le+0x11a/0x580 [ 292.271055] ? proc_nr_files+0x60/0x60 [ 292.274969] ? kasan_check_read+0x11/0x20 [ 292.279132] ? do_raw_spin_unlock+0xa7/0x2f0 [ 292.283582] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 292.288200] ? kasan_check_write+0x14/0x20 [ 292.292455] ? do_raw_spin_lock+0xc1/0x200 [ 292.296683] alloc_file+0x5c/0x430 [ 292.300228] alloc_file_pseudo+0x261/0x3f0 [ 292.304454] ? alloc_file+0x430/0x430 [ 292.308247] ? check_same_owner+0x340/0x340 [ 292.312575] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 292.317607] ? __check_object_size+0xa3/0x5d7 [ 292.322112] ? kasan_check_write+0x14/0x20 [ 292.326345] __shmem_file_setup.part.45+0x110/0x2a0 [ 292.331379] shmem_file_setup+0x65/0x90 [ 292.335423] __x64_sys_memfd_create+0x2af/0x4f0 [ 292.340088] ? memfd_fcntl+0x1580/0x1580 [ 292.344156] ? ksys_ioctl+0x81/0xd0 [ 292.347830] ? do_syscall_64+0x9a/0x820 [ 292.351819] do_syscall_64+0x1b9/0x820 [ 292.355716] ? finish_task_switch+0x1d3/0x870 [ 292.360220] ? syscall_return_slowpath+0x5e0/0x5e0 [ 292.365162] ? syscall_return_slowpath+0x31d/0x5e0 [ 292.370102] ? __switch_to_asm+0x34/0x70 [ 292.374171] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 292.379539] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.384371] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.389576] RIP: 0033:0x457089 [ 292.392772] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.411690] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 292.419409] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000457089 [ 292.426674] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c22d5 [ 292.433949] RBP: 00000000009300a0 R08: 0000000000000000 R09: 00000000fbad8001 [ 292.441227] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000004 [ 292.448488] R13: 00000000004d6608 R14: 00000000004c9c3c R15: 0000000000000004 [ 292.466105] hfs: type requires a 4 character value [ 292.471099] hfs: unable to parse mount options 22:50:24 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xfffffffffffffff9, 0x101000) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x1f, 0x5, "79e0da3a8a7f71da09f1c0058d848527a6fc0900f5f719"}, &(0x7f0000000180), 0x400) r2 = semget$private(0x0, 0x7, 0x0) semtimedop(r2, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x4, &(0x7f0000000440)="0a5cc80700315d857150709884dedbcc22dad869f23874aca743e3663b51bf1eeeeccd71ea7929d6fb97b874a2b3afc2eba4f5f35e0f873126787113332cbbc62032907476f81463d2110299d8791bb2fd70c64e96d11a8d764750b7bd06e2e153476540eeb41762c385e88d29b4315df5e77a4bf7bc31660aa8b043cea784595427d4ac19528955cd72c524631f01809c7feceffec8557d778807302b577a13b2a57a27f04a1ff437e0954ebcdba1967ff203632f07358e6ec39e052231624a0163c11080a413ec97776a26511d752d25dd15ae5519abb36ffad34cf33ad96f1fc39ac860dabe2d2852e55b67b07ad1d9d7b50d0ba8adc166f266916e2ef11bd22501ff706494d4a86f9b4a") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:50:24 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000020000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:24 executing program 3 (fault-call:2 fault-nth:5): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:24 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xf0, 0x0) 22:50:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = dup2(r1, r3) ioctl$KDGKBMETA(r4, 0x4b62, &(0x7f00000000c0)) dup2(r3, r2) [ 292.525394] hfs: type requires a 4 character value [ 292.530433] hfs: unable to parse mount options [ 292.585407] FAULT_INJECTION: forcing a failure. [ 292.585407] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 292.597245] CPU: 0 PID: 16687 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 292.604268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.613660] Call Trace: [ 292.616263] dump_stack+0x1c9/0x2b4 [ 292.619933] ? dump_stack_print_info.cold.2+0x52/0x52 [ 292.625157] should_fail.cold.4+0xa/0x11 [ 292.629231] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 292.634356] ? graph_lock+0x170/0x170 [ 292.638174] ? print_usage_bug+0xc0/0xc0 [ 292.642252] ? trace_hardirqs_on+0x10/0x10 [ 292.646504] ? find_held_lock+0x36/0x1c0 [ 292.650607] ? graph_lock+0x170/0x170 [ 292.654436] ? graph_lock+0x170/0x170 [ 292.658239] ? lock_downgrade+0x8f0/0x8f0 [ 292.662396] ? print_usage_bug+0xc0/0xc0 [ 292.666482] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.672028] ? should_fail+0x246/0xd86 [ 292.675940] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 292.681107] __alloc_pages_nodemask+0x36e/0xdb0 [ 292.685778] ? lock_downgrade+0x8f0/0x8f0 [ 292.689957] ? __alloc_pages_slowpath+0x2d60/0x2d60 [ 292.695002] ? inode_init_owner+0x340/0x340 [ 292.699331] ? find_held_lock+0x36/0x1c0 [ 292.703422] ? check_same_owner+0x340/0x340 [ 292.707757] cache_grow_begin+0x91/0x710 [ 292.711834] kmem_cache_alloc+0x689/0x760 [ 292.715996] getname_flags+0xd0/0x5a0 [ 292.719806] getname+0x19/0x20 [ 292.723007] do_sys_open+0x3a2/0x760 [ 292.726728] ? filp_open+0x80/0x80 [ 292.730282] ? do_sys_ftruncate+0x44e/0x560 [ 292.734644] __x64_sys_open+0x7e/0xc0 [ 292.738465] do_syscall_64+0x1b9/0x820 [ 292.742362] ? finish_task_switch+0x1d3/0x870 [ 292.746873] ? syscall_return_slowpath+0x5e0/0x5e0 [ 292.751834] ? syscall_return_slowpath+0x31d/0x5e0 [ 292.756791] ? __switch_to_asm+0x34/0x70 [ 292.760873] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 292.766265] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.771141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.776351] RIP: 0033:0x410dc1 [ 292.779550] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 292.798490] RSP: 002b:00007f43a945ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 292.806213] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000410dc1 [ 292.813482] RDX: 00007f43a945eafa RSI: 0000000000000002 RDI: 00007f43a945eaf0 [ 292.820753] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 292.828027] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 22:50:24 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) socketpair(0xd, 0x7, 0x4, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r1, &(0x7f0000000200)="b241ad87162538ff269579594e897f2053abf9e2ee602139014cfe833fa69d899174a475daae21528e9541fb0b4e1f351ce3f704ef9af2779fd1713e95953898492bf3cd4436b130acf4860f512cac74c23ca551b72aa4527337dead4a84b8f3201ae0e84b51879d0ddf2725cd6757eb237365dce222fb1a9069abbba7fd1a35", &(0x7f0000000340)=""/181}, 0x18) read(r0, &(0x7f0000000040)=""/28, 0x1c) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x1) r3 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f00000004c0)={0x1, 0x6, 0x401, 0x8756, 0x90b7}) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000440)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:24 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000004003000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 292.835309] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000005 22:50:24 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x54, 0x0) 22:50:24 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000200000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 292.912947] hfs: type requires a 4 character value [ 292.918016] hfs: unable to parse mount options [ 292.919876] hfs: type requires a 4 character value [ 292.927669] hfs: unable to parse mount options 22:50:24 executing program 3 (fault-call:2 fault-nth:6): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:24 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x120, 0x0) [ 292.994998] hfs: type requires a 4 character value [ 293.000081] hfs: unable to parse mount options [ 293.065951] FAULT_INJECTION: forcing a failure. [ 293.065951] name failslab, interval 1, probability 0, space 0, times 0 [ 293.077317] CPU: 0 PID: 16723 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 293.084349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.093741] Call Trace: [ 293.096360] dump_stack+0x1c9/0x2b4 [ 293.100016] ? dump_stack_print_info.cold.2+0x52/0x52 [ 293.105234] should_fail.cold.4+0xa/0x11 [ 293.109315] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 293.114444] ? __lock_acquire+0x7fc/0x5020 [ 293.118714] ? print_usage_bug+0xc0/0xc0 [ 293.122792] ? graph_lock+0x170/0x170 [ 293.126627] ? trace_hardirqs_on+0x10/0x10 [ 293.130891] ? find_held_lock+0x36/0x1c0 [ 293.135017] ? check_same_owner+0x340/0x340 [ 293.139349] ? __lock_acquire+0x7fc/0x5020 [ 293.143621] ? rcu_note_context_switch+0x730/0x730 [ 293.148580] __should_failslab+0x124/0x180 [ 293.153341] should_failslab+0x9/0x14 [ 293.157155] kmem_cache_alloc+0x2af/0x760 [ 293.161325] ? trace_hardirqs_on+0x10/0x10 [ 293.165609] alloc_empty_file+0x11a/0x580 [ 293.169771] ? proc_nr_files+0x60/0x60 [ 293.173692] ? lock_downgrade+0x8f0/0x8f0 [ 293.177861] ? graph_lock+0x170/0x170 [ 293.181684] path_openat+0x15f/0x4c90 [ 293.185496] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 293.190192] ? graph_lock+0x170/0x170 [ 293.194019] ? path_lookupat.isra.45+0xc00/0xc00 [ 293.198790] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 293.203824] ? expand_files.part.8+0x571/0x9c0 [ 293.208424] ? find_held_lock+0x36/0x1c0 [ 293.212509] ? lock_downgrade+0x8f0/0x8f0 [ 293.216668] ? do_sys_open+0x3a2/0x760 [ 293.220600] ? kasan_check_read+0x11/0x20 [ 293.224777] ? do_raw_spin_unlock+0xa7/0x2f0 [ 293.229206] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 293.233801] ? __lock_is_held+0xb5/0x140 [ 293.237896] ? _raw_spin_unlock+0x22/0x30 [ 293.242085] ? __alloc_fd+0x34e/0x710 [ 293.245901] ? usercopy_warn+0x120/0x120 [ 293.250011] do_filp_open+0x255/0x380 [ 293.253839] ? may_open_dev+0x100/0x100 [ 293.257834] ? strncpy_from_user+0x3be/0x510 [ 293.262263] ? mpi_free.cold.1+0x19/0x19 [ 293.266345] ? get_unused_fd_flags+0x122/0x1a0 [ 293.270964] ? getname_flags+0x26e/0x5a0 [ 293.275049] do_sys_open+0x584/0x760 [ 293.278780] ? filp_open+0x80/0x80 [ 293.282337] ? do_sys_ftruncate+0x44e/0x560 [ 293.286672] __x64_sys_open+0x7e/0xc0 [ 293.290486] do_syscall_64+0x1b9/0x820 [ 293.294385] ? finish_task_switch+0x1d3/0x870 [ 293.298895] ? syscall_return_slowpath+0x5e0/0x5e0 [ 293.303856] ? syscall_return_slowpath+0x31d/0x5e0 [ 293.308798] ? __switch_to_asm+0x34/0x70 [ 293.312875] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 293.318263] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.323124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.328323] RIP: 0033:0x410dc1 [ 293.331529] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 293.350444] RSP: 002b:00007f43a945ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 293.358165] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000410dc1 22:50:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="68667303", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:25 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000003400000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 293.365445] RDX: 00007f43a945eafa RSI: 0000000000000002 RDI: 00007f43a945eaf0 [ 293.372727] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 293.380003] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 293.387279] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000006 22:50:25 executing program 3 (fault-call:2 fault-nth:7): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 293.512465] FAULT_INJECTION: forcing a failure. [ 293.512465] name failslab, interval 1, probability 0, space 0, times 0 [ 293.523937] CPU: 0 PID: 16737 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 293.530987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.540336] Call Trace: [ 293.542947] dump_stack+0x1c9/0x2b4 [ 293.546601] ? dump_stack_print_info.cold.2+0x52/0x52 [ 293.551822] should_fail.cold.4+0xa/0x11 [ 293.555908] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 293.561181] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 293.566729] ? refcount_inc_checked+0x29/0x70 [ 293.571250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.576820] ? graph_lock+0x170/0x170 [ 293.580635] ? lo_ioctl+0x8e/0x1d90 [ 293.584281] ? find_held_lock+0x36/0x1c0 [ 293.588364] ? __lock_is_held+0xb5/0x140 [ 293.592458] ? check_same_owner+0x340/0x340 [ 293.596795] ? rcu_note_context_switch+0x730/0x730 [ 293.601759] __should_failslab+0x124/0x180 [ 293.606016] should_failslab+0x9/0x14 [ 293.609830] kmem_cache_alloc_trace+0x2cb/0x780 [ 293.614520] ? init_wait_entry+0x1c0/0x1c0 [ 293.618780] ? loop_get_status64+0x140/0x140 [ 293.623209] __kthread_create_on_node+0x13d/0x530 [ 293.628076] ? __kthread_parkme+0x1b0/0x1b0 [ 293.632422] ? __lockdep_init_map+0x105/0x590 [ 293.636953] ? __lockdep_init_map+0x105/0x590 [ 293.641471] ? loop_get_status64+0x140/0x140 [ 293.645894] kthread_create_on_node+0xb1/0xe0 [ 293.650416] ? __kthread_create_on_node+0x530/0x530 [ 293.655452] ? kasan_check_read+0x11/0x20 [ 293.659629] lo_ioctl+0x7f6/0x1d90 [ 293.663190] ? lo_rw_aio_complete+0x450/0x450 [ 293.667717] blkdev_ioctl+0x9cd/0x2030 [ 293.671619] ? blkpg_ioctl+0xc40/0xc40 [ 293.675549] ? kasan_check_read+0x11/0x20 [ 293.679711] ? rcu_is_watching+0x8c/0x150 [ 293.683876] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 293.688592] ? __fget+0x4d5/0x740 [ 293.692066] ? ksys_dup3+0x690/0x690 [ 293.695805] ? kasan_check_write+0x14/0x20 [ 293.700055] ? do_raw_spin_lock+0xc1/0x200 [ 293.704315] block_ioctl+0xee/0x130 [ 293.707974] ? blkdev_fallocate+0x400/0x400 [ 293.712311] do_vfs_ioctl+0x1de/0x1720 [ 293.716226] ? rcu_is_watching+0x8c/0x150 [ 293.720413] ? ioctl_preallocate+0x300/0x300 [ 293.724835] ? __fget_light+0x2f7/0x440 [ 293.728821] ? fget_raw+0x20/0x20 [ 293.732281] ? putname+0xf2/0x130 [ 293.735747] ? rcu_read_lock_sched_held+0x108/0x120 [ 293.740776] ? kmem_cache_free+0x25c/0x2d0 [ 293.745040] ? putname+0xf7/0x130 [ 293.748506] ? do_sys_open+0x3cb/0x760 [ 293.752410] ? security_file_ioctl+0x94/0xc0 [ 293.756832] ksys_ioctl+0xa9/0xd0 [ 293.760325] __x64_sys_ioctl+0x73/0xb0 [ 293.764244] do_syscall_64+0x1b9/0x820 [ 293.768154] ? finish_task_switch+0x1d3/0x870 [ 293.772667] ? syscall_return_slowpath+0x5e0/0x5e0 [ 293.777608] ? syscall_return_slowpath+0x31d/0x5e0 [ 293.782550] ? __switch_to_asm+0x34/0x70 [ 293.786629] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 293.792007] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.796877] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.802081] RIP: 0033:0x456ef7 [ 293.805294] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.824223] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 293.831958] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000456ef7 [ 293.839234] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 293.846509] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 293.853788] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 22:50:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000140)={'raw\x00'}, &(0x7f0000000040)=0x54) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:25 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000040000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) epoll_create(0x3) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) r4 = dup2(r3, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r5, 0x2e, "2348ca", "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"}}, 0x110) 22:50:25 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xe2, 0x0) 22:50:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r1, r2) [ 293.861073] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000007 22:50:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:25 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) r3 = dup2(r2, r2) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000200), 0x4) 22:50:25 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x182, 0x0) 22:50:25 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000040000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) socket$inet6(0xa, 0x80004, 0x1) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = dup2(r1, r3) ioctl$ASHMEM_PURGE_ALL_CACHES(r4, 0x770a, 0x0) dup2(r3, r2) 22:50:25 executing program 3 (fault-call:2 fault-nth:8): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:25 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000002000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 294.052070] hfs: type requires a 4 character value [ 294.057076] hfs: unable to parse mount options [ 294.092313] FAULT_INJECTION: forcing a failure. [ 294.092313] name failslab, interval 1, probability 0, space 0, times 0 [ 294.103647] CPU: 1 PID: 16768 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 294.110676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.120042] Call Trace: [ 294.122663] dump_stack+0x1c9/0x2b4 [ 294.126313] ? dump_stack_print_info.cold.2+0x52/0x52 [ 294.131533] should_fail.cold.4+0xa/0x11 [ 294.135648] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 294.140775] ? lock_downgrade+0x8f0/0x8f0 [ 294.144961] ? graph_lock+0x170/0x170 [ 294.148781] ? print_usage_bug+0xc0/0xc0 [ 294.152871] ? find_held_lock+0x36/0x1c0 [ 294.156988] ? __lock_is_held+0xb5/0x140 [ 294.161084] ? check_same_owner+0x340/0x340 [ 294.165443] ? rcu_note_context_switch+0x730/0x730 [ 294.170403] __should_failslab+0x124/0x180 [ 294.174673] should_failslab+0x9/0x14 [ 294.178495] kmem_cache_alloc+0x2af/0x760 [ 294.182673] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 294.187752] __kernfs_new_node+0x127/0x8d0 [ 294.192013] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 294.196620] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 294.201398] ? print_usage_bug+0xc0/0xc0 [ 294.205512] ? graph_lock+0x170/0x170 [ 294.209340] ? graph_lock+0x170/0x170 [ 294.213178] ? find_held_lock+0x36/0x1c0 [ 294.217266] kernfs_new_node+0x95/0x120 [ 294.221266] kernfs_create_dir_ns+0x4d/0x160 [ 294.225699] internal_create_group+0x5fe/0xd80 [ 294.230332] ? remove_files.isra.1+0x190/0x190 [ 294.234937] ? up_write+0x7b/0x220 [ 294.238497] ? up_read+0x110/0x110 22:50:26 executing program 2: socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) fremovexattr(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="73656375726974795203000005200073626d006e0810"]) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) [ 294.242056] ? down_read+0x1d0/0x1d0 [ 294.245817] sysfs_create_group+0x1f/0x30 [ 294.249989] lo_ioctl+0x1310/0x1d90 [ 294.253652] ? lo_rw_aio_complete+0x450/0x450 [ 294.258700] blkdev_ioctl+0x9cd/0x2030 [ 294.262615] ? blkpg_ioctl+0xc40/0xc40 [ 294.266547] ? kasan_check_read+0x11/0x20 [ 294.270708] ? rcu_is_watching+0x8c/0x150 [ 294.274879] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 294.279573] ? __fget+0x4d5/0x740 [ 294.283069] ? ksys_dup3+0x690/0x690 [ 294.286791] ? kasan_check_write+0x14/0x20 [ 294.291040] ? do_raw_spin_lock+0xc1/0x200 [ 294.295285] block_ioctl+0xee/0x130 [ 294.298927] ? blkdev_fallocate+0x400/0x400 [ 294.303259] do_vfs_ioctl+0x1de/0x1720 [ 294.307160] ? rcu_is_watching+0x8c/0x150 [ 294.311316] ? ioctl_preallocate+0x300/0x300 [ 294.315752] ? __fget_light+0x2f7/0x440 [ 294.319752] ? fget_raw+0x20/0x20 [ 294.323220] ? putname+0xf2/0x130 [ 294.326728] ? rcu_read_lock_sched_held+0x108/0x120 [ 294.331749] ? kmem_cache_free+0x25c/0x2d0 [ 294.335994] ? putname+0xf7/0x130 [ 294.339458] ? do_sys_open+0x3cb/0x760 [ 294.343381] ? security_file_ioctl+0x94/0xc0 [ 294.347798] ksys_ioctl+0xa9/0xd0 [ 294.351263] __x64_sys_ioctl+0x73/0xb0 [ 294.355157] do_syscall_64+0x1b9/0x820 [ 294.359049] ? finish_task_switch+0x1d3/0x870 [ 294.363560] ? syscall_return_slowpath+0x5e0/0x5e0 [ 294.368495] ? syscall_return_slowpath+0x31d/0x5e0 [ 294.373464] ? __switch_to_asm+0x34/0x70 [ 294.377531] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 294.382903] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.387770] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.393055] RIP: 0033:0x456ef7 [ 294.396256] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.415162] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 294.422878] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000456ef7 [ 294.430159] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 22:50:26 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x140, 0x0) [ 294.437434] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 294.444715] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 294.451984] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000008 [ 294.474710] hfs: type requires a 4 character value [ 294.479802] hfs: unable to parse mount options 22:50:26 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000034000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfsL', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 294.573295] hfs: type requires a 4 character value [ 294.578349] hfs: unable to parse mount options 22:50:26 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000100000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:26 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xe5, 0x0) 22:50:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x6, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7, 0x80080) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x24, 0x4f, &(0x7f00000000c0)="23f871979d29547451ad854117674319a8e907907196530c32f35dbf6c72012f8c86a829", &(0x7f0000000140)=""/79, 0x7}, 0x28) 22:50:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) 22:50:26 executing program 3 (fault-call:2 fault-nth:9): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x82a00, 0x0) r2 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x81, 0x2) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000240)=[@text64={0x40, &(0x7f0000000200)="0f205f66b820000f00d8c4a27d59b1dddf000066b823008ee866b815018ed80f01b52e99928ef23e430d0b000000c4c109f6af07000000c4424d2901260f20c7", 0x40}], 0x1, 0x14, &(0x7f0000000280), 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000280)={0x1, [0x0]}) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f00000000c0)={0x79, 0x0, [0x1221, 0x0, 0x16ebed1f, 0x1fb9]}) dup2(r4, r6) dup2(r6, r5) 22:50:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000011c00000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x28000, 0x0) recvfrom$llc(r2, &(0x7f0000000340)=""/4096, 0x1000, 0x2, 0x0, 0x0) 22:50:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:26 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xf8, 0x0) 22:50:26 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000003400000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x2710, @hyper}, 0x10) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup2(r3, r5) dup2(r5, r4) 22:50:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000000c0)="dd39fd61e73bd61b1cee60e2cbb380c0", 0x10) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) [ 294.905260] hfs: type requires a 4 character value [ 294.910310] hfs: unable to parse mount options 22:50:26 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000400000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:26 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x55, 0x0) [ 294.955361] hfs: type requires a 4 character value [ 294.960405] hfs: unable to parse mount options [ 295.030295] FAULT_INJECTION: forcing a failure. [ 295.030295] name failslab, interval 1, probability 0, space 0, times 0 [ 295.041647] CPU: 0 PID: 16823 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 295.048678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.058057] Call Trace: [ 295.060661] dump_stack+0x1c9/0x2b4 [ 295.064307] ? dump_stack_print_info.cold.2+0x52/0x52 [ 295.069516] ? graph_lock+0x170/0x170 [ 295.073338] should_fail.cold.4+0xa/0x11 [ 295.077420] ? __kernel_text_address+0xd/0x40 [ 295.081988] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 295.087120] ? kernfs_activate+0x8e/0x2c0 [ 295.091295] ? graph_lock+0x170/0x170 [ 295.095123] ? lock_release+0xa30/0xa30 [ 295.099125] ? check_same_owner+0x340/0x340 [ 295.103468] ? find_held_lock+0x36/0x1c0 [ 295.107575] ? __lock_is_held+0xb5/0x140 [ 295.111657] ? check_same_owner+0x340/0x340 [ 295.115989] ? rcu_note_context_switch+0x730/0x730 [ 295.120949] __should_failslab+0x124/0x180 [ 295.125201] should_failslab+0x9/0x14 [ 295.129021] kmem_cache_alloc+0x2af/0x760 [ 295.133190] ? find_held_lock+0x36/0x1c0 [ 295.137263] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 295.142292] __kernfs_new_node+0x127/0x8d0 [ 295.146563] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 295.151770] ? kasan_check_write+0x14/0x20 [ 295.156018] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 295.160978] ? __kernfs_new_node+0x692/0x8d0 [ 295.165439] ? wait_for_completion+0x8d0/0x8d0 [ 295.170026] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 295.174807] ? graph_lock+0x170/0x170 [ 295.178655] ? kasan_check_write+0x14/0x20 [ 295.182899] ? __lock_is_held+0xb5/0x140 [ 295.186990] ? wait_for_completion+0x8d0/0x8d0 [ 295.191591] ? mutex_unlock+0xd/0x10 [ 295.195313] ? kernfs_activate+0x21a/0x2c0 [ 295.199555] kernfs_new_node+0x95/0x120 [ 295.203590] __kernfs_create_file+0x5a/0x340 [ 295.208009] sysfs_add_file_mode_ns+0x221/0x520 [ 295.212686] ? component_del+0x510/0x550 [ 295.216759] internal_create_group+0x3e1/0xd80 [ 295.221377] ? remove_files.isra.1+0x190/0x190 [ 295.225968] ? up_write+0x7b/0x220 [ 295.229513] ? up_read+0x110/0x110 [ 295.233062] ? down_read+0x1d0/0x1d0 [ 295.236798] sysfs_create_group+0x1f/0x30 [ 295.240976] lo_ioctl+0x1310/0x1d90 [ 295.244644] ? lo_rw_aio_complete+0x450/0x450 [ 295.249158] blkdev_ioctl+0x9cd/0x2030 [ 295.253055] ? blkpg_ioctl+0xc40/0xc40 [ 295.256972] ? kasan_check_read+0x11/0x20 [ 295.261146] ? rcu_is_watching+0x8c/0x150 [ 295.265297] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 295.270019] ? __fget+0x4d5/0x740 [ 295.273481] ? ksys_dup3+0x690/0x690 [ 295.277239] ? kasan_check_write+0x14/0x20 [ 295.281520] ? do_raw_spin_lock+0xc1/0x200 [ 295.285791] block_ioctl+0xee/0x130 [ 295.289437] ? blkdev_fallocate+0x400/0x400 [ 295.293762] do_vfs_ioctl+0x1de/0x1720 [ 295.297679] ? rcu_is_watching+0x8c/0x150 [ 295.301857] ? ioctl_preallocate+0x300/0x300 [ 295.306269] ? __fget_light+0x2f7/0x440 [ 295.310247] ? fget_raw+0x20/0x20 [ 295.313763] ? putname+0xf2/0x130 [ 295.317224] ? rcu_read_lock_sched_held+0x108/0x120 [ 295.322247] ? kmem_cache_free+0x25c/0x2d0 [ 295.326485] ? putname+0xf7/0x130 [ 295.329959] ? do_sys_open+0x3cb/0x760 [ 295.333867] ? security_file_ioctl+0x94/0xc0 [ 295.338284] ksys_ioctl+0xa9/0xd0 [ 295.341751] __x64_sys_ioctl+0x73/0xb0 [ 295.345649] do_syscall_64+0x1b9/0x820 [ 295.349546] ? finish_task_switch+0x1d3/0x870 [ 295.354068] ? syscall_return_slowpath+0x5e0/0x5e0 [ 295.359002] ? syscall_return_slowpath+0x31d/0x5e0 [ 295.363975] ? __switch_to_asm+0x34/0x70 [ 295.368082] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 295.373488] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.378350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.383544] RIP: 0033:0x456ef7 [ 295.386740] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.405666] RSP: 002b:00007f43a941ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 295.413377] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000456ef7 [ 295.420663] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 22:50:26 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000040030000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:26 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1b5, 0x0) 22:50:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 295.427945] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 295.435256] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 295.442545] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000009 [ 295.461315] hfs: type requires a 4 character value [ 295.466420] hfs: unable to parse mount options 22:50:27 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000001000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 295.516089] hfs: type requires a 4 character value [ 295.521202] hfs: unable to parse mount options [ 295.558292] hfs: type requires a 4 character value [ 295.563385] hfs: unable to parse mount options 22:50:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x81}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000180)=r2, 0x4) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r3 = semget$private(0x0, 0x7, 0x40000000000000) semtimedop(r3, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r3, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000003, 0xffffffffffffffff) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f00000001c0)="75c5e5d0d841f7a985ad430508348898d21beb0a3a2bbfa37902c370eafd9225da7db4a43f741f4f671e916374328a5ef9fd987cf07c0952965fc1a9bab21726cda93f5cb3ad55f5ca7a3e82e5064de2cce7ec0d95c93affbfd878845b9e684b7890f1602b94fd1329427f3dbb92b1a8863da17bc83bf5c667bbd618f62aaf0d0d8d7ede37bda0abdb741f34fd629462a1c8d9a3bd45d72c8ad7d01e1564b7c68b1a10bff156a1ca7c2868e9e1694f4ca6822faa4738a2356bde7351f2cf37ee5a55af34f2638b4ac6768d", 0xcb}, {&(0x7f0000000340)="a884f503f98b0df29ef36b2f956c22d8e613b190f3c9f3f36b176ae0f42c7458256cfe2e1fb416b1eabb630d5955263c5bc55125b21c7f1af506812ad1f8401e91b27a9efe4448844f1d96683715876c24db042e6a0215210d98f0716bf2625bd0be88d17a6acf23b22b1c9cd4ee113e8a388136c272bedde5258b3b16ea296f6a25c6a11b9c35114543ef7e2ce8447dce2167de94661eb0d356a553f0e91f13aa9863c5f75a5e6b0f81bb312d5ea37b38cbaf8f398d2527933b0834beaf6c65cf65cdfb0e47cc2c8158b1a9db769fc001f0ce6c456e5257a55976e3760f60dfa84b9fbe90fa9573b4", 0xe9}, {&(0x7f0000000440)="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", 0xfe}, {&(0x7f0000000100)="4f5bfb6afe48f4c42fb0f1262971c8414064fca0827b31ce", 0x18}, {&(0x7f0000000540)="ffe22583416be804118ebd6acce716f0bc82404aab4059ce6371549f6b15e088eb19c520a510b950593acd8a8f8b9f7c2d3b169c71076c0ef7de4938434c482d98e8e5a5b9fdc728", 0x48}, {&(0x7f0000000140)="5cad68917a414d4b29aba67829dc81b9", 0x10}, {&(0x7f00000005c0)="47cce35161559ae0051dc1452455a47b3c10874b3afbaf17b4f1c070f4fceee8639f6ce6883796d63b6cd582b0856a7013cbbe57f0c427a3ce726ee01b9b6d540ed599d1cf70c3949e56ffb2499e15540a955e86e0bfaee260e73b9b79bca4db2ea1ed4b49be4cfea7fbbdc8d5cf5e0d86cc871fe69363c7bc21e8521fd7d44544974e13707c41bc71f64f142ddb2ac775c2511c7703d77337f809387b0e1597acb9bb8a0f5d35aa2cf96f9f0878d84e2bc0074b6d2675618c752a9871765e2338c7f55ebce904", 0xc7}, {&(0x7f00000006c0)="551cd06d2372456ed75b4edb42bf1f978986c8b038e318294e1b9a12a1f02e9a56c751fdc16691b9e9d062172763ead2e7f65fbc05d03536da6ec5c4f84a8e9154a79dcf8bc1b0def5143fd1aace20c18458e6aef71da300a87ed10b35a23b5c5afebc50ddf393ae628d0d948bbc27bef064f30e27ffa196a6e5171e1021d9571ea33e745fed363ed429fcccbc0ab0c077587c6fb12995e88cdd67cae009beaea467e063f5221527601373f76496ac7ad48506d78092041ac23d325183e0ab65a4fd652ec06b0be0d11e3a88e7842f840db78104a6e191bbf88defbdc0734d43df0f6a0d97b4e50a8d335725e2e8949306bc0173dd7d6f13d9e9bdc9", 0xfc}, {&(0x7f00000007c0)="5b33f46b920291f45556af026159366b7cbd273d792c123156022430ae52f7d36437e6e48133af81d7dc59ff0cc03b13b86fdbbbc4f27f3c975f7631cf453caba456bbec07ee79709c1c4cca2b480542f6cfea220a0e23", 0x57}, {&(0x7f00000002c0)="c6be7eff5897ca74307ad5b1207b82ad2e9f24ac0d21d11443c969f59a9a1536dff69025f67a3076258519ae", 0x2c}], 0xa, 0x4) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$int_out(r0, 0x2, &(0x7f00000000c0)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) 22:50:27 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000400000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="68667304", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x196, 0x0) 22:50:27 executing program 3 (fault-call:2 fault-nth:10): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r1) dup2(r3, r2) 22:50:27 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000011800000000000000000000000000009500000000000000f4b40de337a4d2c24a5fc6b46c40081ee47e944ff121242c9d5e069543e915925dfee1dd0afe5fab56f90200b130a8a3b19c3b73db073fc77416235ea9209a0255"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:27 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000200000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xfb, 0x0) 22:50:27 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x200) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000000c0)=0xfffffffffffffffd) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000100)) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r5 = dup2(r2, r2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f0000000280)=@deltclass={0x68, 0x29, 0x804, 0x70bd25, 0x25dfdbff, {0x0, r6, {0xe, 0x8}, {0x6, 0x3}, {0x7, 0xf}}, [@TCA_RATE={0x8, 0x5, {0x2, 0x7fffffff}}, @TCA_RATE={0x8, 0x5, {0x7, 0x9}}, @tclass_kind_options=@c_qfq={{0x8, 0x1, 'qfq\x00'}, {0x24, 0x2, [@TCA_QFQ_LMAX={0x8, 0x2, 0x7}, @TCA_QFQ_LMAX={0x8, 0x2, 0xe138}, @TCA_QFQ_WEIGHT={0x8, 0x1, 0xf70}, @TCA_QFQ_LMAX={0x8, 0x2, 0xfffffffffffffffe}]}}, @TCA_RATE={0x8, 0x5, {0x61a, 0x81}}]}, 0x68}, 0x1, 0x0, 0x0, 0x45}, 0x10) dup2(r4, r3) ppoll(&(0x7f0000000100), 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x8) 22:50:27 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000040000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 295.926348] hfs: type requires a 4 character value [ 295.931473] hfs: unable to parse mount options 22:50:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x4a, 0x0) [ 295.977059] hfs: type requires a 4 character value [ 295.982087] hfs: unable to parse mount options [ 295.998548] FAULT_INJECTION: forcing a failure. [ 295.998548] name failslab, interval 1, probability 0, space 0, times 0 [ 296.009979] CPU: 1 PID: 16914 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 296.017014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 22:50:27 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000200000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 296.026391] Call Trace: [ 296.029022] dump_stack+0x1c9/0x2b4 [ 296.032688] ? dump_stack_print_info.cold.2+0x52/0x52 [ 296.037922] ? __kernel_text_address+0xd/0x40 [ 296.042460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.048023] should_fail.cold.4+0xa/0x11 [ 296.052111] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 296.057247] ? rcu_note_context_switch+0x730/0x730 [ 296.062202] ? graph_lock+0x170/0x170 [ 296.066043] ? find_held_lock+0x36/0x1c0 [ 296.070122] ? __lock_is_held+0xb5/0x140 [ 296.074205] ? check_same_owner+0x340/0x340 [ 296.078538] ? rcu_note_context_switch+0x730/0x730 [ 296.083480] __should_failslab+0x124/0x180 [ 296.087720] should_failslab+0x9/0x14 [ 296.091530] kmem_cache_alloc+0x2af/0x760 [ 296.095688] ? lock_downgrade+0x8f0/0x8f0 [ 296.099890] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 296.104968] __kernfs_new_node+0x127/0x8d0 [ 296.109213] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 296.114007] ? graph_lock+0x170/0x170 [ 296.117820] ? kasan_check_write+0x14/0x20 [ 296.122097] ? __lock_is_held+0xb5/0x140 [ 296.126177] ? wait_for_completion+0x8d0/0x8d0 [ 296.130791] ? mutex_unlock+0xd/0x10 [ 296.134517] ? kernfs_activate+0x21a/0x2c0 [ 296.138759] ? kernfs_walk_and_get_ns+0x340/0x340 [ 296.143634] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 296.149171] ? kernfs_link_sibling+0x1d2/0x3b0 [ 296.153775] kernfs_new_node+0x95/0x120 [ 296.157772] __kernfs_create_file+0x5a/0x340 [ 296.162196] sysfs_add_file_mode_ns+0x221/0x520 [ 296.166877] ? component_del+0x510/0x550 [ 296.170963] internal_create_group+0x3e1/0xd80 [ 296.175565] ? remove_files.isra.1+0x190/0x190 [ 296.180153] ? up_write+0x7b/0x220 [ 296.183700] ? up_read+0x110/0x110 [ 296.187254] ? down_read+0x1d0/0x1d0 [ 296.191012] sysfs_create_group+0x1f/0x30 [ 296.195170] lo_ioctl+0x1310/0x1d90 [ 296.198809] ? lo_rw_aio_complete+0x450/0x450 [ 296.203306] blkdev_ioctl+0x9cd/0x2030 [ 296.207195] ? blkpg_ioctl+0xc40/0xc40 [ 296.211092] ? kasan_check_read+0x11/0x20 [ 296.215244] ? rcu_is_watching+0x8c/0x150 [ 296.219397] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 296.224082] ? __fget+0x4d5/0x740 [ 296.227555] ? ksys_dup3+0x690/0x690 [ 296.231272] ? kasan_check_write+0x14/0x20 [ 296.235511] ? do_raw_spin_lock+0xc1/0x200 [ 296.239754] block_ioctl+0xee/0x130 [ 296.243388] ? blkdev_fallocate+0x400/0x400 [ 296.247712] do_vfs_ioctl+0x1de/0x1720 [ 296.251602] ? rcu_is_watching+0x8c/0x150 [ 296.255759] ? ioctl_preallocate+0x300/0x300 [ 296.260710] ? __fget_light+0x2f7/0x440 [ 296.264689] ? fget_raw+0x20/0x20 [ 296.268145] ? putname+0xf2/0x130 [ 296.271602] ? rcu_read_lock_sched_held+0x108/0x120 [ 296.276641] ? kmem_cache_free+0x25c/0x2d0 [ 296.280887] ? putname+0xf7/0x130 [ 296.284362] ? do_sys_open+0x3cb/0x760 [ 296.288258] ? security_file_ioctl+0x94/0xc0 [ 296.292695] ksys_ioctl+0xa9/0xd0 [ 296.296156] __x64_sys_ioctl+0x73/0xb0 [ 296.300053] do_syscall_64+0x1b9/0x820 [ 296.303956] ? finish_task_switch+0x1d3/0x870 [ 296.308459] ? syscall_return_slowpath+0x5e0/0x5e0 [ 296.313392] ? syscall_return_slowpath+0x31d/0x5e0 [ 296.318358] ? __switch_to_asm+0x34/0x70 [ 296.322441] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 296.327813] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.332666] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.337855] RIP: 0033:0x456ef7 [ 296.341050] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.359955] RSP: 002b:00007f43a941ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 296.367666] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000456ef7 [ 296.374947] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 296.382217] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 296.389482] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 296.396751] R13: 0000000000000000 R14: 00000000004c9c3c R15: 000000000000000a 22:50:28 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x890e, &(0x7f00000000c0)="0a5cc80700315f857177a99b0b4f46d6d592e59020") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) [ 296.430226] hfs: type requires a 4 character value [ 296.435288] hfs: unable to parse mount options 22:50:28 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xf1, 0x0) 22:50:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) prctl$setfpexc(0xc, 0x3) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000400300000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:28 executing program 3 (fault-call:2 fault-nth:11): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:28 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1c9, 0x0) 22:50:28 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x8) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x800) ioctl$KVM_RUN(r1, 0xae80, 0x0) pipe(&(0x7f0000000100)) dup2(r2, r4) dup2(r4, r3) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f00000000c0)=0x595b, 0x4) [ 296.626976] hfs: type requires a 4 character value [ 296.632039] hfs: unable to parse mount options [ 296.687320] hfs: type requires a 4 character value [ 296.692418] hfs: unable to parse mount options 22:50:28 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x40000000) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x5, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000004000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 296.776243] FAULT_INJECTION: forcing a failure. [ 296.776243] name failslab, interval 1, probability 0, space 0, times 0 [ 296.787603] CPU: 1 PID: 16939 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 296.794637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.804006] Call Trace: [ 296.806618] dump_stack+0x1c9/0x2b4 [ 296.810265] ? dump_stack_print_info.cold.2+0x52/0x52 [ 296.815466] ? __kernel_text_address+0xd/0x40 [ 296.819981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.825549] should_fail.cold.4+0xa/0x11 [ 296.829633] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 296.834767] ? rcu_note_context_switch+0x730/0x730 [ 296.839733] ? graph_lock+0x170/0x170 [ 296.843596] ? find_held_lock+0x36/0x1c0 [ 296.847682] ? __lock_is_held+0xb5/0x140 [ 296.851773] ? check_same_owner+0x340/0x340 [ 296.856124] ? rcu_note_context_switch+0x730/0x730 [ 296.861076] __should_failslab+0x124/0x180 [ 296.865375] should_failslab+0x9/0x14 [ 296.869196] kmem_cache_alloc+0x2af/0x760 [ 296.873359] ? lock_downgrade+0x8f0/0x8f0 [ 296.877538] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 296.882585] __kernfs_new_node+0x127/0x8d0 [ 296.886842] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 296.891619] ? graph_lock+0x170/0x170 [ 296.895450] ? kasan_check_write+0x14/0x20 [ 296.899707] ? __lock_is_held+0xb5/0x140 [ 296.903789] ? wait_for_completion+0x8d0/0x8d0 [ 296.908469] ? mutex_unlock+0xd/0x10 [ 296.912195] ? kernfs_activate+0x21a/0x2c0 [ 296.916449] ? kernfs_walk_and_get_ns+0x340/0x340 [ 296.921311] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 22:50:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000002000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 296.926866] ? kernfs_link_sibling+0x1d2/0x3b0 [ 296.931482] kernfs_new_node+0x95/0x120 [ 296.935485] __kernfs_create_file+0x5a/0x340 [ 296.939940] sysfs_add_file_mode_ns+0x221/0x520 [ 296.944657] ? component_del+0x510/0x550 [ 296.948741] internal_create_group+0x3e1/0xd80 [ 296.953366] ? remove_files.isra.1+0x190/0x190 [ 296.957966] ? up_write+0x7b/0x220 [ 296.961523] ? up_read+0x110/0x110 [ 296.965092] ? down_read+0x1d0/0x1d0 [ 296.968837] sysfs_create_group+0x1f/0x30 [ 296.973012] lo_ioctl+0x1310/0x1d90 [ 296.976689] ? lo_rw_aio_complete+0x450/0x450 [ 296.981214] blkdev_ioctl+0x9cd/0x2030 [ 296.985121] ? blkpg_ioctl+0xc40/0xc40 [ 296.989032] ? kasan_check_read+0x11/0x20 [ 296.993192] ? rcu_is_watching+0x8c/0x150 [ 296.997358] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 297.002054] ? __fget+0x4d5/0x740 [ 297.005528] ? ksys_dup3+0x690/0x690 [ 297.009276] ? kasan_check_write+0x14/0x20 [ 297.013542] ? do_raw_spin_lock+0xc1/0x200 [ 297.017796] block_ioctl+0xee/0x130 [ 297.021450] ? blkdev_fallocate+0x400/0x400 [ 297.025808] do_vfs_ioctl+0x1de/0x1720 [ 297.029741] ? rcu_is_watching+0x8c/0x150 [ 297.033932] ? ioctl_preallocate+0x300/0x300 [ 297.038375] ? __fget_light+0x2f7/0x440 [ 297.042361] ? fget_raw+0x20/0x20 [ 297.045822] ? putname+0xf2/0x130 [ 297.049314] ? rcu_read_lock_sched_held+0x108/0x120 [ 297.054344] ? kmem_cache_free+0x25c/0x2d0 [ 297.058610] ? putname+0xf7/0x130 [ 297.062081] ? do_sys_open+0x3cb/0x760 [ 297.065989] ? security_file_ioctl+0x94/0xc0 [ 297.070434] ksys_ioctl+0xa9/0xd0 [ 297.073925] __x64_sys_ioctl+0x73/0xb0 [ 297.077831] do_syscall_64+0x1b9/0x820 [ 297.081734] ? finish_task_switch+0x1d3/0x870 [ 297.086258] ? syscall_return_slowpath+0x5e0/0x5e0 [ 297.091198] ? syscall_return_slowpath+0x31d/0x5e0 [ 297.096145] ? __switch_to_asm+0x34/0x70 [ 297.100218] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 297.105600] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.110464] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.115659] RIP: 0033:0x456ef7 [ 297.118893] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.137821] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 297.145544] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000456ef7 [ 297.153031] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 297.160310] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 297.167578] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 297.174865] R13: 0000000000000000 R14: 00000000004c9c3c R15: 000000000000000b 22:50:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x1, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=unix,noextend,anamu=,debug=0x0000000000000008,dfltuid=', @ANYRESHEX=r2, @ANYBLOB=',debug=0x00000000000007ff,version=9p2000.u,access=user,cache=mmap,mmap,mmap,\x00']) ioctl(r0, 0x8912, &(0x7f0000000700)="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") r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={@empty, @mcast1, @remote, 0xfffffffffffffc01, 0x7ff, 0x10001, 0x500, 0x4, 0x40000000, r5}) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) dup2(r3, r6) dup2(r6, r4) 22:50:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xdd, 0x0) 22:50:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000034000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 297.222156] hfs: type requires a 4 character value [ 297.227211] hfs: unable to parse mount options 22:50:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000400000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673f5", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x184, 0x0) 22:50:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x244800, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f00000000c0)=0x9) 22:50:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f00000000c0)={0x1, 0x10000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:50:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000004000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:29 executing program 3 (fault-call:2 fault-nth:12): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x149, 0x0) 22:50:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) fremovexattr(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="747275737465642e2f6465762feb726d00"]) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:50:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000002000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:29 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000001c0)={{0x6, 0x5}, 'port0\x00', 0xb0, 0x40, 0x3, 0x4b3b, 0x7, 0x6, 0x7f0, 0x0, 0x2, 0x85}) 22:50:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x116000}) dup2(r3, r2) 22:50:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xa3, 0x0) [ 297.708454] hfs: type requires a 4 character value [ 297.713592] hfs: unable to parse mount options [ 297.726151] FAULT_INJECTION: forcing a failure. [ 297.726151] name failslab, interval 1, probability 0, space 0, times 0 [ 297.737453] CPU: 0 PID: 17021 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 297.744476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.753843] Call Trace: [ 297.756451] dump_stack+0x1c9/0x2b4 [ 297.760105] ? dump_stack_print_info.cold.2+0x52/0x52 [ 297.765322] ? __kernel_text_address+0xd/0x40 [ 297.769839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.775390] should_fail.cold.4+0xa/0x11 [ 297.779466] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 297.784587] ? rcu_note_context_switch+0x730/0x730 [ 297.789531] ? graph_lock+0x170/0x170 [ 297.793356] ? find_held_lock+0x36/0x1c0 [ 297.797426] ? __lock_is_held+0xb5/0x140 [ 297.801512] ? check_same_owner+0x340/0x340 [ 297.805868] ? rcu_note_context_switch+0x730/0x730 [ 297.810809] __should_failslab+0x124/0x180 [ 297.815053] should_failslab+0x9/0x14 [ 297.818858] kmem_cache_alloc+0x2af/0x760 [ 297.823013] ? lock_downgrade+0x8f0/0x8f0 [ 297.827172] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 297.832199] __kernfs_new_node+0x127/0x8d0 [ 297.836444] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 297.841210] ? graph_lock+0x170/0x170 [ 297.845024] ? kasan_check_write+0x14/0x20 [ 297.849273] ? __lock_is_held+0xb5/0x140 [ 297.853348] ? wait_for_completion+0x8d0/0x8d0 [ 297.857958] ? mutex_unlock+0xd/0x10 [ 297.861683] ? kernfs_activate+0x21a/0x2c0 [ 297.865941] ? kernfs_walk_and_get_ns+0x340/0x340 [ 297.870799] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 297.876338] ? kernfs_link_sibling+0x1d2/0x3b0 [ 297.880955] kernfs_new_node+0x95/0x120 [ 297.884969] __kernfs_create_file+0x5a/0x340 [ 297.889393] sysfs_add_file_mode_ns+0x221/0x520 [ 297.894070] ? component_del+0x510/0x550 [ 297.898141] internal_create_group+0x3e1/0xd80 [ 297.902745] ? remove_files.isra.1+0x190/0x190 [ 297.907350] ? up_write+0x7b/0x220 [ 297.910896] ? up_read+0x110/0x110 [ 297.914467] ? down_read+0x1d0/0x1d0 [ 297.918202] sysfs_create_group+0x1f/0x30 [ 297.922358] lo_ioctl+0x1310/0x1d90 [ 297.925992] ? lo_rw_aio_complete+0x450/0x450 [ 297.930504] blkdev_ioctl+0x9cd/0x2030 [ 297.934401] ? blkpg_ioctl+0xc40/0xc40 [ 297.938295] ? kasan_check_read+0x11/0x20 [ 297.942447] ? rcu_is_watching+0x8c/0x150 [ 297.946599] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 297.951280] ? __fget+0x4d5/0x740 [ 297.954745] ? ksys_dup3+0x690/0x690 [ 297.958482] ? kasan_check_write+0x14/0x20 [ 297.962732] ? do_raw_spin_lock+0xc1/0x200 [ 297.966983] block_ioctl+0xee/0x130 [ 297.970613] ? blkdev_fallocate+0x400/0x400 [ 297.974952] do_vfs_ioctl+0x1de/0x1720 [ 297.978847] ? rcu_is_watching+0x8c/0x150 [ 297.983003] ? ioctl_preallocate+0x300/0x300 [ 297.987417] ? __fget_light+0x2f7/0x440 [ 297.991414] ? fget_raw+0x20/0x20 [ 297.994871] ? putname+0xf2/0x130 [ 297.998331] ? rcu_read_lock_sched_held+0x108/0x120 [ 298.003355] ? kmem_cache_free+0x25c/0x2d0 [ 298.007595] ? putname+0xf7/0x130 [ 298.011052] ? do_sys_open+0x3cb/0x760 [ 298.014965] ? security_file_ioctl+0x94/0xc0 [ 298.019383] ksys_ioctl+0xa9/0xd0 [ 298.022842] __x64_sys_ioctl+0x73/0xb0 [ 298.026735] do_syscall_64+0x1b9/0x820 [ 298.030629] ? finish_task_switch+0x1d3/0x870 [ 298.035129] ? syscall_return_slowpath+0x5e0/0x5e0 [ 298.040064] ? syscall_return_slowpath+0x31d/0x5e0 [ 298.045002] ? __switch_to_asm+0x34/0x70 [ 298.049086] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 298.054468] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.059330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.064527] RIP: 0033:0x456ef7 [ 298.067749] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.086652] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 298.094385] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000456ef7 [ 298.101667] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 22:50:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x1, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:50:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000020000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 298.108960] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 298.116233] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 298.123500] R13: 0000000000000000 R14: 00000000004c9c3c R15: 000000000000000c 22:50:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x17f, 0x0) [ 298.164418] hfs: type requires a 4 character value [ 298.169466] hfs: unable to parse mount options [ 298.179563] hfs: type requires a 4 character value [ 298.184637] hfs: unable to parse mount options 22:50:30 executing program 3 (fault-call:2 fault-nth:13): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x30, 0x0) [ 298.329749] FAULT_INJECTION: forcing a failure. [ 298.329749] name failslab, interval 1, probability 0, space 0, times 0 [ 298.341161] CPU: 0 PID: 17046 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 298.348190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.357577] Call Trace: [ 298.360184] dump_stack+0x1c9/0x2b4 [ 298.363828] ? dump_stack_print_info.cold.2+0x52/0x52 [ 