e958802a77a0c2172f3b2e5027a2c9311dce064c92f9d625014fce07713b", 0x54}, {&(0x7f0000002400)="8c8f67b0347b372520a5bb28f07c5d5cc4df8ee02600f53aff7ede0a2a1db4b4822555b900b9b0e55e436af02874347ff1fadfa598eef57a1d4e5a0d313571a11ee9695b4a3d9f8808232402c467af34b40bbc4c125efabb50d3cee2b353a41fa80cedcaca30465c37ccdfa651ac28f6039ee60f3974dd1444a30648db0148c3358e83dfe2a8d51d63f45ece389d36c32186e75168c2ab099b6249b7de599f881131be7291e167744417a16ea1d51ab8d4bc5e2a6b6e3d773d0b8a518229761f159a0b874a0c6cc76f05c23b35c07e49b9d3ed33a9ae203ef7833c2dfa19f139e945462aae1c2bafccc5a4b0db7af36175773c274236eb629e6e8c3bb445aa1ce7f4a111a21bee09e06c55594df10dba4f73b341bef0ba5df6ce2097edd081b4543533eb19b2e57ba1562effd6f546cec82b47ffa6aab066655978bdaa05d1fcb2dc35d290286b152d3c248215adaf3beddd6464f709e806cddb423aa17a5dcae5cd80d7b7681d9b571186913b14f3e00605c8bd3c6a8e5537cd78b0a8d3db5b483203fe490d9e4b2f2874d289cf1c6d43c8234ba80c453ffe1ba0301cba6150ef8b0c455d7467c98317e7d762a8ed401bf17be3525f9b7f47d92a2e026825424a26cc915046364f36cd90e7b8e4f5a9639bd3a38eeec89470c7b3a9476100145df2e40000e783f051a60982172296f5ac15c19ae97f78f6bb25be784835070204a07490d38c8e2b8e2418eab8ef8833792c239cbb7594d0a5f4881a7c69f8788690b25cb64226b161833e55df42ef735be70a7ad18aac5b81883f867f006de790df5a832ef7d25330977747c3f798cbd3d8de84a19799a78184c5d9ec80ee3bca558d98df2f2f08ac890332b7fed622a973ada6d8ada31c1a361cb1aef0c976065cbfc876ec50ed98a2bda024dc52cc5527d79bed3e88bc9a8935a508fa713a56ac236d8948944d62221d6598cbef165babd71ea3572fb89c52fa9b2b07c8964d08bb461399bcd24c26807bdb2a5f28e0313506062d5a7bf23d166ce900a82b37e67ab54b640b2b89cf95ec477d25219b45444cc3abf01e529b5ee8dcb6aaa8266a88527b50f3bc0e5c93604e63eddcbe62cbe0ff1104cb3618759a142e0e9ecd85b36ea8273c03d6672fbddafbb2b24c73c45b0ad7811e349eb1386fd17bd8b9a211b997fc3a792025381b007362e35fcc079db9195971c2bcd22c8c6d1380bf74ea80a08fa07a13d6dd12cbf93b3daf7e964b899a8d25d6cd20f10338b32a58dc5fc759bd2844734835f2a7f5be92a14e5b65732753b647115f68a6f6d905a98afa67c45953b5f8be0c4b52b7365e17ba101b77714e6229a55dbfe0f695d4e3db838f87c0f387c923e336af1ee8ce9c15c6f7b1a2eef4a0c4d6284eb685a85ae4307e13a5798aa36610a03b056eebf35b3123c290a309462a00b2a7a8cd14ada78aa1c12a7473363a72c191caf7c69aa24ddab216d03b95388b96c973a538038bf41b2636603b99c7002e7f09d77239a028425c71bcacca8911761fda0f10a53073c4428dc7d3c43e20c95a06c627ee7a3cfa3810f3f59edf9e815008756684d35ddb294744e895daa78b1b15a18dace311a6f6345f456e9cf0597cc472c1ce61da4d8eaf4beea915220033f3ab0e12635730510518aacdb2cfb5f215dc4f72fbd18a5d467b844ebe58235f3fc1acdd870f9bff5d00d439be98f8cc40f301b3a453f04aa679fbec2dd814beb6183f4890825b3c2add0ebde5d492267994ee2b5bde3de4019086965d65fb04a183dad032801dbd9b611413d90b189bad3fc49717c8ba6b57de062c6390997d96bf28c084c62ef9f0e311c630d59ec8596044ce55e861736ee91c6216b366c0299b86693891fb4981b15278af34e92e27340f58b35674a6679d467c607658f344fcaa56ea7d367033ac1a6e2326fd8005afed9276ccb74b2ccd0152323fece43ee534c94fb35cec2d137b010b75bbb92ab46e136051bace323735ad9d5acb542e76be3492bde4240fcd808c5a4e92d1afcb64b1231cef2d8c7e39d005cecf2955f83c1c7a988ba3b6b73d4121ebe59173bf8121c708af2aa0d814ab16d163f2077ea37f4aefdc8ad7cc50c80c1edb4d71e1711ba757db18656f5056f3d87b88e50b363c87c1516538b8d797f6c60cf1dea62c65cb994476115059d31f255ecfd20b577fa832402bbaba08ab8922708f136aa20444144deeed78ac35a96785bcb028fc5a954d9904626289e1383e021d46d2f56a99b7a5a0c30b55b988506fef9c12286a89d719054a71e3707c121d01c059a952e18c3e61e5a7e255e1e4b8c777cb498fe0517fce1b686339ddc809608a77e8c0be6ada924c69ad430239f4c5919ced0f3ba2ae2b8adf02bfbf1379a6643f1cefa857ff72ebe292bead23a99897d7badfed1e55ff20821d186e861ed89ebc7c0f7a55c2d3e89f4d17e8ac06fb32006c64326efee38ae646b09c704d2764c94d045a977d8cd6c67565eb0d52cef97ff3d473d8a9e0310f3c0325a9cb9064347d310e111e98e0bc0695f019264bb28b84b4756699a177e58a186b18f19fc3d3bffbd2987ce6a4b6a635849ee126a852b233869f5078cbfb3692093c8eff519f535838d2319b94e8f9e7473343a4a121a227eab7754001d71f2fc5a0eb1d2f61a93f33444370e3509d47001590b3c0e91a2e190f852f44f76d132b7fad1128bc9a9e7842c5edb738ca79ed448832fb10e02152b9b45b449fe15c77ec681bfaa0f4a166b04816c8d15b63351807bea20f96066cdfc8331e0650b6e5aba3ae47846a30aca56981cc21d44f585b6b5dbdd386ccc3d641f0e663a0588ca46531afa113ccb6ed3c311bc093e30a67c57c9e23fedfc13ebc8c595653d0b37dde029a5e3117f06205355f6adf42d1f5d22089a151f8ca99b4d54f1dfe2780d5aa990b34ad4cbd249139798c91a1e9ce0bf91e665309ebaf2254b3f47eb3545fec5208196d5a8b62b8b6e71c522a6a85c4730a87dcda19893869536b80efae5324214bce866ec12e2d86915bab3f542370bd2886e052717370fd2becfc276a70a5a31e63ee5e4266fe72a7f12c177ab03b5e39251630eb11462750411a02b7f062ce04f17b7ad8f75a77679a586aade7db052e220b7e787fb59287ac41d8755319c8174b617792ab41adda005b319b9e721b7a90144a822b7385e92f5bb21761bbf5d4a59345379e698e5993a6a2918169f6cd9db04f6e6518c6111d7f53f7840d29bbba13a737c1b0a86fec1500f45c1676da543d1f35456225b77c834ec9f0cd70dd06b0cb4d8d6d9d749c35e6d487d1dd9a7899dfbabc071c1fc03d2d1136f66fc26b6bada1683bf81a285a6ac0a72ee5d1fceee1323443eac5241f78d3351629a888b9eaeb372118265a017009d49fd7adcf82fbd55ad0a56c1c73165845c33491e781b3eaee5a14b4d12280c64b974ef5d19675fd93deca6ede83365308b08cfd8d7d4e021daddb104a296136fa9403efa71966314d385b4f86c91e0a98040a66d8623fc3bbf099e325f442ee0507dab2317a7a8618da85a4471486b048af9bd7152f8c8d47192bbeb3a848f79f93b706b4c6e5feebf9ae2d3bf01d8ff99d6497c23e1700b77be1976c81b56bff42b03852c07f86fff4ceaebfa2fbab970b5efb4485e9c49fc72f478ccbdba9344d8a4363d274a28f7e530015f5c28b39b8807eae4550ccf6ee23dcb3a44794d6b29493c04b2cec5df5954e6df80de89ea9c9430313de44376aa254a566f06da556a0caf9808484a00d713624828246b46eab0b5a1c402066944a31fdbd5ce5633fe19be5f16d620c430d09338576e0b29da067632b21d7b649c6e6c008eebb177cbb14d96796d83b870047903ad7b45b1ce0d17615da955fd4cab7fac61d427b562c91472ad4b333b91c85df4c5eb394a8253ea18fbce1858b8277d15e8f37eca6e9c0ed451b9ed46f696dd8b66039596e97a8812f9fdd5963614886a59e046affcb87a341b696b549038dd945f60885c85afb9ac9532ac7adcecf09f13d991eb385ef0f8f07153825b15fa23ee33c65292130d7a80a120b1dd7e7a7b88643f530861e2ffeb3b5e5bdff405c069ccca2ff6e4ea66882ee9d056481646eec6aff15841d81224924a65d221fd8f32fe03b1533a67bc5ce11f13d820e6b0b560a17910923a53ad7fc2783b30b6e2acf93dcd2014c069292d69d045e36649d451d0f986f9c56445e561aa00fea0538db24d2412543cdc453cef953ae5b490043ab5433c9b05472ea35660540e72b111e6305afe71412fa14c20d486deda76013aa4be29ef7d4168d50c04ff960fb07b298e779a4773d3b48394baf7fb3963aed5bce5d5e3ec1e861ed15b4b3e811a4b036087565a3e9e20472874e2d28821c34fc10607a8b7514506b054d5216e490a28649b98a9b1f9c1c4f2e64e46508eb3683cf1c30d6f7bda7f50cba4b13d8c44780e059c8495c46fe6b30c6556cc211729b0e5238c00f25ee82e26cb424245f1a84755d10c8a26be7e8ecd6a4afebb39d632dc6599679ef675d8f453e97032d9690c3980fb768f507cdea4b5f66afb6bfa6457065c297337ff0cb3353cc2e7185e4c7d8db72af348895c1bdf5b451f6a6807a720b1fc45148f3dc6b89d2ddcc46f71aff3f24cc949251c9b0363da487f781a2e64acc067f5c20061a51a0731e41c548eb4a0123f6ee449a8635b969e9c3ca14a28d7eded41383c04cf70fee6def4977ae2ed5549c7dc1c1e06caeae2fe62b8d3506adcdbd95372ca3d40d75e0d0c8a5369e1b1b32f6d5f787c4237573c88f2d327a77e03a3af0be98d1bd1c68248ff167c5b205969a00586e02d2b876c9b27face06c8a13ddb4b433542fb1b81af763684ed28a6350b630b13bbd1562f93837fb4d2057aa80200e9d3546edceef038d4ef6313f8302737b672de5508a718cc149b63eb51caaec8be98bbc6d4b8362a6b3bf0c2a1a211cf630b5b83a1bdc84f94bf65d95f8592ff2e3ddcda780d6e196ad1886e493633a315e79f5de34d65e892323e45ea391bad47dbca568741ad354a433515f9956fa256451b53eb83c505eb787a045814d08e4a9713bf1450d950b3ae65b4232a30dd66fa740103119437c415e83473ed2e3c601c797bfcc93ecda744a19a7e180a37f9a917b6d888b1baa432d7332a983b724f0e8c02b270bb008d2a9b7b3297485a03e4c68f709c3f3ed4fa6869a6784b0b50b56147768add227e54fca4e8f856402e25cd64be5b52a58def4c4e7dacf560382c7204eb8e842f2c2966cbc74f9ae84f2033d312351bf1fbd25edeee7790f2dc77a05aa980b52e58a931285b487dbb3e1554dcddfe791b5de74cf31199d0388aa55d91855a051e2091499c87ce145059792c88045e404a7f04492764bf1f37f6ff67d2275c499f698da8bd965717c0534e36b5c271b6044b966cb84df89222d79307f27c49c0329392a36d5cd170ec6d95ec23197c587071659abac8b267f796041850c56293342bb652a17da8f9b94fd3e6c1fb74d36d225415099040286bed13b049aaf4ed306f444506a20ed1d3d5aa951a9eef120539650888bc7ac35d2974e3ad5e6533ba11b24fa231828459021b904445e933a082e931d87e4c7b108d7efd1b71cae5a60f6fa10f7ddafc6ddc8a63d94164716756c3a77a7f664b84656af1fa556b34326e56f2b8488e8d17d3099337c734a8bfec6f61d2662683c0f08100706e8d74bfa03b1fe3282cfcdb5c4676b3b118ed84d302a6c43489cefe33add8097704872539e22841579", 0x1000, 0xffff}, {&(0x7f00000007c0)="86", 0x1, 0x4b}, {&(0x7f0000000800)="91f050b7df8ac11303c591e6a6fb7f53e3326b9b0348964f1f96c02f2efd0af2a3a7054308795c35209d3d3f10c557ddf3551fb9e3b5b25666a0c4cea894641950a2a6e1398aa1db0676a1e9effe28eb0f8779bdd600ac8b8e9489d2b728d1c7af969b96b7", 0x65, 0xfffffffffffffff7}, {&(0x7f0000000880)="d583a479d75e6bef29cf7dff9e6c38f5fbee4757b979d0d84a6eaf52473aff0888464c9a535d5a4337589e8e6a2cb9", 0x2f, 0x2}], 0x10, &(0x7f0000000940)={[{@flush_merge='flush_merge'}, {@noacl='noacl'}], [{@obj_role={'obj_role', 0x3d, '()'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x31, 0x64, 0x65, 0x64, 0x85a14aeeec4203f4, 0x2], 0x2d, [0x1f, 0x0, 0x21, 0x37], 0x2d, [0x35, 0x5, 0x3e, 0x67], 0x2d, [0x63, 0x64, 0x32, 0x33], 0x2d, [0x38, 0x52, 0x61, 0x66, 0x65, 0x62, 0x63, 0x9d088f3d97fbd434]}}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@appraise_type='appraise_type=imasig'}, {@smackfstransmute={'smackfstransmute', 0x3d, '%ppp0]}vmnet0&%'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000680)=0x17) r4 = accept(r2, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x20) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={r7, 0x8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r8, &(0x7f0000000140)=0x4) r9 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000002c0)="9d2c1df71ec668a136ca12373d87a9c9de4434c763f8ad8e5b26aa14b427c9d076539bf508b19d17dc0a5dcf5e14bba180cccda3ff565c3b80c1f3118282", 0x3e, 0xfffffffffffffffa) r10 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000440)='hfsplus\x00', 0xfffffffffffffffc) r11 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000001400)="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", 0x1000, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000500)={r9, r10, r11}, &(0x7f0000000540)=""/39, 0x27, &(0x7f0000000640)={&(0x7f0000000580)={'sha1-ssse3\x00'}, &(0x7f0000000600)="bf90855d6661cb334385399707a3bb28a9", 0x11}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) signalfd(r0, &(0x7f0000000a00), 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r12}, 0x20) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)={r12, 0x2}, &(0x7f0000000040)=0x8) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:59:49 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff007}], 0x1, 0x0) [ 2776.778562] f2fs_msg: 6 callbacks suppressed [ 2776.778577] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2776.828236] hfsplus: umask requires a value [ 2776.846388] hfsplus: unable to parse mount options [ 2776.857359] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 2776.878163] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2776.896327] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 2776.914831] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2776.947655] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 2776.976259] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2777.003446] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 04:59:49 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioprio_get$uid(0x3, r2) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:49 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, 0x0, 0x0, 0x0) 04:59:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget(0x3, 0x12) msgrcv(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600d6ce7817e1571db1a714432b2b4686cb6803dbc53c2090b306fbee3eccdda78d58c15226d4d99f7d5e04f6d18f2acdc98dcba061e3c58bab8a1b4a2ff8044c4a13486770d98cd225002fcafe8abad30de8e5dac4c485735d5bc3027f23437801044239bcfdfb48309d598de656"], 0x83, 0x0, 0x800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) accept(r2, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000200)={@initdev, @local, 0x0}, &(0x7f00000002c0)=0xc) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000300)={@empty, r4}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x7c5cf1c8c1f6325c) r6 = syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x8840) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)=0x410050) read$eventfd(r5, &(0x7f0000000180), 0x8) ioctl$VIDIOC_EXPBUF(r5, 0xc0405610, &(0x7f00000000c0)={0x1, 0x0, 0x4, 0x800}) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@nls={'nls', 