298.369032] ? __kernel_text_address+0xd/0x40 [ 298.373575] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.379149] should_fail.cold.4+0xa/0x11 [ 298.383220] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 298.388356] ? rcu_note_context_switch+0x730/0x730 [ 298.393304] ? graph_lock+0x170/0x170 [ 298.397152] ? find_held_lock+0x36/0x1c0 [ 298.401225] ? __lock_is_held+0xb5/0x140 [ 298.405302] ? check_same_owner+0x340/0x340 [ 298.409653] ? rcu_note_context_switch+0x730/0x730 [ 298.414612] __should_failslab+0x124/0x180 [ 298.418867] should_failslab+0x9/0x14 [ 298.422673] kmem_cache_alloc+0x2af/0x760 [ 298.426834] ? lock_downgrade+0x8f0/0x8f0 [ 298.430988] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 298.436024] __kernfs_new_node+0x127/0x8d0 [ 298.440272] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 298.445035] ? graph_lock+0x170/0x170 [ 298.448893] ? kasan_check_write+0x14/0x20 [ 298.453155] ? __lock_is_held+0xb5/0x140 [ 298.457248] ? wait_for_completion+0x8d0/0x8d0 [ 298.461845] ? mutex_unlock+0xd/0x10 [ 298.465563] ? kernfs_activate+0x21a/0x2c0 [ 298.469824] ? kernfs_walk_and_get_ns+0x340/0x340 [ 298.474676] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 298.480238] ? kernfs_link_sibling+0x1d2/0x3b0 [ 298.484834] kernfs_new_node+0x95/0x120 [ 298.488822] __kernfs_create_file+0x5a/0x340 [ 298.493248] sysfs_add_file_mode_ns+0x221/0x520 [ 298.497943] ? component_del+0x510/0x550 [ 298.502029] internal_create_group+0x3e1/0xd80 [ 298.506624] ? remove_files.isra.1+0x190/0x190 [ 298.511225] ? up_write+0x7b/0x220 [ 298.514775] ? up_read+0x110/0x110 [ 298.518336] ? down_read+0x1d0/0x1d0 [ 298.522077] sysfs_create_group+0x1f/0x30 [ 298.526232] lo_ioctl+0x1310/0x1d90 [ 298.529869] ? lo_rw_aio_complete+0x450/0x450 [ 298.534371] blkdev_ioctl+0x9cd/0x2030 [ 298.538266] ? blkpg_ioctl+0xc40/0xc40 [ 298.542166] ? kasan_check_read+0x11/0x20 [ 298.546315] ? rcu_is_watching+0x8c/0x150 [ 298.550466] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 298.555149] ? __fget+0x4d5/0x740 [ 298.558622] ? ksys_dup3+0x690/0x690 [ 298.562356] ? kasan_check_write+0x14/0x20 [ 298.566607] ? do_raw_spin_lock+0xc1/0x200 [ 298.570860] block_ioctl+0xee/0x130 [ 298.574502] ? blkdev_fallocate+0x400/0x400 [ 298.578827] do_vfs_ioctl+0x1de/0x1720 [ 298.582731] ? rcu_is_watching+0x8c/0x150 [ 298.586891] ? ioctl_preallocate+0x300/0x300 [ 298.591320] ? __fget_light+0x2f7/0x440 [ 298.595299] ? fget_raw+0x20/0x20 [ 298.598766] ? putname+0xf2/0x130 [ 298.602226] ? rcu_read_lock_sched_held+0x108/0x120 [ 298.607244] ? kmem_cache_free+0x25c/0x2d0 [ 298.611485] ? putname+0xf7/0x130 [ 298.614953] ? do_sys_open+0x3cb/0x760 [ 298.618861] ? security_file_ioctl+0x94/0xc0 [ 298.623280] ksys_ioctl+0xa9/0xd0 [ 298.626772] __x64_sys_ioctl+0x73/0xb0 [ 298.630684] do_syscall_64+0x1b9/0x820 [ 298.634574] ? finish_task_switch+0x1d3/0x870 [ 298.639072] ? syscall_return_slowpath+0x5e0/0x5e0 [ 298.644006] ? syscall_return_slowpath+0x31d/0x5e0 [ 298.648961] ? __switch_to_asm+0x34/0x70 [ 298.653026] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 298.658397] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.663251] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.668446] RIP: 0033:0x456ef7 [ 298.671655] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.690647] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 298.698388] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000456ef7 [ 298.705657] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 298.712940] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 298.720213] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 22:50:30 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x2, &(0x7f0000000000)="0a5cc80700315f85715070") socket$inet6(0xa, 0x3, 0x3) r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e21, 0x0, @remote, 0x6}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000140)={r3, 0x7fffffff}, &(0x7f0000000180)=0x8) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:50:30 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000340000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x106, 0x0) [ 298.727496] R13: 0000000000000000 R14: 00000000004c9c3c R15: 000000000000000d [ 298.755801] hfs: type requires a 4 character value [ 298.760846] hfs: unable to parse mount options 22:50:30 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000010000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x170, 0x0) [ 298.798525] hfs: type requires a 4 character value [ 298.803626] hfs: unable to parse mount options [ 298.833014] hfs: type requires a 4 character value [ 298.838068] hfs: unable to parse mount options 22:50:30 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000001000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:30 executing program 3 (fault-call:2 fault-nth:14): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x177, 0x0) [ 299.072727] FAULT_INJECTION: forcing a failure. [ 299.072727] name failslab, interval 1, probability 0, space 0, times 0 [ 299.084077] CPU: 0 PID: 17084 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 299.091100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.100500] Call Trace: [ 299.103106] dump_stack+0x1c9/0x2b4 [ 299.106754] ? dump_stack_print_info.cold.2+0x52/0x52 [ 299.111981] ? __kernel_text_address+0xd/0x40 [ 299.116498] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.122056] should_fail.cold.4+0xa/0x11 [ 299.126143] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 299.131272] ? rcu_note_context_switch+0x730/0x730 [ 299.136223] ? graph_lock+0x170/0x170 [ 299.140053] ? find_held_lock+0x36/0x1c0 [ 299.144135] ? __lock_is_held+0xb5/0x140 [ 299.148224] ? check_same_owner+0x340/0x340 [ 299.153106] ? rcu_note_context_switch+0x730/0x730 [ 299.158094] __should_failslab+0x124/0x180 [ 299.162351] should_failslab+0x9/0x14 [ 299.166168] kmem_cache_alloc+0x2af/0x760 [ 299.170334] ? lock_downgrade+0x8f0/0x8f0 [ 299.174502] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 299.179535] __kernfs_new_node+0x127/0x8d0 [ 299.183795] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 299.188586] ? graph_lock+0x170/0x170 [ 299.192425] ? kasan_check_write+0x14/0x20 [ 299.196692] ? __lock_is_held+0xb5/0x140 [ 299.200771] ? wait_for_completion+0x8d0/0x8d0 [ 299.205381] ? mutex_unlock+0xd/0x10 [ 299.209212] ? kernfs_activate+0x21a/0x2c0 [ 299.213472] ? kernfs_walk_and_get_ns+0x340/0x340 [ 299.218341] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 299.223892] ? kernfs_link_sibling+0x1d2/0x3b0 [ 299.228514] kernfs_new_node+0x95/0x120 [ 299.232509] __kernfs_create_file+0x5a/0x340 [ 299.236963] sysfs_add_file_mode_ns+0x221/0x520 [ 299.241667] ? component_del+0x510/0x550 [ 299.245758] internal_create_group+0x3e1/0xd80 [ 299.250406] ? remove_files.isra.1+0x190/0x190 [ 299.255054] ? up_write+0x7b/0x220 [ 299.258611] ? up_read+0x110/0x110 [ 299.262163] ? down_read+0x1d0/0x1d0 [ 299.265907] sysfs_create_group+0x1f/0x30 [ 299.270098] lo_ioctl+0x1310/0x1d90 [ 299.273745] ? lo_rw_aio_complete+0x450/0x450 [ 299.278287] blkdev_ioctl+0x9cd/0x2030 [ 299.282202] ? blkpg_ioctl+0xc40/0xc40 [ 299.286117] ? kasan_check_read+0x11/0x20 [ 299.290279] ? rcu_is_watching+0x8c/0x150 [ 299.294440] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 299.299146] ? __fget+0x4d5/0x740 [ 299.302618] ? ksys_dup3+0x690/0x690 [ 299.306350] ? kasan_check_write+0x14/0x20 [ 299.310618] ? do_raw_spin_lock+0xc1/0x200 [ 299.314883] block_ioctl+0xee/0x130 [ 299.318567] ? blkdev_fallocate+0x400/0x400 [ 299.322971] do_vfs_ioctl+0x1de/0x1720 [ 299.326874] ? rcu_is_watching+0x8c/0x150 [ 299.331069] ? ioctl_preallocate+0x300/0x300 [ 299.335494] ? __fget_light+0x2f7/0x440 [ 299.339496] ? fget_raw+0x20/0x20 [ 299.342966] ? putname+0xf2/0x130 [ 299.346434] ? rcu_read_lock_sched_held+0x108/0x120 [ 299.351478] ? kmem_cache_free+0x25c/0x2d0 [ 299.355720] ? putname+0xf7/0x130 [ 299.359187] ? do_sys_open+0x3cb/0x760 [ 299.363091] ? security_file_ioctl+0x94/0xc0 [ 299.367523] ksys_ioctl+0xa9/0xd0 [ 299.370992] __x64_sys_ioctl+0x73/0xb0 [ 299.374911] do_syscall_64+0x1b9/0x820 [ 299.378835] ? finish_task_switch+0x1d3/0x870 [ 299.383344] ? syscall_return_slowpath+0x5e0/0x5e0 [ 299.388324] ? syscall_return_slowpath+0x31d/0x5e0 [ 299.393269] ? __switch_to_asm+0x34/0x70 [ 299.397342] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 299.402722] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.407593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.412787] RIP: 0033:0x456ef7 [ 299.416002] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.434932] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 299.442659] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000456ef7 [ 299.449951] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 299.457226] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 299.464500] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 22:50:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) set_robust_list(&(0x7f00000002c0)={&(0x7f0000000200)={&(0x7f00000001c0)}, 0x10000, &(0x7f0000000280)={&(0x7f0000000240)}}, 0x18) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = dup2(r3, r5) dup2(r2, r6) 22:50:31 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f00000001c0)={0x0, 0x401}) read(r0, &(0x7f0000000040)=""/28, 0x1c) r2 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @tick=0x8}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000340000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0)=0xfffffffffffffffc, 0x4) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_REINJECT_CONTROL(r3, 0xae71, &(0x7f0000000200)={0xeff}) ioctl$KVM_SET_XSAVE(r4, 0x5000aea5, &(0x7f0000000780)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup2(r2, r4) dup2(r4, r3) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timerfd_settime(r5, 0x1, &(0x7f0000000140)={{}, {r6, r7+30000000}}, &(0x7f00000001c0)) syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x6, &(0x7f0000000680)=[{&(0x7f0000000340)="9ccc3c0fbd90ca1dc1edeed1db1c2e3532bbc41dfc22714c21623b66f2387140c5d96a29167c71afd5b9ac9e36f21a066e44339b2a2690245f02f0a57303806606542ffd8662a3a966f40b8db902853c740772a1253d9b8292aec121c189dfa352d1f1afbbdf5c5d3a561bd3f47bc9e69c7cab5a33bbf2b86a62d2153117a16245b7e758c0dddb18584318b18369a201a0bd297b44a19750ec7498d806a7a0736496b81f0c12798237e1f4a696826f838889bc45fd6a7c2eb9c8c33986d44d3a29e858155ca3d1b143f1d0eacea2184262d03a7f", 0xd4, 0x1}, {&(0x7f0000000440)="f96ef8d5f0d67819af2113b6d86198d1d2a286854db85fd2bdc36432b23d8992fe179b645a647ff64c4bea5276310fb4f812e955fc1d358407132bda7e2b008ca16f917e434b4b8aa6e3e86d85423a2181f55a3796480c8bc4f631b115c2e0996c3e4cc6a04001a8dd2b9519cc08cefb0e3feb4ad8124b9675bd57bf213295eeb607d00634d1f47938ac6873a8fef7", 0x8f, 0x81}, {&(0x7f00000002c0)="f33ed7f431f9970598bfffcd23e2d76e3f1bed842f23fc4561", 0x19, 0x7}, {&(0x7f0000000500)="300fe2a11bd3d5b8da12abbc38fb1352a99a58957cb16375d04e572b839c097e4fa9b2346afd730fd6233a5da45a00c611170db6b7153ad1c4b44866697d1360514cbff246113695a0b9", 0x4a, 0x7}, {&(0x7f0000000580)="ca45608e1d666c03d351fd449a4d1e71b9c9f4b33bd3ad9cb39f2c7f544a6efad1c47c673f0afda50b548986ba50d99b148071815aab91c819891bf630ee6467f1ecbf1949241ab557dd81291a830d2bce3ff500d2b836fbeb2786d087d1a126a12afd20f4dc699fd15144245cb3679fb77790c077550b4e7c015686020b1f75de88a6334e21dde22083bf9223ff3c678db89635cfdabfc96033a32f687c322948841d555465e0cf51b236f5f2e7", 0xae, 0x1ff}, {&(0x7f0000000640)="5482ff3506ea70aa69b09f5f0d6803be7c3bace5a0", 0x15, 0x2}], 0x1000000, &(0x7f0000000740)='/dev/usbmon#\x00') 22:50:31 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1a2, 0x0) [ 299.471773] R13: 0000000000000000 R14: 00000000004c9c3c R15: 000000000000000e [ 299.481609] hfs: type requires a 4 character value [ 299.486679] hfs: unable to parse mount options 22:50:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f0000000300)=[{0x3, 0x6, 0x1800}, {0x6, 0x6}, {0x7, 0x6, 0x800}, {0x1, 0xffffffff}, {0x3, 0xab7, 0x1800}, {0x0, 0xcd, 0x800}, {0x4, 0x7fff}], 0x7) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x212000, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x7) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x1ff}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000240)={r3, 0x66, "9b7faeb1f896f03ad3b585c57c138fab7cd5972e1222ac44375e86372589c1fc337430f6f01f1cbab1c6e2ea88aef1c0a02d6966cfdec1385642050fd3943232f441b5d853bab804a7e9c43d6cfb26ce60961c55c146d5b67c5e51f07bdb4b353e5884a02361"}, &(0x7f0000000180)=0x6e) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:31 executing program 3 (fault-call:2 fault-nth:15): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000010000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="68667310", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000040000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:31 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x148, 0x0) 22:50:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f00000000c0)={[0x1, 0x13000, 0x5000, 0xf000], 0x9, 0x3, 0x2}) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) memfd_create(&(0x7f0000000140)='/dev/kvm\x00', 0x3) 22:50:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x10001) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) r2 = dup2(r0, r0) getsockname$netlink(r2, &(0x7f0000000300), &(0x7f0000000380)=0xc) connect(r0, &(0x7f0000000240)=@ipx={0x4, 0x0, 0x180, "82cfcf6bf871"}, 0x80) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x21}, &(0x7f00000000c0)=0x8) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x12b100, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r4, 0x2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r3, 0x101, 0x1}, &(0x7f0000000180)=0xc) semtimedop(r1, &(0x7f00000002c0)=[{0x3, 0x2, 0x800}, {0x0, 0x6, 0x800}, {0x4, 0x3, 0x1000}, {0x0, 0x1c0000, 0x800}, {0x7, 0xb9, 0x1000}, {0x1, 0x80000000, 0x1800}, {0x0, 0xfffffffffffffff8, 0x800}, {0x0, 0x3ff, 0x1000}, {0x2, 0xfffffffffffffffb}], 0x9, &(0x7f0000000100)) 22:50:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\b', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:31 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xcf, 0x0) 22:50:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x46d, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:50:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000003400000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 299.964421] FAULT_INJECTION: forcing a failure. [ 299.964421] name failslab, interval 1, probability 0, space 0, times 0 [ 299.975897] CPU: 1 PID: 17156 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 299.982970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.992353] Call Trace: [ 299.994967] dump_stack+0x1c9/0x2b4 [ 299.998633] ? dump_stack_print_info.cold.2+0x52/0x52 [ 300.003852] should_fail.cold.4+0xa/0x11 [ 300.007957] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 300.013086] ? __lock_is_held+0xb5/0x140 [ 300.017156] ? wait_for_completion+0x8d0/0x8d0 [ 300.021776] ? graph_lock+0x170/0x170 [ 300.025594] ? mutex_unlock+0xd/0x10 [ 300.029337] ? find_held_lock+0x36/0x1c0 [ 300.033439] ? __lock_is_held+0xb5/0x140 [ 300.037561] ? check_same_owner+0x340/0x340 [ 300.041938] ? rcu_note_context_switch+0x730/0x730 [ 300.046904] ? sysfs_add_file_mode_ns+0x245/0x520 [ 300.051789] __should_failslab+0x124/0x180 [ 300.056044] should_failslab+0x9/0x14 [ 300.059865] kmem_cache_alloc_trace+0x2cb/0x780 [ 300.064580] ? device_create_file+0x1e0/0x1e0 [ 300.069089] kobject_uevent_env+0x20f/0x1110 [ 300.073519] kobject_uevent+0x1f/0x30 [ 300.077330] lo_ioctl+0x138e/0x1d90 [ 300.080979] ? lo_rw_aio_complete+0x450/0x450 [ 300.085485] blkdev_ioctl+0x9cd/0x2030 [ 300.089399] ? blkpg_ioctl+0xc40/0xc40 [ 300.093320] ? kasan_check_read+0x11/0x20 [ 300.097479] ? rcu_is_watching+0x8c/0x150 [ 300.101652] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 300.106340] ? __fget+0x4d5/0x740 [ 300.109813] ? ksys_dup3+0x690/0x690 [ 300.113543] ? kasan_check_write+0x14/0x20 [ 300.117798] ? do_raw_spin_lock+0xc1/0x200 [ 300.122051] block_ioctl+0xee/0x130 [ 300.125704] ? blkdev_fallocate+0x400/0x400 [ 300.130054] do_vfs_ioctl+0x1de/0x1720 [ 300.133965] ? rcu_is_watching+0x8c/0x150 [ 300.138131] ? ioctl_preallocate+0x300/0x300 [ 300.142554] ? __fget_light+0x2f7/0x440 [ 300.146555] ? fget_raw+0x20/0x20 [ 300.150024] ? putname+0xf2/0x130 [ 300.153493] ? rcu_read_lock_sched_held+0x108/0x120 [ 300.158528] ? kmem_cache_free+0x25c/0x2d0 [ 300.162783] ? putname+0xf7/0x130 [ 300.166253] ? do_sys_open+0x3cb/0x760 [ 300.170175] ? security_file_ioctl+0x94/0xc0 [ 300.174593] ksys_ioctl+0xa9/0xd0 [ 300.178079] __x64_sys_ioctl+0x73/0xb0 [ 300.181979] do_syscall_64+0x1b9/0x820 [ 300.185869] ? finish_task_switch+0x1d3/0x870 [ 300.190373] ? syscall_return_slowpath+0x5e0/0x5e0 [ 300.195307] ? syscall_return_slowpath+0x31d/0x5e0 [ 300.200273] ? __switch_to_asm+0x34/0x70 [ 