0x3d, '\nso8859-6'}}]}) 04:59:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x6800}) 04:59:49 executing program 3: removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='com.apple.system.Security\x00') syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) [ 2777.172570] hfsplus: umask requires a value [ 2777.188257] hfsplus: unable to parse mount options 04:59:49 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080), 0x0, 0x0) [ 2777.264235] hfsplus: umask requires a value 04:59:49 executing program 4 (fault-call:1 fault-nth:0): r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2777.286360] hfsplus: unable to parse mount options 04:59:49 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080), 0x0, 0x0) 04:59:49 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000000)=0xffffffff80000001, 0x4) 04:59:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x6c00}) [ 2777.367479] FAULT_INJECTION: forcing a failure. [ 2777.367479] name failslab, interval 1, probability 0, space 0, times 0 [ 2777.434347] CPU: 1 PID: 17643 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2777.441325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2777.450694] Call Trace: [ 2777.453307] dump_stack+0x172/0x1f0 [ 2777.456967] should_fail.cold+0xa/0x1b [ 2777.461843] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2777.467144] ? lock_downgrade+0x810/0x810 [ 2777.471319] __should_failslab+0x121/0x190 [ 2777.475584] should_failslab+0x9/0x14 [ 2777.475600] kmem_cache_alloc_trace+0x2cc/0x760 [ 2777.475615] ? lock_acquire+0x16f/0x3f0 [ 2777.475634] ? vb2_fop_read+0xf0/0x410 [ 2777.475654] __vb2_init_fileio+0x1cb/0xbe0 [ 2777.475673] ? find_held_lock+0x35/0x130 [ 2777.475691] __vb2_perform_fileio+0xc9a/0x1170 [ 2777.475704] ? mutex_trylock+0x1e0/0x1e0 [ 2777.475724] ? vb2_core_poll+0x780/0x780 [ 2777.513236] ? fsnotify_first_mark+0x210/0x210 [ 2777.517947] vb2_read+0x3b/0x50 [ 2777.521255] vb2_fop_read+0x212/0x410 [ 2777.525079] ? vb2_fop_write+0x410/0x410 [ 2777.529154] v4l2_read+0x1cc/0x230 [ 2777.532716] do_iter_read+0x490/0x640 [ 2777.536532] ? dup_iter+0x270/0x270 [ 2777.540183] vfs_readv+0xf0/0x160 [ 2777.543653] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2777.549035] ? kasan_check_read+0x11/0x20 [ 2777.553201] ? __fget+0x367/0x540 [ 2777.556676] ? iterate_fd+0x360/0x360 [ 2777.560504] ? wait_for_completion+0x440/0x440 [ 2777.565112] ? __fget_light+0x1a9/0x230 [ 2777.569132] do_preadv+0x1c4/0x280 [ 2777.572712] ? do_readv+0x370/0x370 [ 2777.576370] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2777.581141] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2777.585911] ? do_syscall_64+0x26/0x620 [ 2777.589894] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2777.595266] ? do_syscall_64+0x26/0x620 [ 2777.599256] __x64_sys_preadv+0x9a/0xf0 [ 2777.603253] do_syscall_64+0xfd/0x620 [ 2777.607087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2777.612291] RIP: 0033:0x4598e9 [ 2777.615500] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:59:50 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="756d61736b3d3030303030303030190000000000"]) [ 2777.634418] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2777.642152] RAX: ffffffffffffffda RBX: 00007f4768729c90 RCX: 00000000004598e9 [ 2777.649453] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 2777.656746] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2777.664037] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2777.671323] R13: 00000000004c6bd1 R14: 00000000004dbe08 R15: 0000000000000004 04:59:50 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080), 0x0, 0x0) [ 2777.820684] hfsplus: unable to parse mount options [ 2777.889827] hfsplus: unable to parse mount options 04:59:50 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:50 executing program 4 (fault-call:1 fault-nth:1): r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:50 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) 04:59:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x7400}) 04:59:50 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r4, 0x0) r5 = accept(r4, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) syz_mount_image$hfsplus(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x1000000, 0x219, 0x0, 0x22c90, &(0x7f0000000140)=ANY=[@ANYBLOB='fsmagic=0x0000000000010001,euid>', @ANYRESDEC=r0, @ANYRES32=r3, @ANYRESDEC=0xee00, @ANYRESOCT=r5]) [ 2778.120627] FAULT_INJECTION: forcing a failure. [ 2778.120627] name failslab, interval 1, probability 0, space 0, times 0 [ 2778.143262] hfsplus: umask requires a value [ 2778.159266] CPU: 1 PID: 17885 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2778.166246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2778.174254] hfsplus: unable to parse mount options [ 2778.175606] Call Trace: [ 2778.175631] dump_stack+0x172/0x1f0 [ 2778.175652] should_fail.cold+0xa/0x1b [ 2778.175670] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2778.195800] ? lock_downgrade+0x810/0x810 [ 2778.199987] __should_failslab+0x121/0x190 [ 2778.204244] should_failslab+0x9/0x14 [ 2778.208054] __kmalloc+0x2e2/0x750 [ 2778.211609] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2778.216983] ? mark_held_locks+0x100/0x100 04:59:50 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='\x11\xcd\xf5\xd4!(\x1ad', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1880001, &(0x7f00000005c0)=ANY=[@ANYBLOB='umask=00000000000020477777777,\x00']) [ 2778.221233] ? __vb2_queue_alloc+0xf2/0xe90 [ 2778.225574] ? vivid_g_fmt_vid_cap+0xfa0/0xfa0 [ 2778.230167] __vb2_queue_alloc+0xf2/0xe90 [ 2778.234337] ? vivid_g_fmt_vid_cap+0xfa0/0xfa0 [ 2778.238937] vb2_core_reqbufs+0x449/0xd70 [ 2778.243459] ? vb2_core_create_bufs+0x830/0x830 [ 2778.248153] ? rcu_read_lock_sched_held+0x110/0x130 [ 2778.253191] __vb2_init_fileio+0x33f/0xbe0 [ 2778.257440] ? find_held_lock+0x35/0x130 [ 2778.261522] __vb2_perform_fileio+0xc9a/0x1170 [ 2778.266122] ? mutex_trylock+0x1e0/0x1e0 [ 2778.270207] ? vb2_core_poll+0x780/0x780 [ 2778.274279] ? fsnotify_first_mark+0x210/0x210 [ 2778.278871] vb2_read+0x3b/0x50 [ 2778.282161] vb2_fop_read+0x212/0x410 [ 2778.285976] ? vb2_fop_write+0x410/0x410 [ 2778.290047] v4l2_read+0x1cc/0x230 [ 2778.293603] do_iter_read+0x490/0x640 [ 2778.297425] ? dup_iter+0x270/0x270 [ 2778.301075] vfs_readv+0xf0/0x160 [ 2778.304538] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2778.309911] ? kasan_check_read+0x11/0x20 [ 2778.314072] ? __fget+0x367/0x540 [ 2778.317539] ? iterate_fd+0x360/0x360 [ 2778.321357] ? wait_for_completion+0x440/0x440 [ 2778.325965] ? __fget_light+0x1a9/0x230 [ 2778.329960] do_preadv+0x1c4/0x280 [ 2778.333517] ? do_readv+0x370/0x370 [ 2778.337163] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2778.341930] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2778.346700] ? do_syscall_64+0x26/0x620 [ 2778.350692] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2778.356073] ? do_syscall_64+0x26/0x620 [ 2778.360070] __x64_sys_preadv+0x9a/0xf0 [ 2778.364067] do_syscall_64+0xfd/0x620 [ 2778.367884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2778.373089] RIP: 0033:0x4598e9 [ 2778.376298] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2778.395215] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2778.402947] RAX: ffffffffffffffda RBX: 00007f4768729c90 RCX: 00000000004598e9 [ 2778.410247] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 2778.417536] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2778.424824] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2778.432291] R13: 00000000004c6bd1 R14: 00000000004dbe08 R15: 0000000000000004 04:59:50 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) 04:59:51 executing program 4 (fault-call:1 fault-nth:2): r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:51 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) 04:59:51 executing program 3: 04:59:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x7a00}) [ 2778.662785] FAULT_INJECTION: forcing a failure. [ 2778.662785] name failslab, interval 1, probability 0, space 0, times 0 [ 2778.692746] CPU: 1 PID: 18105 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2778.699725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2778.709084] Call Trace: [ 2778.709107] dump_stack+0x172/0x1f0 [ 2778.709128] should_fail.cold+0xa/0x1b [ 2778.709156] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2778.709174] ? lock_downgrade+0x810/0x810 [ 2778.709200] __should_failslab+0x121/0x190 [ 2778.709215] should_failslab+0x9/0x14 [ 2778.709228] kmem_cache_alloc_trace+0x2cc/0x760 [ 2778.709242] ? rcu_read_lock_sched_held+0x110/0x130 [ 2778.709257] ? __kmalloc+0x5e1/0x750 [ 2778.724469] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2778.724489] ? vb2_vmalloc_attach_dmabuf+0x160/0x160 [ 2778.760508] vb2_vmalloc_alloc+0x71/0x290 [ 2778.764773] __vb2_queue_alloc+0x485/0xe90 [ 2778.769041] ? vivid_g_fmt_vid_cap+0xfa0/0xfa0 [ 2778.773641] vb2_core_reqbufs+0x449/0xd70 [ 2778.777813] ? vb2_core_create_bufs+0x830/0x830 [ 2778.782498] ? rcu_read_lock_sched_held+0x110/0x130 [ 2778.787552] ? lock_acquire+0x16f/0x3f0 [ 2778.791558] ? vb2_fop_read+0xf0/0x410 [ 2778.795466] __vb2_init_fileio+0x33f/0xbe0 [ 2778.799729] ? find_held_lock+0x35/0x130 [ 2778.803815] __vb2_perform_fileio+0xc9a/0x1170 [ 2778.808414] ? mutex_trylock+0x1e0/0x1e0 [ 2778.812493] ? vb2_core_poll+0x780/0x780 [ 2778.816572] ? fsnotify_first_mark+0x210/0x210 [ 2778.821177] vb2_read+0x3b/0x50 [ 2778.824473] vb2_fop_read+0x212/0x410 [ 2778.828291] ? vb2_fop_write+0x410/0x410 [ 2778.832360] v4l2_read+0x1cc/0x230 [ 2778.835915] do_iter_read+0x490/0x640 [ 2778.839731] ? dup_iter+0x270/0x270 [ 2778.843376] vfs_readv+0xf0/0x160 [ 2778.846934] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2778.852316] ? kasan_check_read+0x11/0x20 [ 2778.856486] ? __fget+0x367/0x540 [ 2778.859961] ? iterate_fd+0x360/0x360 [ 2778.863787] ? wait_for_completion+0x440/0x440 [ 2778.868392] ? __fget_light+0x1a9/0x230 [ 2778.872541] do_preadv+0x1c4/0x280 [ 2778.876102] ? do_readv+0x370/0x370 [ 2778.879748] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2778.884520] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2778.889292] ? do_syscall_64+0x26/0x620 [ 2778.893279] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2778.898661] ? do_syscall_64+0x26/0x620 [ 2778.902658] __x64_sys_preadv+0x9a/0xf0 [ 2778.906653] do_syscall_64+0xfd/0x620 [ 2778.910474] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2778.915679] RIP: 0033:0x4598e9 [ 2778.918878] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2778.937787] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2778.945520] RAX: ffffffffffffffda RBX: 00007f4768729c90 RCX: 00000000004598e9 [ 2778.952807] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 2778.960094] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2778.967376] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2778.974753] R13: 00000000004c6bd1 R14: 00000000004dbe08 R15: 0000000000000004 04:59:51 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 04:59:51 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000040)="426328ff7be802cb4feafef614edc2d8c24937710b22f9cc4ba50166b1c12affe44acb8a9d0343c6360b5b807fc191116dc0ad66fb6815c0373db64a558e46ef7916fbb2008774acfa01a46f974286850957d4afb18770523cabc9bb5c0b", 0x5e}, {&(0x7f00000000c0)="3bfa8b678fd0ac8f72a73e62395f393a2f72e36b912a01da5e8ec88d7f47be2c56a060380413f769b02f1c0226b4e6ba0af2a0e3f21089d0f21ab6775e1d460236b60424b6b7ce945587289f71f0b93e16caba715d6350fcd21a0c0a1bd85f743c5a5517224f14e51aebec9ca247622e9cd23b5c1e7c7766cff761390123c3646ff2b0c4e6179c91e5a81037b1216bb1e4fdcfadc0defce2043d017cfbae6a0131edc7a5ff8390", 0xa7}, {&(0x7f0000000180)="2fc17970713e732484b90c8d0cc795f4764dbbfa22c46bf64b9f93df6c20e62d61748f727b2b45914fc66282abc7409de0160227a23b51a2e897ce3bab16ec814b0295ffa0f2ea19", 0x48}, {&(0x7f0000000200)="f98d9c9b3669bb6a7edfb4f2baa8586c4bcefdee758e51f0d284c9e773be5cb304bc0091267386f4588a6ddba13ffaf92d02db35abcff2d7ba3084ca17f0ed", 0x3f}, {&(0x7f00000002c0)="3a1d03544877046ab204d98384d93c0a10568e879f43a7b98375331d1482d79a8f79c722d365a3812b67350f69a944de05ce5accc39aeff6dd8c397aeda07238b80a17f827576916094d2206b9bbcc96a8be03414995f620c0ad26f2c566b2913c850f205caf0c44270aded3758fcde25f5e1ac0ba3c3c100aca5d495c8b44ed1453964b00f4761cc6ebab7a8eef2a109c83cd409431fb428a5c2582503b3470199cfca150699b3e6fc4dea54a95d43e7b086a171e3cd1917d728e9031cfa375afec700a500ff342031be994f21e0b49779b914a567e434128ec64c6ca52389673ff5527507bf0b6cf957211c19f793bc85b11a5", 