300.204343] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 300.209724] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.214577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.219766] RIP: 0033:0x456ef7 [ 300.222995] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.241922] RSP: 002b:00007f43a941ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 300.249652] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000456ef7 [ 300.257014] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 300.264743] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 300.272024] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 300.279295] R13: 0000000000000000 R14: 00000000004c9c3c R15: 000000000000000f [ 300.312697] hfs: type requires a 4 character value [ 300.317789] hfs: unable to parse mount options 22:50:32 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f00000001c0)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time, 0x0, {}, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800df4092ff0f00000000000000000000000000000000011800000000000000112000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:32 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x115, 0x0) 22:50:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000040000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfsh', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:32 executing program 3 (fault-call:2 fault-nth:16): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) r4 = dup2(r3, r2) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000000c0)=0x3, 0x4) [ 300.445163] FAULT_INJECTION: forcing a failure. [ 300.445163] name failslab, interval 1, probability 0, space 0, times 0 [ 300.456505] CPU: 0 PID: 17172 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 300.463526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.472885] Call Trace: [ 300.475503] dump_stack+0x1c9/0x2b4 [ 300.479142] ? dump_stack_print_info.cold.2+0x52/0x52 [ 300.484354] should_fail.cold.4+0xa/0x11 [ 300.488427] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 300.493539] ? __lock_is_held+0xb5/0x140 [ 300.497619] ? wait_for_completion+0x8d0/0x8d0 [ 300.502220] ? graph_lock+0x170/0x170 [ 300.506025] ? mutex_unlock+0xd/0x10 [ 300.509752] ? find_held_lock+0x36/0x1c0 [ 300.513848] ? __lock_is_held+0xb5/0x140 [ 300.517946] ? check_same_owner+0x340/0x340 [ 300.522284] ? rcu_note_context_switch+0x730/0x730 [ 300.527220] ? sysfs_add_file_mode_ns+0x245/0x520 [ 300.532077] __should_failslab+0x124/0x180 [ 300.536319] should_failslab+0x9/0x14 [ 300.540125] kmem_cache_alloc_trace+0x2cb/0x780 [ 300.544813] ? device_create_file+0x1e0/0x1e0 [ 300.549317] kobject_uevent_env+0x20f/0x1110 [ 300.553744] kobject_uevent+0x1f/0x30 [ 300.557561] lo_ioctl+0x138e/0x1d90 [ 300.561201] ? lo_rw_aio_complete+0x450/0x450 [ 300.565700] blkdev_ioctl+0x9cd/0x2030 [ 300.569588] ? blkpg_ioctl+0xc40/0xc40 [ 300.573494] ? kasan_check_read+0x11/0x20 [ 300.577648] ? rcu_is_watching+0x8c/0x150 [ 300.581803] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 300.586487] ? __fget+0x4d5/0x740 [ 300.589980] ? ksys_dup3+0x690/0x690 [ 300.593701] ? kasan_check_write+0x14/0x20 [ 300.597977] ? do_raw_spin_lock+0xc1/0x200 [ 300.602238] block_ioctl+0xee/0x130 [ 300.605872] ? blkdev_fallocate+0x400/0x400 [ 300.610209] do_vfs_ioctl+0x1de/0x1720 [ 300.614103] ? rcu_is_watching+0x8c/0x150 [ 300.618264] ? ioctl_preallocate+0x300/0x300 [ 300.622677] ? __fget_light+0x2f7/0x440 [ 300.626675] ? fget_raw+0x20/0x20 [ 300.630134] ? putname+0xf2/0x130 [ 300.633593] ? rcu_read_lock_sched_held+0x108/0x120 [ 300.638614] ? kmem_cache_free+0x25c/0x2d0 [ 300.642853] ? putname+0xf7/0x130 [ 300.646311] ? do_sys_open+0x3cb/0x760 [ 300.650206] ? security_file_ioctl+0x94/0xc0 [ 300.654620] ksys_ioctl+0xa9/0xd0 [ 300.658081] __x64_sys_ioctl+0x73/0xb0 [ 300.661976] do_syscall_64+0x1b9/0x820 [ 300.665866] ? finish_task_switch+0x1d3/0x870 [ 300.670378] ? syscall_return_slowpath+0x5e0/0x5e0 [ 300.675326] ? syscall_return_slowpath+0x31d/0x5e0 [ 300.680276] ? __switch_to_asm+0x34/0x70 [ 300.684339] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 300.689725] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.694580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.699778] RIP: 0033:0x456ef7 [ 300.702994] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.721894] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 300.729635] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000456ef7 [ 300.736924] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 22:50:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup2(r2, r4) ioctl$BINDER_THREAD_EXIT(r5, 0x40046208, 0x0) dup2(r4, r3) getsockopt$inet_int(r1, 0x0, 0x14, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 22:50:32 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xc8, 0x0) 22:50:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000004000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 300.744231] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 300.751501] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 300.758768] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000010 22:50:32 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000040)=0xbeb, 0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r2 = semget$private(0x0, 0x7, 0x0) semtimedop(r2, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) r3 = openat$userio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/userio\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x7}, &(0x7f0000000180)=0x8) mq_timedsend(r3, &(0x7f00000002c0)="ceac70a2cf", 0x5, 0x0, &(0x7f0000000300)={0x0, 0x989680}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000240)={r4, 0x34}, &(0x7f0000000280)=0x8) semtimedop(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) ioctl$UI_END_FF_UPLOAD(r3, 0x406855c9, &(0x7f0000000380)={0x9, 0x80, {0x57, 0x1, 0xffffffffffffffff, {0x6, 0x1}, {0x26c, 0x5}, @const={0x9, {0x4, 0x30b, 0x3, 0x9}}}, {0x57, 0x400, 0x3ff, {0x8001, 0x1}, {0x8, 0x100000000}, @cond=[{0x2, 0x1ea1, 0x7ff, 0x1, 0x1ff, 0x6}, {0x0, 0x0, 0x1, 0x5, 0x81, 0x6}]}}) 22:50:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:32 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1e, 0x0) 22:50:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000020000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 300.896166] hfs: type requires a 4 character value [ 300.901278] hfs: unable to parse mount options 22:50:32 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x8d, 0x0) 22:50:32 executing program 3 (fault-call:2 fault-nth:17): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000020000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 301.136170] FAULT_INJECTION: forcing a failure. [ 301.136170] name failslab, interval 1, probability 0, space 0, times 0 [ 301.147578] CPU: 0 PID: 17221 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 301.155062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.164416] Call Trace: [ 301.167022] dump_stack+0x1c9/0x2b4 [ 301.170666] ? dump_stack_print_info.cold.2+0x52/0x52 [ 301.175874] ? is_bpf_text_address+0xd7/0x170 [ 301.180401] should_fail.cold.4+0xa/0x11 [ 301.184487] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 301.189627] ? save_stack+0xa9/0xd0 [ 301.193300] ? graph_lock+0x170/0x170 [ 301.197111] ? kasan_kmalloc+0xc4/0xe0 [ 301.201013] ? kmem_cache_alloc_trace+0x152/0x780 [ 301.205884] ? kobject_uevent_env+0x20f/0x1110 [ 301.210497] ? kobject_uevent+0x1f/0x30 [ 301.214485] ? lo_ioctl+0x138e/0x1d90 [ 301.218302] ? find_held_lock+0x36/0x1c0 [ 301.222380] ? __lock_is_held+0xb5/0x140 [ 301.226475] ? check_same_owner+0x340/0x340 [ 301.230818] ? rcu_note_context_switch+0x730/0x730 [ 301.235776] __should_failslab+0x124/0x180 [ 301.240042] should_failslab+0x9/0x14 [ 301.243851] __kmalloc+0x2c8/0x760 [ 301.247409] ? kobject_uevent_env+0x20f/0x1110 [ 301.252010] ? rcu_read_lock_sched_held+0x108/0x120 [ 301.257045] ? kobject_get_path+0xc2/0x1a0 [ 301.261301] kobject_get_path+0xc2/0x1a0 [ 301.265406] kobject_uevent_env+0x234/0x1110 [ 301.269844] kobject_uevent+0x1f/0x30 [ 301.273662] lo_ioctl+0x138e/0x1d90 [ 301.277311] ? lo_rw_aio_complete+0x450/0x450 [ 301.281823] blkdev_ioctl+0x9cd/0x2030 [ 301.285726] ? blkpg_ioctl+0xc40/0xc40 [ 301.289632] ? kasan_check_read+0x11/0x20 [ 301.293796] ? rcu_is_watching+0x8c/0x150 [ 301.297968] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 301.302660] ? __fget+0x4d5/0x740 [ 301.306134] ? ksys_dup3+0x690/0x690 [ 301.309875] ? kasan_check_write+0x14/0x20 [ 301.314133] ? do_raw_spin_lock+0xc1/0x200 [ 301.318390] block_ioctl+0xee/0x130 [ 301.322051] ? blkdev_fallocate+0x400/0x400 [ 301.326426] do_vfs_ioctl+0x1de/0x1720 [ 301.330352] ? rcu_is_watching+0x8c/0x150 [ 301.334517] ? ioctl_preallocate+0x300/0x300 [ 301.338952] ? __fget_light+0x2f7/0x440 [ 301.342962] ? fget_raw+0x20/0x20 [ 301.346425] ? putname+0xf2/0x130 [ 301.349896] ? rcu_read_lock_sched_held+0x108/0x120 [ 301.354983] ? kmem_cache_free+0x25c/0x2d0 [ 301.359229] ? putname+0xf7/0x130 [ 301.362712] ? do_sys_open+0x3cb/0x760 [ 301.366617] ? security_file_ioctl+0x94/0xc0 [ 301.371042] ksys_ioctl+0xa9/0xd0 [ 301.374521] __x64_sys_ioctl+0x73/0xb0 [ 301.378424] do_syscall_64+0x1b9/0x820 [ 301.382324] ? finish_task_switch+0x1d3/0x870 [ 301.386831] ? syscall_return_slowpath+0x5e0/0x5e0 [ 301.391770] ? syscall_return_slowpath+0x31d/0x5e0 [ 301.396727] ? __switch_to_asm+0x34/0x70 [ 301.400812] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 301.406196] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.411071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.416266] RIP: 0033:0x456ef7 [ 301.419476] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.438389] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 301.446111] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000456ef7 [ 301.453385] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 301.460660] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 301.467960] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 301.475259] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000011 [ 301.494464] hfs: type requires a 4 character value [ 301.499582] hfs: unable to parse mount options 22:50:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) bind$vsock_stream(r1, &(0x7f0000000340)={0x28, 0x0, 0x2711, @reserved}, 0x10) r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x400) read(r2, &(0x7f0000000040)=""/28, 0x1c) r3 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x80, 0x1}, "0a4eeaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65ad9f90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x0, 0x1, 0x100000000, 0x401, 0x0, 0x0, 0x6, 0x2}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="68667397", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) 22:50:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000004003000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:33 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x79, 0x0) 22:50:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xb) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) 22:50:33 executing program 3 (fault-call:2 fault-nth:18): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 301.648638] FAULT_INJECTION: forcing a failure. [ 301.648638] name failslab, interval 1, probability 0, space 0, times 0 [ 301.660356] CPU: 0 PID: 17240 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 301.667381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.676740] Call Trace: [ 301.679367] dump_stack+0x1c9/0x2b4 [ 301.683059] ? dump_stack_print_info.cold.2+0x52/0x52 [ 301.688279] ? lock_downgrade+0x8f0/0x8f0 [ 301.692461] should_fail.cold.4+0xa/0x11 [ 301.696556] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 301.701679] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 301.706369] ? is_bpf_text_address+0xd7/0x170 [ 301.710891] ? graph_lock+0x170/0x170 [ 301.714714] ? __kernel_text_address+0xd/0x40 [ 301.719245] ? find_held_lock+0x36/0x1c0 [ 301.723319] ? __lock_is_held+0xb5/0x140 [ 301.727399] ? check_same_owner+0x340/0x340 [ 301.731726] ? block_ioctl+0xee/0x130 [ 301.735539] ? do_vfs_ioctl+0x1de/0x1720 [ 301.739603] ? ksys_ioctl+0xa9/0xd0 [ 301.743239] ? rcu_note_context_switch+0x730/0x730 [ 301.748282] __should_failslab+0x124/0x180 [ 301.752525] should_failslab+0x9/0x14 [ 301.756349] kmem_cache_alloc+0x2af/0x760 [ 301.760514] skb_clone+0x1be/0x500 [ 301.764074] ? refcount_add_not_zero_checked+0x2d0/0x330 [ 301.769529] ? skb_split+0x11f0/0x11f0 [ 301.773426] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 301.778460] ? netlink_trim+0x1ba/0x380 [ 301.782453] ? netlink_skb_destructor+0x210/0x210 [ 301.787332] netlink_broadcast_filtered+0x10b7/0x1620 [ 301.792534] ? __netlink_sendskb+0xd0/0xd0 [ 301.796791] ? kasan_check_read+0x11/0x20 [ 301.800971] ? rcu_is_watching+0x8c/0x150 [ 301.805139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.810683] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 301.816142] ? refcount_add_not_zero_checked+0x330/0x330 [ 301.821598] ? netlink_has_listeners+0x2cf/0x4a0 [ 301.826365] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 301.831393] netlink_broadcast+0x3a/0x50 [ 301.835471] kobject_uevent_env+0x829/0x1110 [ 301.839903] kobject_uevent+0x1f/0x30 [ 301.843737] lo_ioctl+0x138e/0x1d90 [ 301.847374] ? lo_rw_aio_complete+0x450/0x450 [ 301.851875] blkdev_ioctl+0x9cd/0x2030 [ 301.855766] ? blkpg_ioctl+0xc40/0xc40 [ 301.859681] ? kasan_check_read+0x11/0x20 [ 301.863831] ? rcu_is_watching+0x8c/0x150 [ 301.867985] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 301.872677] ? __fget+0x4d5/0x740 [ 301.876145] ? ksys_dup3+0x690/0x690 [ 301.879863] ? kasan_check_write+0x14/0x20 [ 301.884120] ? do_raw_spin_lock+0xc1/0x200 [ 301.888364] block_ioctl+0xee/0x130 [ 301.891994] ? blkdev_fallocate+0x400/0x400 [ 301.896410] do_vfs_ioctl+0x1de/0x1720 [ 301.900325] ? rcu_is_watching+0x8c/0x150 [ 301.904487] ? ioctl_preallocate+0x300/0x300 [ 301.908902] ? __fget_light+0x2f7/0x440 [ 301.912908] ? fget_raw+0x20/0x20 [ 301.916380] ? putname+0xf2/0x130 [ 301.919839] ? rcu_read_lock_sched_held+0x108/0x120 [ 301.924867] ? kmem_cache_free+0x25c/0x2d0 [ 301.929108] ? putname+0xf7/0x130 [ 301.932594] ? do_sys_open+0x3cb/0x760 [ 301.936493] ? security_file_ioctl+0x94/0xc0 [ 301.940909] ksys_ioctl+0xa9/0xd0 [ 301.944438] __x64_sys_ioctl+0x73/0xb0 [ 301.948335] do_syscall_64+0x1b9/0x820 [ 301.952235] ? finish_task_switch+0x1d3/0x870 [ 301.956740] ? syscall_return_slowpath+0x5e0/0x5e0 [ 301.961682] ? syscall_return_slowpath+0x31d/0x5e0 [ 301.966646] ? __switch_to_asm+0x34/0x70 [ 301.970715] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 301.976093] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.980962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.986155] RIP: 0033:0x456ef7 [ 301.989352] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.008258] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 302.015972] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000456ef7 [ 302.023246] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 302.030530] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 302.037817] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 22:50:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000100", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:33 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x108, 0x0) [ 302.045086] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000012 [ 302.083196] hfs: type requires a 4 character value [ 302.088295] hfs: unable to parse mount options 22:50:34 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x2fa, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x1ff, 0x438242) timerfd_gettime(r2, &(0x7f00000000c0)) 22:50:34 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000200", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:34 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xc3, 0x0) 22:50:34 executing program 3 (fault-call:2 fault-nth:19): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x1000000000000000) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="3a0043f2f0924d3b9d673931c7c44d45afa12874086a2f08be755a0c6793d4a54321562747a29cadcdd7c4670000000000000000a2aeedf96a7cc7", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000100)=0x24) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={r3, 0x78, &(0x7f00000001c0)=[@in={0x2, 0x4e24, @local}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e20, 0x20, @mcast1, 0x3}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e20, 0xffffffff, @empty, 0x400}, @in={0x2, 0x4e23, @remote}]}, &(0x7f0000000280)=0x10) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) read(r4, &(0x7f0000000400)=""/187, 0xbb) syz_kvm_setup_cpu$x86(r4, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0xd8) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup2(r2, r5) bind$llc(r1, &(0x7f0000000340)={0x1a, 