0xf4}], 0x5) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000440)="015e39c73446807d187862be51f6de8d9b97cefc0ec187b48b0bf52c78b5d912ea9275e84ef47e019aace42f670d36b8295c339fdeb09d4aa1a194aa1e3d9396e84c0b591b4d7eec717e0098dbe9e8261a1fdb3e2320fcee05f8ca449c88c2757b9f66dcf95776b24ba87c3546e7c3aeae924d694a5bf2c44f31d9dfcab5796b", 0x80}], 0x1) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="001218b8e73d3030b030303030303030303032313537373737373737372c00"]) ppoll(&(0x7f0000000500), 0x0, &(0x7f0000000540)={0x0, 0x1c9c380}, &(0x7f0000000580)={0x9}, 0x8) [ 2779.029379] hfsplus: umask requires a value [ 2779.033740] hfsplus: unable to parse mount options 04:59:51 executing program 4 (fault-call:1 fault-nth:3): r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:51 executing program 1 (fault-call:1 fault-nth:0): r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) [ 2779.168758] FAULT_INJECTION: forcing a failure. [ 2779.168758] name failslab, interval 1, probability 0, space 0, times 0 [ 2779.184962] hfsplus: unable to find HFS+ superblock [ 2779.209354] CPU: 0 PID: 18153 Comm: syz-executor.1 Not tainted 4.19.73 #0 [ 2779.216337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2779.225709] Call Trace: [ 2779.228321] dump_stack+0x172/0x1f0 [ 2779.231974] should_fail.cold+0xa/0x1b [ 2779.235885] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2779.241010] ? lock_downgrade+0x810/0x810 [ 2779.245194] __should_failslab+0x121/0x190 [ 2779.249453] should_failslab+0x9/0x14 [ 2779.253277] kmem_cache_alloc_trace+0x2cc/0x760 [ 2779.257969] ? lock_acquire+0x16f/0x3f0 [ 2779.261961] ? vb2_fop_read+0xf0/0x410 [ 2779.265874] __vb2_init_fileio+0x1cb/0xbe0 [ 2779.270132] ? find_held_lock+0x35/0x130 [ 2779.274208] __vb2_perform_fileio+0xc9a/0x1170 [ 2779.278807] ? mutex_trylock+0x1e0/0x1e0 [ 2779.282886] ? vb2_core_poll+0x780/0x780 [ 2779.286958] ? fsnotify_first_mark+0x210/0x210 [ 2779.291558] vb2_read+0x3b/0x50 [ 2779.294860] vb2_fop_read+0x212/0x410 [ 2779.298680] ? vb2_fop_write+0x410/0x410 [ 2779.302758] v4l2_read+0x1cc/0x230 [ 2779.306313] do_iter_read+0x490/0x640 [ 2779.310123] ? dup_iter+0x270/0x270 [ 2779.313766] vfs_readv+0xf0/0x160 [ 2779.317235] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2779.322640] ? kasan_check_read+0x11/0x20 [ 2779.326889] ? __fget+0x367/0x540 [ 2779.330365] ? iterate_fd+0x360/0x360 [ 2779.334181] ? wait_for_completion+0x440/0x440 [ 2779.338782] ? __fget_light+0x1a9/0x230 [ 2779.342779] do_preadv+0x1c4/0x280 [ 2779.346349] ? do_readv+0x370/0x370 [ 2779.349991] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2779.354767] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2779.359540] ? do_syscall_64+0x26/0x620 [ 2779.363525] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2779.370467] ? do_syscall_64+0x26/0x620 [ 2779.374459] __x64_sys_preadv+0x9a/0xf0 [ 2779.378451] do_syscall_64+0xfd/0x620 [ 2779.382274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2779.387482] RIP: 0033:0x4598e9 [ 2779.390693] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:59:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e23, 0x362, @empty}, 0x1c) listen(r2, 0x0) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) connect$pptp(r3, &(0x7f0000000140)={0x18, 0x2, {0x3, @remote}}, 0x1e) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r5, &(0x7f0000000180), 0x8) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r4, 0x40086409, &(0x7f0000000240)={r6}) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(\xeeM\xcd\xe6j\xd5\'\xca\xee\x8c\x94\xb3\x93G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;0\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\xff\x9f\xe0\xa8y3\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) 04:59:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xedc0}) [ 2779.409631] RSP: 002b:00007f13feac6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2779.417360] RAX: ffffffffffffffda RBX: 00007f13feac6c90 RCX: 00000000004598e9 [ 2779.424648] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 2779.431936] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2779.439222] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f13feac76d4 [ 2779.446508] R13: 00000000004c6bd1 R14: 00000000004dbe08 R15: 0000000000000004 [ 2779.493467] FAULT_INJECTION: forcing a failure. [ 2779.493467] name failslab, interval 1, probability 0, space 0, times 0 [ 2779.505994] CPU: 0 PID: 18321 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2779.512951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2779.522316] Call Trace: [ 2779.524927] dump_stack+0x172/0x1f0 [ 2779.528579] should_fail.cold+0xa/0x1b [ 2779.532491] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2779.537609] ? lock_downgrade+0x810/0x810 [ 2779.541893] __should_failslab+0x121/0x190 [ 2779.546181] should_failslab+0x9/0x14 [ 2779.550000] kmem_cache_alloc_node_trace+0x274/0x720 [ 2779.556193] ? __lock_is_held+0xb6/0x140 [ 2779.556216] __get_vm_area_node+0x12b/0x3a0 [ 2779.556237] __vmalloc_node_range+0xc7/0x790 [ 2779.556251] ? vb2_vmalloc_alloc+0xdb/0x290 [ 2779.556267] ? rcu_read_lock_sched_held+0x110/0x130 [ 2779.578518] ? vb2_vmalloc_alloc+0xdb/0x290 [ 2779.582877] ? vb2_vmalloc_attach_dmabuf+0x160/0x160 [ 2779.587996] vmalloc_user+0x71/0x160 [ 2779.591726] ? vb2_vmalloc_alloc+0xdb/0x290 [ 2779.596058] vb2_vmalloc_alloc+0xdb/0x290 [ 2779.600229] __vb2_queue_alloc+0x485/0xe90 [ 2779.604772] ? vivid_g_fmt_vid_cap+0xfa0/0xfa0 [ 2779.609385] vb2_core_reqbufs+0x449/0xd70 [ 2779.613558] ? vb2_core_create_bufs+0x830/0x830 [ 2779.618255] ? rcu_read_lock_sched_held+0x110/0x130 [ 2779.623288] ? lock_acquire+0x16f/0x3f0 [ 2779.627274] ? vb2_fop_read+0xf0/0x410 [ 2779.631961] __vb2_init_fileio+0x33f/0xbe0 [ 2779.636207] ? find_held_lock+0x35/0x130 [ 2779.640288] __vb2_perform_fileio+0xc9a/0x1170 [ 2779.644880] ? mutex_trylock+0x1e0/0x1e0 [ 2779.649046] ? vb2_core_poll+0x780/0x780 [ 2779.653123] ? fsnotify_first_mark+0x210/0x210 [ 2779.657714] vb2_read+0x3b/0x50 [ 2779.661010] vb2_fop_read+0x212/0x410 [ 2779.664823] ? vb2_fop_write+0x410/0x410 [ 2779.668892] v4l2_read+0x1cc/0x230 [ 2779.672444] do_iter_read+0x490/0x640 [ 2779.676266] ? dup_iter+0x270/0x270 [ 2779.679910] vfs_readv+0xf0/0x160 [ 2779.683378] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2779.688750] ? kasan_check_read+0x11/0x20 [ 2779.692909] ? __fget+0x367/0x540 [ 2779.696372] ? iterate_fd+0x360/0x360 [ 2779.700188] ? wait_for_completion+0x440/0x440 [ 2779.704786] ? __fget_light+0x1a9/0x230 [ 2779.708775] do_preadv+0x1c4/0x280 [ 2779.712326] ? do_readv+0x370/0x370 [ 2779.715961] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2779.720725] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2779.725490] ? do_syscall_64+0x26/0x620 [ 2779.729473] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2779.734936] ? do_syscall_64+0x26/0x620 [ 2779.738924] __x64_sys_preadv+0x9a/0xf0 [ 2779.742912] do_syscall_64+0xfd/0x620 [ 2779.746723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2779.751919] RIP: 0033:0x4598e9 [ 2779.755168] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2779.774074] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2779.781800] RAX: ffffffffffffffda RBX: 00007f4768729c90 RCX: 00000000004598e9 04:59:51 executing program 1 (fault-call:1 fault-nth:1): r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) ioctl$SIOCAX25CTLCON(r1, 0x89e8, &(0x7f0000000000)={@default, @null, @null, 0x0, 0x3, 0x1, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @bcast]}) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) 04:59:52 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/secure_tcp\x00\xd7\x12.\x9e2\x9b\xfe$\xa2z?\xcf\x03:u E\x9e\xcc\x91\x01\xd6\x06\xa9\x86\v\v\xb4\xea\x06\x01\x18\xc2\v8,\xde8\xc7\xebO\xd0\xe32\xe6\f\xb7\x80\xa4X\xccY\xe3\x81x.)/\xfc{\xc8Z2\x13\xc1z\xd7&EL\x96\xe3\xcd\x9cYR\xe6B\xc1\x91\xf7\x16\tk\xb1\xc1\x7f\xcdd\xdf\xda\xb1\x88\x12\xfa%\x18\"\xf2@\xf0\xba\x1d\xbbSq\xf5\x88\x99\x00\x00\x00\x00\x00\x00\x1f\xcd5[x\xf1\xc0\xb8\t\x06\x7f\x92$\x01\xf9\xd8\xdd\xc23\r\xe1\x13\xa3O\xb3\xd2\b\xb3]\xe93\xbfU\xfc\xb5\xa8#\x12\x99\x01\x87\xa2\x0eNDLhn(.=\xa6\b)\xc4|\x05\x8d\x16j\xff\xe4\xeb\xb9[\xdfc\b\x9c\xad\x0e\x94%}MB\xfdlC\xe7/\xa3c\xca\x9b\xe9\xd3\xb1\xab\xb3\xa0Y!\xcf\xf4\x03\xf7\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xf9\xf1(30f\xddQ\xc5I\xe6L\xc0\x9aw\xb7\x1aw)\xeadH\xfe\x1f\b\xc0\x82\xda\'\x1d\xb3\xa6\xde:\x87w\b\xc6\x80\x02*\x9c7St\xd1?H\xb9b\xe0F\x18\x0e\xf0\va\x87\x8f\x9bYC\xcb6\x82\xe3\xa3%\xb7\xeet\xe6\ni\xc2`\x11\xb4\xea\xf6\xdf\xda\xc1z\xf3\x00'/364, 0x2, 0x0) read$eventfd(r0, &(0x7f0000000180), 0x8) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000080)=0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x800, 0x10000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2779.789073] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 2779.796349] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2779.803622] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2779.810893] R13: 00000000004c6bd1 R14: 00000000004dbe08 R15: 0000000000000004 [ 2779.866147] syz-executor.4: vmalloc: allocation failure: 462848 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 2779.887197] hfsplus: umask requires a value [ 2779.892081] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 2779.905513] CPU: 1 PID: 18321 Comm: syz-executor.4 Not tainted 4.19.73 #0 [ 2779.912514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2779.921875] Call Trace: [ 2779.924469] dump_stack+0x172/0x1f0 [ 2779.928103] warn_alloc.cold+0x7b/0x173 [ 2779.929157] hfsplus: unable to parse mount options [ 2779.932083] ? zone_watermark_ok_safe+0x260/0x260 [ 2779.932096] ? __get_vm_area_node+0x12b/0x3a0 [ 2779.932113] ? rcu_read_lock_sched_held+0x110/0x130 [ 2779.951375] ? __lock_is_held+0xb6/0x140 [ 2779.955455] ? __get_vm_area_node+0x2df/0x3a0 [ 2779.959971] __vmalloc_node_range+0x486/0x790 [ 2779.964564] ? rcu_read_lock_sched_held+0x110/0x130 [ 2779.969605] ? vb2_vmalloc_alloc+0xdb/0x290 [ 2779.973935] ? vb2_vmalloc_attach_dmabuf+0x160/0x160 [ 2779.979049] vmalloc_user+0x71/0x160 [ 2779.982775] ? vb2_vmalloc_alloc+0xdb/0x290 [ 2779.987113] vb2_vmalloc_alloc+0xdb/0x290 [ 2779.991281] __vb2_queue_alloc+0x485/0xe90 [ 2779.995537] ? vivid_g_fmt_vid_cap+0xfa0/0xfa0 [ 2780.000130] vb2_core_reqbufs+0x449/0xd70 [ 2780.004300] ? vb2_core_create_bufs+0x830/0x830 [ 2780.009011] ? rcu_read_lock_sched_held+0x110/0x130 [ 2780.014057] ? lock_acquire+0x16f/0x3f0 [ 2780.018046] ? vb2_fop_read+0xf0/0x410 [ 2780.021961] __vb2_init_fileio+0x33f/0xbe0 [ 2780.026219] ? find_held_lock+0x35/0x130 [ 2780.030412] __vb2_perform_fileio+0xc9a/0x1170 [ 2780.035013] ? mutex_trylock+0x1e0/0x1e0 [ 2780.039096] ? vb2_core_poll+0x780/0x780 [ 2780.043170] ? fsnotify_first_mark+0x210/0x210 [ 2780.047770] vb2_read+0x3b/0x50 [ 2780.051061] vb2_fop_read+0x212/0x410 [ 2780.054879] ? vb2_fop_write+0x410/0x410 [ 2780.058948] v4l2_read+0x1cc/0x230 [ 2780.062506] do_iter_read+0x490/0x640 [ 2780.066315] ? dup_iter+0x270/0x270 [ 2780.069962] vfs_readv+0xf0/0x160 [ 2780.073431] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2780.078808] ? kasan_check_read+0x11/0x20 [ 2780.082972] ? __fget+0x367/0x540 [ 2780.086442] ? iterate_fd+0x360/0x360 [ 2780.090256] ? wait_for_completion+0x440/0x440 [ 2780.094853] ? __fget_light+0x1a9/0x230 [ 2780.098841] do_preadv+0x1c4/0x280 [ 2780.102392] ? do_readv+0x370/0x370 [ 2780.106028] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2780.110880] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2780.115644] ? do_syscall_64+0x26/0x620 [ 2780.119628] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2780.125003] ? do_syscall_64+0x26/0x620 [ 2780.128990] __x64_sys_preadv+0x9a/0xf0 [ 2780.132977] do_syscall_64+0xfd/0x620 [ 2780.136792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2780.141990] RIP: 0033:0x4598e9 [ 2780.145980] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:59:52 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2780.164896] RSP: 002b:00007f4768729c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2780.172625] RAX: ffffffffffffffda RBX: 00007f4768729c90 RCX: 00000000004598e9 [ 2780.179898] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 2780.187172] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2780.194445] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f476872a6d4 [ 2780.201720] R13: 00000000004c6bd1 R14: 00000000004dbe08 R15: 0000000000000004 [ 2780.215393] Mem-Info: 04:59:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x5, 0x20, 0x7, 0x0, 0x8, 0xa0d, 0x1}, 0x1c) r3 = userfaultfd(0x800) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000040)=0x3) [ 2780.222728] active_anon:139653 inactive_anon:192 isolated_anon:0 [ 2780.222728] active_file:5222 inactive_file:13117 isolated_file:0 [ 2780.222728] unevictable:0 dirty:157 writeback:0 unstable:0 [ 2780.222728] slab_reclaimable:21535 slab_unreclaimable:429751 [ 2780.222728] mapped:59554 shmem:245 pagetables:4533 bounce:0 [ 2780.222728] free:911183 free_pcp:1051 free_cma:0 [ 2780.265019] Node 0 active_anon:477492kB inactive_anon:768kB active_file:20508kB inactive_file:30228kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238216kB dirty:612kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 83968kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2780.364679] Node 1 active_anon:81120kB inactive_anon:0kB active_file:380kB inactive_file:22240kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:16kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2780.403911] Node 0 DMA free:10488kB min:220kB low:272kB high:324kB active_anon:2396kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2780.407997] hfsplus: umask requires a value [ 2780.438797] lowmem_reserve[]: 0 2555 2557 2557 [ 2780.444582] Node 0 DMA32 free:44360kB min:36248kB low:45308kB high:54368kB active_anon:475096kB inactive_anon:768kB active_file:20508kB inactive_file:30216kB unevictable:0kB writepending:612kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:9312kB pagetables:12900kB bounce:0kB free_pcp:2180kB local_pcp:1340kB free_cma:0kB [ 2780.476115] hfsplus: unable to parse mount options [ 2780.490584] lowmem_reserve[]: 0 0 2 2 [ 2780.497429] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2780.540693] lowmem_reserve[]: 0 0 0 0 04:59:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0xf803}) [ 2780.561931] Node 1 Normal free:3590792kB min:53608kB low:67008kB high:80408kB active_anon:81120kB inactive_anon:0kB active_file:380kB inactive_file:22240kB unevictable:0kB writepending:16kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:2720kB pagetables:5376kB bounce:0kB free_pcp:1568kB local_pcp:984kB free_cma:0kB [ 2780.599224] lowmem_reserve[]: 0 0 0 0 04:59:53 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="d77d2d4bf34254901df41c32c54e73e3ea8a49b97ee7cf19a96c56abe5eca3d839ab2e6d029ae7bfca26467ade28cdbb87847f00000001000000310188d664046b44b9e4a794358b8abbd42b361f438e3bbee4ea19c4968e42191880ca0800f6f1c4f61ad43ded8b3ee4d939a3813ad93defbb582c91e2c446d38c31bb7c16250c95f3443d07007a19b132dc20c38b1b4445b8a708cb0e7d3bcd384f9c0551000000b3cd00a04703d25600"], 0x1}}, 0x8000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)={0x50, r4, 0x31, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x8, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x50}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, r4, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5e}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7ff}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x37015bbac2484ca8}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x17}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x1004}, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x4) r5 = openat$selinux_create(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/create\x00', 0x2, 0x0) lseek(r5, 0x0, 0x0) [ 2780.606755] Node 0 DMA: 12*4kB (UE) 85*8kB (UME) 58*16kB (UME) 26*32kB (U) 3*64kB (U) 3*128kB (UME) 3*256kB (ME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UM) 0*4096kB = 10488kB [ 2780.624065] Node 0 DMA32: 524*4kB (UEH) 210*8kB (UEH) 98*16kB (UEH) 925*32kB (UMEH) 146*64kB (UMH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 44288kB [ 2780.647778] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB [ 2780.661366] 0*2048kB 0*4096kB = 12kB [ 2780.679546] Node 1 Normal: 2*4kB (ME) 2650*8kB (UE) 2143*16kB (UE) 951*32kB (UE) 412*64kB (UE) 125*128kB (UME) 16*256kB (UE) 7*512kB (UM) 6*1024kB (UM) 2*2048kB (UE) 841*4096kB (UM) = 3590952kB [ 2780.732864] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2780.747478] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2780.769965] hfsplus: umask requires a value 04:59:53 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2780.777817] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2780.790822] hfsplus: unable to parse mount options [ 2780.802311] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2780.812019] 18582 total pagecache pages [ 2780.816862] 0 pages in swap cache [ 2780.821256] Swap cache stats: add 0, delete 0, find 0/0 [ 2780.828194] Free swap = 0kB [ 2780.831903] Total swap = 0kB [ 2780.835494] 1965979 pages RAM [ 2780.840247] 0 pages HighMem/MovableOnly [ 2780.867946] 338856 pages reserved [ 2780.881151] 0 pages cma reserved [ 2780.890054] FAULT_INJECTION: forcing a failure. [ 2780.890054] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2780.902017] CPU: 0 PID: 18435 Comm: syz-executor.1 Not tainted 4.19.73 #0 [ 2780.908953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2780.918307] Call Trace: [ 2780.920905] dump_stack+0x172/0x1f0 [ 2780.924545] should_fail.cold+0xa/0x1b [ 2780.928440] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2780.933566] __alloc_pages_nodemask+0x1ee/0x750 [ 2780.938242] ? find_held_lock+0x35/0x130 [ 2780.942317] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2780.947339] ? lock_downgrade+0x810/0x810 [ 2780.951496] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2780.957082] alloc_pages_current+0x107/0x210 [ 2780.961503] __get_free_pages+0xc/0x40 [ 2780.965401] __tlb_remove_page_size+0x2e2/0x500 [ 2780.970077] unmap_page_range+0xeee/0x1e70 [ 2780.974341] ? vm_normal_page_pmd+0x400/0x400 [ 2780.978837] ? kasan_check_read+0x11/0x20 [ 2780.982990] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2780.988555] ? uprobe_munmap+0xad/0x2b0 [ 2780.992551] unmap_single_vma+0x19d/0x300 [ 2780.996709] unmap_vmas+0xae/0x180 [ 2781.000258] exit_mmap+0x2c2/0x530 [ 2781.003807] ? __ia32_sys_munmap+0x80/0x80 [ 