0x337, 0xfff, 0xe678, 0x3f, 0x8f, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) dup2(r5, r4) 22:50:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r4 = fcntl$getown(r1, 0x9) tgkill(r3, r4, 0x38) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) dup2(r2, r6) dup2(r6, r5) [ 302.242072] hfs: type requires a 4 character value [ 302.247153] hfs: unable to parse mount options [ 302.266746] FAULT_INJECTION: forcing a failure. [ 302.266746] name failslab, interval 1, probability 0, space 0, times 0 [ 302.278174] CPU: 1 PID: 17270 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 302.285207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.294574] Call Trace: [ 302.297188] dump_stack+0x1c9/0x2b4 [ 302.300830] ? dump_stack_print_info.cold.2+0x52/0x52 [ 302.306036] ? lock_downgrade+0x8f0/0x8f0 [ 302.310199] should_fail.cold.4+0xa/0x11 [ 302.314272] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 302.319397] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 302.324109] ? is_bpf_text_address+0xd7/0x170 [ 302.328614] ? graph_lock+0x170/0x170 [ 302.332426] ? __kernel_text_address+0xd/0x40 [ 302.336950] ? find_held_lock+0x36/0x1c0 [ 302.341027] ? __lock_is_held+0xb5/0x140 [ 302.345109] ? check_same_owner+0x340/0x340 [ 302.349522] ? block_ioctl+0xee/0x130 [ 302.353342] ? do_vfs_ioctl+0x1de/0x1720 [ 302.357406] ? ksys_ioctl+0xa9/0xd0 [ 302.361050] ? rcu_note_context_switch+0x730/0x730 [ 302.365995] __should_failslab+0x124/0x180 [ 302.370243] should_failslab+0x9/0x14 [ 302.374052] kmem_cache_alloc+0x2af/0x760 [ 302.378235] skb_clone+0x1be/0x500 [ 302.381785] ? refcount_add_not_zero_checked+0x2d0/0x330 [ 302.387247] ? skb_split+0x11f0/0x11f0 [ 302.391144] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 302.396170] ? netlink_trim+0x1ba/0x380 [ 302.400157] ? netlink_skb_destructor+0x210/0x210 [ 302.405020] netlink_broadcast_filtered+0x10b7/0x1620 [ 302.410224] ? __netlink_sendskb+0xd0/0xd0 [ 302.414473] ? kasan_check_read+0x11/0x20 [ 302.418626] ? rcu_is_watching+0x8c/0x150 [ 302.422798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.428348] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 302.433809] ? refcount_add_not_zero_checked+0x330/0x330 [ 302.439287] ? netlink_has_listeners+0x2cf/0x4a0 [ 302.444055] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 302.449085] netlink_broadcast+0x3a/0x50 [ 302.453164] kobject_uevent_env+0x829/0x1110 [ 302.457592] kobject_uevent+0x1f/0x30 [ 302.461399] lo_ioctl+0x138e/0x1d90 [ 302.465041] ? lo_rw_aio_complete+0x450/0x450 [ 302.469541] blkdev_ioctl+0x9cd/0x2030 [ 302.473454] ? blkpg_ioctl+0xc40/0xc40 [ 302.477358] ? kasan_check_read+0x11/0x20 [ 302.481514] ? rcu_is_watching+0x8c/0x150 [ 302.485670] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 302.490354] ? __fget+0x4d5/0x740 [ 302.493819] ? ksys_dup3+0x690/0x690 [ 302.497539] ? kasan_check_write+0x14/0x20 [ 302.501779] ? do_raw_spin_lock+0xc1/0x200 [ 302.506027] block_ioctl+0xee/0x130 [ 302.509662] ? blkdev_fallocate+0x400/0x400 [ 302.513990] do_vfs_ioctl+0x1de/0x1720 [ 302.517882] ? rcu_is_watching+0x8c/0x150 [ 302.522064] ? ioctl_preallocate+0x300/0x300 [ 302.526478] ? __fget_light+0x2f7/0x440 [ 302.530469] ? fget_raw+0x20/0x20 [ 302.533934] ? putname+0xf2/0x130 [ 302.537398] ? rcu_read_lock_sched_held+0x108/0x120 [ 302.542424] ? kmem_cache_free+0x25c/0x2d0 [ 302.546670] ? putname+0xf7/0x130 [ 302.550145] ? do_sys_open+0x3cb/0x760 [ 302.554043] ? security_file_ioctl+0x94/0xc0 [ 302.558470] ksys_ioctl+0xa9/0xd0 [ 302.561973] __x64_sys_ioctl+0x73/0xb0 [ 302.565895] do_syscall_64+0x1b9/0x820 [ 302.569797] ? finish_task_switch+0x1d3/0x870 [ 302.574309] ? syscall_return_slowpath+0x5e0/0x5e0 [ 302.579244] ? syscall_return_slowpath+0x31d/0x5e0 [ 302.584183] ? __switch_to_asm+0x34/0x70 [ 302.588253] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 302.593628] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.598510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.603710] RIP: 0033:0x456ef7 [ 302.606925] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.625843] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 302.633563] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000456ef7 [ 302.640846] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 302.648123] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 302.655397] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 302.662678] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000013 [ 302.675080] hfs: type requires a 4 character value [ 302.680081] hfs: unable to parse mount options [ 302.702394] hfs: type requires a 4 character value [ 302.707501] hfs: unable to parse mount options 22:50:34 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:34 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000100000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:34 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x102, 0x0) 22:50:34 executing program 3 (fault-call:2 fault-nth:20): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x1, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r1, r3) 22:50:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) 22:50:34 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x13f, 0x0) 22:50:34 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000001", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 302.888676] hfs: type requires a 4 character value [ 302.893856] hfs: unable to parse mount options [ 302.915660] hfs: type requires a 4 character value [ 302.920828] hfs: unable to parse mount options [ 303.059744] FAULT_INJECTION: forcing a failure. [ 303.059744] name failslab, interval 1, probability 0, space 0, times 0 [ 303.071127] CPU: 0 PID: 17314 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 303.078150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.087529] Call Trace: [ 303.090138] dump_stack+0x1c9/0x2b4 [ 303.093808] ? dump_stack_print_info.cold.2+0x52/0x52 [ 303.099048] ? is_bpf_text_address+0xd7/0x170 [ 303.103596] should_fail.cold.4+0xa/0x11 [ 303.107684] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 303.112825] ? save_stack+0xa9/0xd0 [ 303.116474] ? graph_lock+0x170/0x170 [ 303.120284] ? kasan_kmalloc+0xc4/0xe0 [ 303.124181] ? kmem_cache_alloc_trace+0x152/0x780 [ 303.129042] ? kobject_uevent_env+0x20f/0x1110 [ 303.133648] ? kobject_uevent+0x1f/0x30 [ 303.137637] ? lo_ioctl+0x138e/0x1d90 [ 303.141458] ? find_held_lock+0x36/0x1c0 [ 303.145543] ? __lock_is_held+0xb5/0x140 [ 303.149646] ? check_same_owner+0x340/0x340 [ 303.154523] ? do_raw_spin_unlock+0xa7/0x2f0 [ 303.158966] ? rcu_note_context_switch+0x730/0x730 [ 303.163944] __should_failslab+0x124/0x180 [ 303.168211] should_failslab+0x9/0x14 [ 303.172043] __kmalloc+0x2c8/0x760 [ 303.175626] ? kobject_uevent_env+0x20f/0x1110 [ 303.180239] ? rcu_read_lock_sched_held+0x108/0x120 [ 303.185279] ? kobject_get_path+0xc2/0x1a0 [ 303.189536] kobject_get_path+0xc2/0x1a0 [ 303.193621] kobject_uevent_env+0x234/0x1110 [ 303.198055] kobject_uevent+0x1f/0x30 [ 303.201873] lo_ioctl+0x138e/0x1d90 [ 303.205526] ? lo_rw_aio_complete+0x450/0x450 [ 303.210037] blkdev_ioctl+0x9cd/0x2030 [ 303.213960] ? blkpg_ioctl+0xc40/0xc40 [ 303.217869] ? kasan_check_read+0x11/0x20 [ 303.222037] ? rcu_is_watching+0x8c/0x150 [ 303.226201] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 303.230896] ? __fget+0x4d5/0x740 [ 303.234397] ? ksys_dup3+0x690/0x690 [ 303.238151] ? kasan_check_write+0x14/0x20 [ 303.242403] ? do_raw_spin_lock+0xc1/0x200 [ 303.246669] block_ioctl+0xee/0x130 [ 303.250315] ? blkdev_fallocate+0x400/0x400 [ 303.254669] do_vfs_ioctl+0x1de/0x1720 [ 303.258577] ? rcu_is_watching+0x8c/0x150 [ 303.262755] ? ioctl_preallocate+0x300/0x300 [ 303.267193] ? __fget_light+0x2f7/0x440 [ 303.271195] ? fget_raw+0x20/0x20 [ 303.274674] ? putname+0xf2/0x130 [ 303.278150] ? rcu_read_lock_sched_held+0x108/0x120 [ 303.283185] ? kmem_cache_free+0x25c/0x2d0 [ 303.287446] ? putname+0xf7/0x130 [ 303.290948] ? do_sys_open+0x3cb/0x760 [ 303.294864] ? security_file_ioctl+0x94/0xc0 [ 303.299293] ksys_ioctl+0xa9/0xd0 [ 303.302765] __x64_sys_ioctl+0x73/0xb0 [ 303.306674] do_syscall_64+0x1b9/0x820 [ 303.310578] ? finish_task_switch+0x1d3/0x870 [ 303.315090] ? syscall_return_slowpath+0x5e0/0x5e0 [ 303.320039] ? syscall_return_slowpath+0x31d/0x5e0 [ 303.324990] ? __switch_to_asm+0x34/0x70 [ 303.329070] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 303.334455] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.339322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.344523] RIP: 0033:0x456ef7 [ 303.347730] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.366651] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 303.374382] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000456ef7 [ 303.381662] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 303.388958] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 303.396242] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 303.403527] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000014 22:50:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000005, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f00000001c0)="8d4d2824043dcfadca975cbf54773f1594a502be7415b66eb31cee97788531fd99bd0e9026620fb970549fc6d4f2919b49ef36206ab39598df1c83aa4eab6b6a69d3", 0x42}], 0x1, 0x0, 0x0, 0x4050}, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000340)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in={0x2, 0x4e20, @remote}}}, 0x90) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup2(r2, r5) dup2(r5, r4) 22:50:35 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) syz_open_procfs(r2, &(0x7f0000000180)='limits\x00') semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) r3 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x240000, 0x480000) ioctl$TCSETSW(r3, 0x5403, &(0x7f00000000c0)={0x1, 0x2, 0x2, 0x8000, 0x5, 0xe4, 0x3, 0x4780eaf5, 0x5, 0x0, 0x7, 0x5}) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x11c, 0x0) 22:50:35 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000034000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:35 executing program 6: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) io_setup(0x0, &(0x7f0000000380)=0x0) io_pgetevents(r6, 0x7c6, 0x3, &(0x7f00000003c0)=[{}, {}, {}], &(0x7f0000000440)={0x0, 0x1c9c380}, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0)=0xb0, 0x4) dup2(r2, r5) dup2(r5, r4) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000100)={0x6, 0x0, [{0xaba, 0x0, 0x4}, {0x0, 0x0, 0x1}, {0x9af, 0x0, 0x6}, {0x146c0113fa09862f}, {0x8cd, 0x0, 0x4}, {0x189, 0x0, 0xfffffffffffffff9}]}) [ 303.428505] hfs: type requires a 4 character value [ 303.433581] hfs: unable to parse mount options 22:50:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x110, 0x0) 22:50:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="68667305", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:35 executing program 3 (fault-call:2 fault-nth:21): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:35 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000002", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) 22:50:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x25, 0x0) 22:50:35 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) r2 = memfd_create(&(0x7f0000000080)='-\x00', 0x3) bind$netlink(r2, &(0x7f0000000200)={0x10, 0x0, 0x25dfdbfc, 0x4}, 0xc) r3 = memfd_create(&(0x7f0000000380)="0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0x1) write$FUSE_OPEN(r3, &(0x7f00000001c0)={0x20, 0x0, 0x8, {0x0, 0x4}}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000011800000000000000000000000000009500ffdf00000000298bd9b62ab3a65124980220bfe4c09eb48967bd515641c0790c5a1c4ee53cc38e49537d368aab5210ccee5bc476cedd62b33292d325385898180bd1c87db788a875ee24767244828ff0e1727b26d341e1"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:35 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r3, r2) [ 303.756540] FAULT_INJECTION: forcing a failure. [ 303.756540] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 303.768412] CPU: 0 PID: 17357 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 303.775451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.784811] Call Trace: [ 303.787420] dump_stack+0x1c9/0x2b4 [ 303.791071] ? dump_stack_print_info.cold.2+0x52/0x52 [ 303.796291] ? trace_hardirqs_off+0xd/0x10 [ 303.800559] should_fail.cold.4+0xa/0x11 [ 303.804646] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 303.809776] ? wait_for_completion+0x8d0/0x8d0 [ 303.814380] ? kfree+0x111/0x260 [ 303.817777] ? trace_hardirqs_on+0x10/0x10 [ 303.822041] ? kobject_uevent_env+0x288/0x1110 [ 303.826656] ? mutex_unlock+0xd/0x10 [ 303.830391] ? lo_ioctl+0xe6/0x1d90 [ 303.834048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.839601] ? should_fail+0x246/0xd86 [ 303.843518] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 303.848641] ? blkpg_ioctl+0xc40/0xc40 [ 303.852562] __alloc_pages_nodemask+0x36e/0xdb0 [ 303.857250] ? kasan_check_read+0x11/0x20 [ 303.861418] ? rcu_is_watching+0x8c/0x150 [ 303.865591] ? __alloc_pages_slowpath+0x2d60/0x2d60 [ 303.870636] ? find_held_lock+0x36/0x1c0 [ 303.874741] ? check_same_owner+0x340/0x340 [ 303.879090] cache_grow_begin+0x91/0x710 [ 303.883179] kmem_cache_alloc+0x689/0x760 [ 303.887348] ? fget_raw+0x20/0x20 [ 303.890817] ? putname+0xf2/0x130 [ 303.894292] getname_flags+0xd0/0x5a0 [ 303.898118] do_mkdirat+0xc5/0x310 [ 303.901683] ? __ia32_sys_mknod+0xb0/0xb0 [ 303.905843] ? fput+0x130/0x1a0 [ 303.909133] ? ksys_ioctl+0x81/0xd0 [ 303.912779] __x64_sys_mkdir+0x5c/0x80 [ 303.916685] do_syscall_64+0x1b9/0x820 [ 303.920586] ? finish_task_switch+0x1d3/0x870 [ 303.925098] ? syscall_return_slowpath+0x5e0/0x5e0 [ 303.930050] ? syscall_return_slowpath+0x31d/0x5e0 [ 303.934993] ? __switch_to_asm+0x34/0x70 [ 303.939067] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 303.944445] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.949315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.954519] RIP: 0033:0x4564c7 [ 303.957722] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.976634] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 303.984352] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 00000000004564c7 [ 303.991626] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 303.998900] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 22:50:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x19, 0x0) 22:50:35 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000400", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x8, 0x400000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x0, 0x0, 0x10, &(0x7f0000000100), &(0x7f0000000140)=""/16, 0x8}, 0x28) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) [ 304.006191] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 304.013465] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000015 [ 304.029957] hfs: type requires a 4 character value [ 304.035013] hfs: unable to parse mount options 22:50:35 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000200000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:36 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000240)=""/220) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:36 executing program 3 (fault-call:2 fault-nth:22): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:36 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x160, 0x0) 22:50:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:36 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x4800, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f0000000380)=0x4000) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)='/dev/usbmon#\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0xaaaabaf, 0x20, &(0x7f0000000240)=[@cr4={0x1, 0x10000}], 0x1) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f00000002c0)={0x6, 0x0, [{0xbf6, 0x0, 0xfffffffffffffff7}, {0xbff, 0x0, 0x6}, {0x1b0, 0x0, 0x4}, {0x298}, {0x3bc, 0x0, 0x5}, {0xbb8, 0x0, 0x9}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup2(r3, r0) dup2(r5, r4) 22:50:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000003400000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) [ 304.416342] hfs: type requires a 4 character value [ 304.421476] hfs: unable to parse mount options [ 304.429034] FAULT_INJECTION: forcing a failure. [ 304.429034] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 304.440872] CPU: 1 PID: 17399 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 304.447900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.457298] Call Trace: [ 304.459925] dump_stack+0x1c9/0x2b4 [ 304.463604] ? dump_stack_print_info.cold.2+0x52/0x52 [ 304.468814] ? trace_hardirqs_off+0xd/0x10 [ 304.473091] should_fail.cold.4+0xa/0x11 [ 304.477177] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 