2781.008063] ? __khugepaged_exit+0x2da/0x400 [ 2781.012472] ? rcu_read_lock_sched_held+0x110/0x130 [ 2781.017497] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2781.023038] ? __khugepaged_exit+0xcf/0x400 [ 2781.027365] mmput+0x15f/0x4c0 [ 2781.030570] do_exit+0x899/0x2fa0 [ 2781.034029] ? find_held_lock+0x35/0x130 [ 2781.038095] ? task_work_run+0x118/0x1c0 [ 2781.042159] ? get_signal+0x384/0x1fc0 [ 2781.046053] ? mm_update_next_owner+0x660/0x660 [ 2781.050735] ? _raw_spin_unlock_irq+0x28/0x90 [ 2781.055360] ? get_signal+0x384/0x1fc0 [ 2781.059248] ? _raw_spin_unlock_irq+0x28/0x90 [ 2781.064624] do_group_exit+0x135/0x370 [ 2781.068526] get_signal+0x3ec/0x1fc0 [ 2781.072250] ? kfree+0x1f7/0x220 [ 2781.075632] do_signal+0x95/0x1960 [ 2781.079179] ? __fget+0x367/0x540 [ 2781.082637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2781.088175] ? setup_sigcontext+0x7d0/0x7d0 [ 2781.092503] ? kick_process+0xef/0x180 [ 2781.096401] ? task_work_add+0x9c/0x110 [ 2781.100385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2781.105926] ? fput+0x128/0x1a0 [ 2781.109210] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2781.114752] ? do_preadv+0x167/0x280 [ 2781.118578] ? exit_to_usermode_loop+0x43/0x2c0 [ 2781.123252] ? do_syscall_64+0x53d/0x620 [ 2781.127328] ? exit_to_usermode_loop+0x43/0x2c0 [ 2781.132003] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2781.136591] ? trace_hardirqs_on+0x67/0x220 [ 2781.140940] exit_to_usermode_loop+0x244/0x2c0 [ 2781.145535] do_syscall_64+0x53d/0x620 [ 2781.149432] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2781.154621] RIP: 0033:0x4598e9 [ 2781.157826] Code: Bad RIP value. [ 2781.161189] RSP: 002b:00007f13feac6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2781.168898] RAX: fffffffffffffe00 RBX: 00007f13feac6c90 RCX: 00000000004598e9 [ 2781.176165] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 2781.183437] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2781.190703] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f13feac76d4 [ 2781.197971] R13: 00000000004c6bd1 R14: 00000000004dbe08 R15: 0000000000000004 04:59:53 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:53 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) socket$inet_smc(0x2b, 0x1, 0x0) 04:59:53 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x7ffff000}], 0x1, 0x0) 04:59:53 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) [ 2781.317478] hfsplus: umask requires a value [ 2781.341306] hfsplus: unable to parse mount options [ 2781.366553] ------------[ cut here ]------------ [ 2781.377968] WARNING: CPU: 1 PID: 19045 at drivers/media/common/videobuf2/videobuf2-core.c:1690 __vb2_queue_cancel.cold+0x11/0x213 [ 2781.389803] Kernel panic - not syncing: panic_on_warn set ... [ 2781.389803] [ 2781.397181] CPU: 1 PID: 19045 Comm: syz-executor.1 Not tainted 4.19.73 #0 [ 2781.404109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2781.413467] Call Trace: [ 2781.416115] dump_stack+0x172/0x1f0 [ 2781.419772] panic+0x263/0x507 [ 2781.422978] ? __warn_printk+0xf3/0xf3 [ 2781.426879] ? __vb2_queue_cancel.cold+0x11/0x213 [ 2781.431731] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2781.437288] ? __warn.cold+0x5/0x4a [ 2781.440932] ? __warn+0xe8/0x1d0 [ 2781.444311] ? __vb2_queue_cancel.cold+0x11/0x213 [ 2781.449161] __warn.cold+0x20/0x4a [ 2781.452712] ? __vb2_queue_cancel.cold+0x11/0x213 [ 2781.457571] report_bug+0x263/0x2b0 [ 2781.461217] do_error_trap+0x204/0x360 [ 2781.465110] ? math_error+0x340/0x340 [ 2781.468918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2781.474549] ? wake_up_klogd+0x99/0xd0 [ 2781.478447] ? vprintk_emit+0x264/0x690 [ 2781.482431] ? vprintk_emit+0x1ab/0x690 [ 2781.486416] ? error_entry+0x7c/0xe0 [ 2781.493451] ? trace_hardirqs_off_caller+0x65/0x220 [ 2781.498481] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2781.503336] do_invalid_op+0x1b/0x20 [ 2781.507053] invalid_op+0x14/0x20 [ 2781.510510] RIP: 0010:__vb2_queue_cancel.cold+0x11/0x213 [ 2781.515965] Code: 48 c7 c7 00 86 c0 87 e8 7b 9b af fc 0f 0b 41 bc ea ff ff ff e9 f6 49 ff ff e8 a5 34 c5 fc 48 c7 c7 00 86 c0 87 e8 5d 9b af fc <0f> 0b 49 8d 85 28 02 00 00 48 89 45 a0 48 c1 e8 03 48 89 c2 b8 ff [ 2781.534871] RSP: 0018:ffff88820cd3fc40 EFLAGS: 00010282 [ 2781.540244] RAX: 0000000000000024 RBX: 0000000000000001 RCX: 0000000000000000 [ 2781.547518] RDX: 0000000000000000 RSI: ffffffff8155dbd6 RDI: ffffed10419a7f7a [ 2781.554791] RBP: ffff88820cd3fcb0 R08: 0000000000000024 R09: ffffed1015d25079 [ 2781.562063] R10: ffffed1015d25078 R11: ffff8880ae9283c7 R12: ffff8882187b5dfc [ 2781.569336] R13: ffff8882187b5bb8 R14: ffff8882187b5e98 R15: ffff8882187b5e90 [ 2781.576635] ? vprintk_func+0x86/0x189 [ 2781.580534] ? lock_downgrade+0x810/0x810 [ 2781.584758] ? v4l2_fh_is_singular+0xff/0x160 [ 2781.589265] vb2_core_streamoff+0x60/0x150 [ 2781.593509] __vb2_cleanup_fileio+0x78/0x170 [ 2781.597934] vb2_core_queue_release+0x20/0x80 [ 2781.602471] _vb2_fop_release+0x1cf/0x2a0 [ 2781.606742] vb2_fop_release+0x75/0xc0 [ 2781.610643] vivid_fop_release+0x18e/0x430 [ 2781.614889] ? vivid_remove+0x460/0x460 [ 2781.618866] ? dev_debug_store+0x110/0x110 [ 2781.623121] v4l2_release+0xf9/0x1a0 [ 2781.626848] __fput+0x2dd/0x8b0 [ 2781.630140] ____fput+0x16/0x20 [ 2781.633427] task_work_run+0x145/0x1c0 [ 2781.637327] exit_to_usermode_loop+0x273/0x2c0 [ 2781.641920] do_syscall_64+0x53d/0x620 [ 2781.645826] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2781.651017] RIP: 0033:0x4135d1 04:59:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8cffffff}}], [], 0x40000}) [ 2781.654210] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2781.673119] RSP: 002b:00007ffda0080f60 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 2781.680839] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004135d1 [ 2781.688109] RDX: 0000001b2e620000 RSI: 0000000000000000 RDI: 0000000000000003 [ 2781.695388] RBP: 0000000000000001 R08: 0000001b2f620000 R09: 00007f1400ac8328 [ 2781.702663] R10: 0000000000000005 R11: 0000000000000293 R12: 000000000075bf20 [ 2781.709933] R13: 00000000002a7084 R14: 0000000000760178 R15: 000000000075bf2c [ 2781.719019] Kernel Offset: disabled [ 2781.722650] Rebooting in 86400 seconds..