304.482316] ? wait_for_completion+0x8d0/0x8d0 [ 304.486947] ? kfree+0x111/0x260 [ 304.490358] ? trace_hardirqs_on+0x10/0x10 [ 304.494623] ? kobject_uevent_env+0x288/0x1110 [ 304.499239] ? mutex_unlock+0xd/0x10 [ 304.502976] ? lo_ioctl+0xe6/0x1d90 [ 304.506634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.512194] ? should_fail+0x246/0xd86 22:50:36 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x88, 0x0) 22:50:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000040000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 304.516108] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 304.521232] ? blkpg_ioctl+0xc40/0xc40 [ 304.525148] __alloc_pages_nodemask+0x36e/0xdb0 [ 304.529837] ? kasan_check_read+0x11/0x20 [ 304.534002] ? rcu_is_watching+0x8c/0x150 [ 304.538188] ? __alloc_pages_slowpath+0x2d60/0x2d60 [ 304.543285] ? find_held_lock+0x36/0x1c0 [ 304.547460] ? check_same_owner+0x340/0x340 [ 304.551805] cache_grow_begin+0x91/0x710 [ 304.555887] kmem_cache_alloc+0x689/0x760 [ 304.560076] ? fget_raw+0x20/0x20 [ 304.563547] ? putname+0xf2/0x130 22:50:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000400000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 304.567024] getname_flags+0xd0/0x5a0 [ 304.570849] do_mkdirat+0xc5/0x310 [ 304.574412] ? __ia32_sys_mknod+0xb0/0xb0 [ 304.578592] ? fput+0x130/0x1a0 [ 304.581885] ? ksys_ioctl+0x81/0xd0 [ 304.585544] __x64_sys_mkdir+0x5c/0x80 [ 304.589461] do_syscall_64+0x1b9/0x820 [ 304.593367] ? finish_task_switch+0x1d3/0x870 [ 304.597887] ? syscall_return_slowpath+0x5e0/0x5e0 [ 304.602849] ? syscall_return_slowpath+0x31d/0x5e0 [ 304.607803] ? __switch_to_asm+0x34/0x70 [ 304.611882] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 304.617300] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.622187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.627388] RIP: 0033:0x4564c7 [ 304.630619] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.649531] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 304.657261] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 00000000004564c7 [ 304.664541] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 304.671809] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 304.679077] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 304.686367] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000016 [ 304.697148] hfs: type requires a 4 character value [ 304.702281] hfs: unable to parse mount options [ 304.722818] hfs: type requires a 4 character value [ 304.727834] hfs: unable to parse mount options 22:50:36 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000011800000000000000010000800000000000000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_CLOCK(r3, 0x4030ae7b, &(0x7f00000000c0)={0x99d, 0x6}) dup2(r1, r3) dup2(r3, r2) 22:50:36 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x13, 0x0) 22:50:36 executing program 3 (fault-call:2 fault-nth:23): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673fd", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000200000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 304.944889] FAULT_INJECTION: forcing a failure. [ 304.944889] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 304.956754] CPU: 1 PID: 17427 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 304.963788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.973153] Call Trace: [ 304.975758] dump_stack+0x1c9/0x2b4 [ 304.979423] ? dump_stack_print_info.cold.2+0x52/0x52 [ 304.984648] ? pick_next_entity+0x197/0x390 [ 304.988984] should_fail.cold.4+0xa/0x11 [ 304.993061] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 304.998176] ? wait_for_completion+0x8d0/0x8d0 [ 305.002767] ? run_rebalance_domains+0x4c0/0x4c0 [ 305.007554] ? trace_hardirqs_on+0x10/0x10 [ 305.011805] ? find_held_lock+0x36/0x1c0 [ 305.015888] ? lock_downgrade+0x8f0/0x8f0 [ 305.020058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.025610] ? should_fail+0x246/0xd86 [ 305.029515] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 305.034631] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 305.039249] __alloc_pages_nodemask+0x36e/0xdb0 [ 305.043940] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 305.048987] ? __alloc_pages_slowpath+0x2d60/0x2d60 [ 305.054014] ? __schedule+0x14da/0x1ec0 [ 305.058006] ? find_held_lock+0x36/0x1c0 [ 305.062093] ? check_same_owner+0x340/0x340 [ 305.066423] cache_grow_begin+0x91/0x710 [ 305.070513] kmem_cache_alloc+0x689/0x760 [ 305.074666] ? __schedule+0x1ec0/0x1ec0 [ 305.078649] ? fget_raw+0x20/0x20 [ 305.082106] ? putname+0xf2/0x130 [ 305.085573] getname_flags+0xd0/0x5a0 [ 305.089384] do_mkdirat+0xc5/0x310 [ 305.092943] ? __ia32_sys_mknod+0xb0/0xb0 [ 305.097133] ? syscall_slow_exit_work+0x500/0x500 [ 305.101996] ? ksys_ioctl+0x81/0xd0 [ 305.105633] __x64_sys_mkdir+0x5c/0x80 [ 305.109533] do_syscall_64+0x1b9/0x820 [ 305.113439] ? finish_task_switch+0x1d3/0x870 [ 305.117951] ? syscall_return_slowpath+0x5e0/0x5e0 [ 305.122901] ? syscall_return_slowpath+0x31d/0x5e0 [ 305.127863] ? __switch_to_asm+0x34/0x70 [ 305.131941] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 305.137318] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.142172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.147374] RIP: 0033:0x4564c7 [ 305.150670] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.169595] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 305.177318] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 00000000004564c7 [ 305.184615] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 305.191908] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 305.199188] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 305.206463] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000017 [ 305.219009] hfs: type requires a 4 character value [ 305.224050] hfs: unable to parse mount options 22:50:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8b12, &(0x7f00000000c0)="0700317000000005b96bf6cfa1ef3e214000") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x20, 0x0, 0x1003}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x4b57, 0x1800}, {0x6, 0x0, 0x800}, {0x3, 0xee3c, 0x800}, {0x2, 0x5}, {0x4, 0x20000000000004, 0x800}], 0x5) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:37 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = dup2(r1, r3) accept4$vsock_stream(r4, &(0x7f00000000c0)={0x28, 0x0, 0x2710}, 0x10, 0x80000) dup2(r3, r2) 22:50:37 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000040030000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:37 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x107, 0x0) 22:50:37 executing program 3 (fault-call:2 fault-nth:24): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000004000/0x18000)=nil, &(0x7f0000000300)=[@text32={0x20, &(0x7f00000000c0)="66ba6100ec0f2294f3ab36660f01df64f20f01c9c4e1a8120bc4e11dd127dbcec4c3791628d40f20e035000040000f22e0", 0x31}], 0x1, 0x0, &(0x7f0000000100)=[@cr4={0x1, 0x100000}], 0x1) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) [ 305.397280] FAULT_INJECTION: forcing a failure. [ 305.397280] name failslab, interval 1, probability 0, space 0, times 0 [ 305.408888] CPU: 0 PID: 17449 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 305.415962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.425324] Call Trace: [ 305.427940] dump_stack+0x1c9/0x2b4 [ 305.431579] ? dump_stack_print_info.cold.2+0x52/0x52 [ 305.436789] should_fail.cold.4+0xa/0x11 [ 305.440857] ? print_usage_bug+0xc0/0xc0 [ 305.444941] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 305.450084] ? __lock_acquire+0x7fc/0x5020 [ 305.454337] ? graph_lock+0x170/0x170 [ 305.458181] ? trace_hardirqs_on+0x10/0x10 [ 305.462420] ? print_usage_bug+0xc0/0xc0 [ 305.466490] ? check_noncircular+0x20/0x20 [ 305.470743] ? __lock_is_held+0xb5/0x140 [ 305.474837] ? check_same_owner+0x340/0x340 [ 305.479160] ? print_usage_bug+0xc0/0xc0 [ 305.483226] ? lock_downgrade+0x8f0/0x8f0 [ 305.487383] ? rcu_note_context_switch+0x730/0x730 [ 305.492321] ? graph_lock+0x170/0x170 [ 305.496134] __should_failslab+0x124/0x180 [ 305.500392] should_failslab+0x9/0x14 [ 305.504212] kmem_cache_alloc+0x2af/0x760 [ 305.508377] ? print_usage_bug+0xc0/0xc0 [ 305.512449] ? __lock_is_held+0xb5/0x140 [ 305.516540] ext4_alloc_inode+0xc9/0x880 [ 305.520612] ? ratelimit_state_init+0xb0/0xb0 [ 305.525113] ? find_held_lock+0x36/0x1c0 [ 305.529189] ? lock_downgrade+0x8f0/0x8f0 [ 305.533348] ? kasan_check_read+0x11/0x20 [ 305.537500] ? rcu_is_watching+0x8c/0x150 [ 305.541654] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 305.546334] ? graph_lock+0x170/0x170 [ 305.550166] ? ratelimit_state_init+0xb0/0xb0 [ 305.554667] alloc_inode+0x63/0x190 [ 305.558303] new_inode_pseudo+0x71/0x1a0 [ 305.562383] ? prune_icache_sb+0x1b0/0x1b0 [ 305.566631] new_inode+0x1c/0x40 [ 305.570006] __ext4_new_inode+0x4af/0x6600 [ 305.574265] ? ext4_free_inode+0x1aa0/0x1aa0 [ 305.578688] ? find_held_lock+0x36/0x1c0 [ 305.582777] ? lock_downgrade+0x8f0/0x8f0 [ 305.586950] ? kasan_check_read+0x11/0x20 [ 305.591103] ? rcu_is_watching+0x8c/0x150 [ 305.595254] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 305.599948] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 305.604630] ? is_bpf_text_address+0xd7/0x170 [ 305.609129] ? kernel_text_address+0x79/0xf0 [ 305.613540] ? __kernel_text_address+0xd/0x40 [ 305.618071] ? unwind_get_return_address+0x61/0xa0 [ 305.623010] ? __save_stack_trace+0x8d/0xf0 [ 305.627348] ? save_stack+0xa9/0xd0 [ 305.630977] ? save_stack+0x43/0xd0 [ 305.634604] ? __kasan_slab_free+0x11a/0x170 [ 305.639022] ? kasan_slab_free+0xe/0x10 [ 305.642994] ? kmem_cache_free+0x86/0x2d0 [ 305.647147] ? putname+0xf2/0x130 [ 305.650603] ? filename_create+0x2b2/0x5b0 [ 305.654836] ? do_mkdirat+0xda/0x310 [ 305.658549] ? __x64_sys_mkdir+0x5c/0x80 [ 305.662615] ? do_syscall_64+0x1b9/0x820 [ 305.666679] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.672053] ? kasan_check_read+0x11/0x20 [ 305.676209] ? do_raw_spin_unlock+0xa7/0x2f0 [ 305.680623] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 305.685211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.690752] ? __dquot_initialize+0x61d/0xde0 [ 305.695259] ? graph_lock+0x170/0x170 [ 305.699065] ? trace_hardirqs_off+0xd/0x10 [ 305.703304] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 305.708428] ? dquot_get_next_dqblk+0x180/0x180 [ 305.713115] ? debug_check_no_obj_freed+0x30b/0x595 [ 305.718134] ? kasan_check_write+0x14/0x20 [ 305.722379] ? __lock_is_held+0xb5/0x140 [ 305.726467] ext4_mkdir+0x2e1/0xe60 [ 305.730111] ? ext4_init_dot_dotdot+0x510/0x510 [ 305.734802] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.740344] ? security_inode_permission+0xd2/0x100 [ 305.745384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.750951] ? security_inode_mkdir+0xe8/0x120 [ 305.755541] vfs_mkdir+0x42e/0x6b0 [ 305.759093] do_mkdirat+0x27b/0x310 [ 305.762740] ? __ia32_sys_mknod+0xb0/0xb0 [ 305.766896] ? ksys_ioctl+0x81/0xd0 [ 305.770554] __x64_sys_mkdir+0x5c/0x80 [ 305.774451] do_syscall_64+0x1b9/0x820 [ 305.778341] ? finish_task_switch+0x1d3/0x870 [ 305.782845] ? syscall_return_slowpath+0x5e0/0x5e0 [ 305.787785] ? syscall_return_slowpath+0x31d/0x5e0 [ 305.792730] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 305.798118] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.802975] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.808164] RIP: 0033:0x4564c7 [ 305.811365] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.830275] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 305.837995] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 00000000004564c7 22:50:37 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000400000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 305.845270] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 305.852538] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 305.859817] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 305.867099] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000018 [ 305.877612] hfs: type requires a 4 character value [ 305.882639] hfs: unable to parse mount options 22:50:37 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x74, 0x0) [ 305.926014] hfs: type requires a 4 character value [ 305.931086] hfs: unable to parse mount options 22:50:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:37 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1, 0x0) write$P9_RLERRORu(r2, &(0x7f00000001c0)={0x1a, 0x7, 0x1, {{0xd, '/dev/snd/seq\x00'}, 0x3}}, 0x1a) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:37 executing program 3 (fault-call:2 fault-nth:25): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:37 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x141, 0x0) 22:50:37 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000001000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:37 executing program 2: r0 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@ax25, &(0x7f0000000140)=0x80) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="620000008baf9e25b9dcaa8e70f4db6409182aaae529f1fba158182f0e690519fbc22ab6dcf4e76024d20b6f199ea7c7e69165fd1300db57c6fedf6318a7a81ad5ace5296d5af995974900c66d1aaef5f1d679f3f9ffffff489b7d0657bac773cb053bec287c69c494b69cb2c2b87987d67feea55582c94fda6db1d888b87ec1ffbd839a94d96f0e0da3ea139ab3ea7f0576e895d867589f5d4cb88eba953c8c44be901fe00f62812101cf5b6498340796e70e81b589f0ec389091eabc"], &(0x7f0000000240)=0x6a) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000340)={r1, @in={{0x2, 0x4e23, @local}}}, 0x84) r2 = socket$inet6(0xa, 0x1000000000002, 0x3) r3 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x20000040, 0x60200) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7b8e, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) dup2(r4, r6) dup2(r4, r5) 22:50:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = memfd_create(&(0x7f00000000c0)='/dev/audio\x00', 0x2) getsockopt$inet_dccp_int(r1, 0x21, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r2 = semget$private(0x0, 0x7, 0x0) semtimedop(r2, &(0x7f0000000400)=[{0x0, 0x60, 0x800}, {0x4, 0x8, 0x1800}, {0x6, 0x3, 0x800}, {0x1, 0x5, 0x800}, {0x3, 0x7, 0x1800}, {0x1, 0x4, 0x1000}, {0x4, 0x9, 0xf55c81420e8b4c5b}, {0x4, 0x42, 0x800}, {0x2, 0x6, 0x1000}, {0x1, 0x8, 0x1800}], 0x1d3, &(0x7f00000003c0)={0x77359400}) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0xc002, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) semtimedop(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) [ 306.061637] hfs: type requires a 4 character value [ 306.066784] hfs: unable to parse mount options [ 306.092967] hfs: type requires a 4 character value [ 306.098099] hfs: unable to parse mount options 22:50:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:38 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000002000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:38 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x122, 0x0) 22:50:38 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl$int_in(r0, 0x5473, &(0x7f00000000c0)=0x1f) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="48000000ffffffffe8c0b84ffa33e5078df6ef8f398b9e6babc11446c4a53dd83e2f9f7f6295cb2d528c55b909cf0e0e441d0032fccc0fb1ad5612b43c94ebe98a7d6448fd604ca05520858210c7ad419cc1e71f4c3e265f3de63709f1bb4f1ea7885e133ad1f4832cf880964f7d5f152f442fe09c385cd666cfa55960e9b270182d53691a2dfd134aba6484088d435220210b92a97cf06fdc0839a6b71cf4c39854046273e2ca981898322b5dbcc9909c98b409ac57bc93ffa4d0ea4b61268e323b7490c0834384d5321f8630aae7373e8eca6e027409315ec91c1844907a15d4f4167149d81dd21a687ffcb66991711e2d4a"], 0x200040) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x80, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) socket$inet6(0xa, 0x806, 0xa5) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) [ 306.272570] hfs: type requires a 4 character value [ 306.277708] hfs: unable to parse mount options 22:50:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:50:38 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x2a, 0x0) 22:50:38 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000034000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 306.360199] hfs: type requires a 4 character value [ 306.365318] hfs: unable to parse mount options 22:50:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:38 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:38 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000000c0)={0x5, 0x0, 0xfffffffffffffffc, 0xfffffffffffffc76, 0x7}) dup2(r4, r6) dup2(r6, r5) [ 306.542037] hfs: type requires a 4 character value [ 306.547113] hfs: unable to parse mount options [ 306.576760] FAULT_INJECTION: forcing a failure. [ 306.576760] name failslab, interval 1, probability 0, space 0, times 0 [ 306.588626] CPU: 1 PID: 17536 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 306.595655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.605049] Call Trace: [ 306.607658] dump_stack+0x1c9/0x2b4 [ 306.611313] ? dump_stack_print_info.cold.2+0x52/0x52 [ 306.616548] should_fail.cold.4+0xa/0x11 [ 306.620640] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 306.625803] ? trace_hardirqs_on+0x10/0x10 [ 306.630069] ? find_held_lock+0x36/0x1c0 [ 306.634177] ? lock_downgrade+0x8f0/0x8f0 [ 306.638367] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 306.643235] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 306.648114] ? graph_lock+0x170/0x170 [ 306.651941] ? kernel_text_address+0x79/0xf0 [ 306.656369] __should_failslab+0x124/0x180 [ 306.660649] should_failslab+0x9/0x14 [ 306.664465] kmem_cache_alloc+0x47/0x760 [ 306.668532] ? find_held_lock+0x36/0x1c0 [ 306.672630] ? __es_tree_search.isra.13+0x1ba/0x220 [ 306.677690] __es_insert_extent+0x305/0x1140 [ 306.682111] ? ext4_es_insert_extent+0x21c/0x7e0 [ 306.686879] ? ext4_es_free_extent+0x820/0x820 [ 306.691471] ? lock_release+0xa30/0xa30 [ 306.695459] ? __lock_is_held+0xb5/0x140 [ 306.699533] ? kasan_check_write+0x14/0x20 [ 306.703792] ? do_raw_write_lock+0xbd/0x1b0 [ 306.708149] ext4_es_insert_extent+0x2ea/0x7e0 [ 306.712753] ? ext4_es_find_delayed_extent_range+0xd80/0xd80 [ 306.718570] ? __lock_is_held+0xb5/0x140 [ 306.722651] ? rcu_read_lock_sched_held+0x108/0x120 [ 306.727673] ? __kmalloc+0x5f9/0x760 [ 306.731402] ext4_ext_put_gap_in_cache+0x158/0x1f0 [ 306.736357] ? ext4_zeroout_es+0x160/0x160 [ 306.740601] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 306.746157] ext4_ext_map_blocks+0x2453/0x62e0 [ 306.750762] ? perf_trace_lock+0x920/0x920 [ 306.755025] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 306.759878] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 306.764909] ? find_held_lock+0x36/0x1c0 [ 306.768988] ? graph_lock+0x170/0x170 [ 306.772796] ? graph_lock+0x170/0x170 [ 306.776610] ? lock_downgrade+0x8f0/0x8f0 [ 306.780792] ? lock_acquire+0x1e4/0x540 [ 306.784772] ? ext4_map_blocks+0x480/0x1b60 [ 306.789110] ? lock_release+0xa30/0xa30 [ 306.793115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.798657] ? ext4_es_lookup_extent+0x465/0xde0 [ 306.803412] ? rcu_note_context_switch+0x730/0x730 [ 306.808388] ? down_read+0xb5/0x1d0 [ 306.812031] ? ext4_map_blocks+0x480/0x1b60 [ 306.816359] ? __down_interruptible+0x700/0x700 [ 306.821054] ? kernel_text_address+0x79/0xf0 [ 306.825477] ext4_map_blocks+0xe31/0x1b60 [ 306.829633] ? __save_stack_trace+0x8d/0xf0 [ 306.833986] ? ext4_issue_zeroout+0x190/0x190 [ 306.838492] ? save_stack+0x43/0xd0 [ 306.842137] ? __kasan_slab_free+0x11a/0x170 [ 306.846552] ? kasan_slab_free+0xe/0x10 [ 306.850532] ? kmem_cache_free+0x86/0x2d0 [ 306.854687] ext4_getblk+0x10e/0x630 [ 306.858411] ? ext4_iomap_begin+0x1350/0x1350 [ 306.862943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.868494] ? __dquot_initialize+0x61d/0xde0 [ 306.873001] ext4_bread+0x95/0x2b0 [ 306.876573] ? ext4_getblk+0x630/0x630 [ 306.880472] ? dquot_get_next_dqblk+0x180/0x180 [ 306.885149] ? debug_check_no_obj_freed+0x30b/0x595 [ 306.890169] ? kasan_check_write+0x14/0x20 [ 306.894414] ext4_append+0x14e/0x370 [ 306.898145] ext4_mkdir+0x532/0xe60 [ 306.901815] ? ext4_init_dot_dotdot+0x510/0x510 [ 306.906518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.912073] ? security_inode_permission+0xd2/0x100 [ 306.917102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.922660] ? security_inode_mkdir+0xe8/0x120 [ 306.927259] vfs_mkdir+0x42e/0x6b0 [ 306.930812] do_mkdirat+0x27b/0x310 [ 306.934458] ? __ia32_sys_mknod+0xb0/0xb0 [ 306.938617] ? ksys_ioctl+0x81/0xd0 [ 306.942259] __x64_sys_mkdir+0x5c/0x80 [ 306.946155] do_syscall_64+0x1b9/0x820 [ 306.950069] ? finish_task_switch+0x1d3/0x870 [ 306.954572] ? syscall_return_slowpath+0x5e0/0x5e0 [ 306.959525] ? syscall_return_slowpath+0x31d/0x5e0 [ 306.964473] ? __switch_to_asm+0x34/0x70 [ 306.968548] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 306.973938] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 306.978858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.984057] RIP: 0033:0x4564c7 [ 306.987260] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.006196] RSP: 002b:00007f43a941ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 307.013914] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 00000000004564c7 [ 307.021201] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 307.028487] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 307.035782] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 307.043083] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000019 [ 307.055570] hfs: type requires a 4 character value [ 307.060591] hfs: unable to parse mount options [ 307.079040] hfs: type requires a 4 character value [ 307.084093] hfs: unable to parse mount options 22:50:39 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) r1 = semget$private(0x0, 0x2, 0x100) semtimedop(r1, &(0x7f0000000080)=[{0x1, 0xff}], 0x1, &(0x7f00000001c0)) read(r0, &(0x7f0000000040)=""/28, 0x1c) r2 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x10b, 0x0) 22:50:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x101000, 0x1c0) r6 = dup2(r2, r4) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f00000000c0)={0xf000, 0x108000}) dup2(r4, r3) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r8 = getegid() write$P9_RGETATTR(r5, &(0x7f0000000200)={0xa0, 0x19, 0x2, {0x2000, {0x1, 0x3, 0x7}, 0x20, r7, r8, 0x1, 0x4, 0xd709, 0xffffffffffff97ed, 0x1000, 0x101, 0x401, 0x8, 0x8, 0x4, 0x100, 0x0, 0x8, 0xf865, 0xfffffffffffffff8}}, 0xa0) 22:50:39 executing program 3 (fault-call:2 fault-nth:26): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x80000) semtimedop(r1, &(0x7f0000000240)=[{0x3, 0x1200000000000000, 0x800}, {0x7, 0x80000000, 0x1000}, {0x0, 0x8, 0x1800}, {0x4, 0xaa4c, 0x800}, {0x1, 0x1023, 0x1000}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x101802, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000180)=r3) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x5) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) [ 307.226195] FAULT_INJECTION: forcing a failure. [ 307.226195] name failslab, interval 1, probability 0, space 0, times 0 [ 307.237529] CPU: 0 PID: 17565 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 307.244580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.253961] Call Trace: [ 307.256579] dump_stack+0x1c9/0x2b4 [ 307.260242] ? dump_stack_print_info.cold.2+0x52/0x52 [ 307.265456] ? rcu_note_context_switch+0x730/0x730 [ 307.270407] should_fail.cold.4+0xa/0x11 22:50:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x118, 0x0) 22:50:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000340", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 307.274505] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 307.279632] ? trace_hardirqs_on+0x10/0x10 [ 307.283888] ? __find_get_block+0xe60/0xe60 [ 307.288267] ? graph_lock+0x170/0x170 [ 307.292086] ? __lock_is_held+0xb5/0x140 [ 307.296190] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 307.300894] ? __lock_is_held+0xb5/0x140 [ 307.305005] ? check_same_owner+0x340/0x340 [ 307.309351] ? rcu_note_context_switch+0x730/0x730 [ 307.314309] __should_failslab+0x124/0x180 [ 307.318572] should_failslab+0x9/0x14 [ 307.322402] kmem_cache_alloc+0x2af/0x760 [ 307.326566] jbd2__journal_start+0x1e7/0xa80 [ 307.330991] ? jbd2_write_access_granted.part.9+0x430/0x430 [ 307.336706] ? rcu_note_context_switch+0x730/0x730 [ 307.341654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.347205] __ext4_journal_start_sb+0x182/0x600 [ 307.351971] ? __ext4_new_inode+0x386e/0x6600 [ 307.356475] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 307.362201] ? find_next_zero_bit+0x111/0x140 [ 307.366704] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 307.371729] ? find_inode_bit.isra.17+0x36f/0x510 [ 307.376596] __ext4_new_inode+0x386e/0x6600 [ 307.380970] ? ext4_free_inode+0x1aa0/0x1aa0 [ 307.385389] ? find_held_lock+0x36/0x1c0 [ 307.389481] ? lock_downgrade+0x8f0/0x8f0 [ 307.393641] ? kasan_check_read+0x11/0x20 [ 307.397795] ? rcu_is_watching+0x8c/0x150 [ 307.401963] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 307.406641] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 307.411321] ? is_bpf_text_address+0xd7/0x170 [ 307.415821] ? kernel_text_address+0x79/0xf0 [ 307.420235] ? __kernel_text_address+0xd/0x40 [ 307.424730] ? unwind_get_return_address+0x61/0xa0 [ 307.429666] ? __save_stack_trace+0x8d/0xf0 [ 307.434000] ? save_stack+0xa9/0xd0 [ 307.437641] ? save_stack+0x43/0xd0 [ 307.441263] ? __kasan_slab_free+0x11a/0x170 [ 307.445669] ? kasan_slab_free+0xe/0x10 [ 307.449638] ? kmem_cache_free+0x86/0x2d0 [ 307.453787] ? putname+0xf2/0x130 [ 307.457242] ? filename_create+0x2b2/0x5b0 [ 307.461475] ? do_mkdirat+0xda/0x310 [ 307.465200] ? __x64_sys_mkdir+0x5c/0x80 [ 307.469279] ? do_syscall_64+0x1b9/0x820 [ 307.473341] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.478707] ? kasan_check_read+0x11/0x20 [ 307.482856] ? do_raw_spin_unlock+0xa7/0x2f0 [ 307.487265] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 307.491851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.497388] ? __dquot_initialize+0x61d/0xde0 [ 307.501889] ? graph_lock+0x170/0x170 [ 307.505703] ? trace_hardirqs_off+0xd/0x10 [ 307.509954] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 307.515059] ? dquot_get_next_dqblk+0x180/0x180 [ 307.520188] ? debug_check_no_obj_freed+0x30b/0x595 [ 307.525214] ? kasan_check_write+0x14/0x20 [ 307.529459] ? __lock_is_held+0xb5/0x140 [ 307.533529] ext4_mkdir+0x2e1/0xe60 [ 307.537169] ? ext4_init_dot_dotdot+0x510/0x510 [ 307.541846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.547390] ? security_inode_permission+0xd2/0x100 [ 307.552428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.557969] ? security_inode_mkdir+0xe8/0x120 [ 307.562553] vfs_mkdir+0x42e/0x6b0 [ 307.566109] do_mkdirat+0x27b/0x310 [ 307.569741] ? __ia32_sys_mknod+0xb0/0xb0 [ 307.573895] ? ksys_ioctl+0x81/0xd0 [ 307.577538] __x64_sys_mkdir+0x5c/0x80 [ 307.581441] do_syscall_64+0x1b9/0x820 [ 307.585342] ? finish_task_switch+0x1d3/0x870 [ 307.589865] ? syscall_return_slowpath+0x5e0/0x5e0 [ 307.594809] ? syscall_return_slowpath+0x31d/0x5e0 [ 307.599760] ? __switch_to_asm+0x34/0x70 [ 307.603828] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 307.609199] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.614047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.619235] RIP: 0033:0x4564c7 [ 307.622431] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.641332] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 307.649043] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 00000000004564c7 [ 307.656311] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 307.663577] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 307.670843] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 22:50:39 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) fcntl$addseals(r0, 0x409, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:50:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xdf, 0x0) [ 307.678121] R13: 0000000000000000 R14: 00000000004c9c3c R15: 000000000000001a [ 307.685537] EXT4-fs error (device sda1) in __ext4_new_inode:933: Out of memory 22:50:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000004000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x16f, 0x0) [ 307.745161] hfs: type requires a 4 character value [ 307.750246] hfs: unable to parse mount options [ 307.769668] hfs: type requires a 4 character value [ 307.774709] hfs: unable to parse mount options 22:50:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f00000000c0)=0x9) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f0000000100)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) 22:50:39 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0), 0x10) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) 22:50:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfsH', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:39 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f00000001c0)={0x14, 0x11, 0x2, {0x49, 0x1, 0x2}}, 0x14) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x84800) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000200), 0x4) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:39 executing program 3 (fault-call:2 fault-nth:27): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000400300000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x134, 0x0) 22:50:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000000c0)=[{0x3, 0xfffffffffffffffc, 0x1000}, {0x4, 0xd3, 0x800}, {0x6, 0x4, 0x800}, {0x4, 0xff, 0x800}], 0x2aaaaaaaaaaaac2a) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000240)={{0x1, 0x20}, {0x4bc26e77, 0xfffffffffffffeff}, 0xffffffffffffc6c2, 0x0, 0x8}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x191000, 0x0) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000180)={0x1, 0x0, [{0xc0011bff, 0x0, 0x200}]}) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) inotify_init() r6 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7, 0x40000) ioctl$VT_RELDISP(r6, 0x5605) 22:50:39 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x101101, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) pread64(r3, &(0x7f0000000100)=""/116, 0x74, 0x0) 22:50:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r1, &(0x7f00000001c0)="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", &(0x7f0000000340)=""/196}, 0x18) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) [ 308.098361] hfs: type requires a 4 character value [ 308.103468] hfs: unable to parse mount options [ 308.113328] FAULT_INJECTION: forcing a failure. [ 308.113328] name failslab, interval 1, probability 0, space 0, times 0 [ 308.124715] CPU: 1 PID: 17621 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 308.131748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.141113] Call Trace: [ 308.143715] dump_stack+0x1c9/0x2b4 [ 308.147365] ? dump_stack_print_info.cold.2+0x52/0x52 [ 308.152570] should_fail.cold.4+0xa/0x11 [ 308.156644] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 308.161762] ? trace_hardirqs_on+0x10/0x10 [ 308.166012] ? find_held_lock+0x36/0x1c0 [ 308.170088] ? lock_downgrade+0x8f0/0x8f0 [ 308.174244] ? kasan_check_read+0x11/0x20 [ 308.178443] ? rcu_is_watching+0x8c/0x150 [ 308.182597] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 308.187273] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 308.191962] ? graph_lock+0x170/0x170 [ 308.195774] ? kernel_text_address+0x79/0xf0 [ 308.200198] __should_failslab+0x124/0x180 [ 308.204457] should_failslab+0x9/0x14 [ 308.208264] kmem_cache_alloc+0x47/0x760 [ 308.212327] ? find_held_lock+0x36/0x1c0 [ 308.216402] ? __es_tree_search.isra.13+0x1ba/0x220 [ 308.221442] __es_insert_extent+0x305/0x1140 [ 308.225861] ? ext4_es_insert_extent+0x21c/0x7e0 [ 308.230625] ? ext4_es_free_extent+0x820/0x820 [ 308.235211] ? lock_release+0xa30/0xa30 [ 308.239195] ? __lock_is_held+0xb5/0x140 [ 308.243264] ? kasan_check_write+0x14/0x20 [ 308.247505] ? do_raw_write_lock+0xbd/0x1b0 [ 308.251838] ext4_es_insert_extent+0x2ea/0x7e0 [ 308.256440] ? ext4_es_find_delayed_extent_range+0xd80/0xd80 [ 308.262724] ? __lock_is_held+0xb5/0x140 [ 308.266804] ? rcu_read_lock_sched_held+0x108/0x120 [ 308.271827] ? __kmalloc+0x5f9/0x760 [ 308.275566] ext4_ext_put_gap_in_cache+0x158/0x1f0 [ 308.280514] ? ext4_zeroout_es+0x160/0x160 [ 308.284766] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 308.290350] ext4_ext_map_blocks+0x2453/0x62e0 [ 308.294955] ? unregister_lsm_notifier+0x20/0x20 [ 308.299720] ? graph_lock+0x170/0x170 [ 308.303535] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 308.308566] ? block_commit_write+0x30/0x30 [ 308.312932] ? find_held_lock+0x36/0x1c0 [ 308.317015] ? graph_lock+0x170/0x170 [ 308.320819] ? graph_lock+0x170/0x170 [ 308.324630] ? lock_downgrade+0x8f0/0x8f0 [ 308.328825] ? lock_acquire+0x1e4/0x540 [ 308.332807] ? ext4_map_blocks+0x480/0x1b60 [ 308.337135] ? lock_release+0xa30/0xa30 [ 308.341115] ? check_same_owner+0x340/0x340 [ 308.345451] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.350992] ? ext4_es_lookup_extent+0x465/0xde0 [ 308.355753] ? rcu_note_context_switch+0x730/0x730 [ 308.360701] ? down_read+0xb5/0x1d0 [ 308.364348] ? ext4_map_blocks+0x480/0x1b60 [ 308.368686] ? __down_interruptible+0x700/0x700 [ 308.373540] ? kernel_text_address+0x79/0xf0 [ 308.377960] ext4_map_blocks+0xe31/0x1b60 [ 308.382117] ? __save_stack_trace+0x8d/0xf0 [ 308.386455] ? ext4_issue_zeroout+0x190/0x190 [ 308.390977] ? save_stack+0x43/0xd0 [ 308.394607] ? __kasan_slab_free+0x11a/0x170 [ 308.399019] ? kasan_slab_free+0xe/0x10 [ 308.402991] ? kmem_cache_free+0x86/0x2d0 [ 308.407165] ext4_getblk+0x10e/0x630 [ 308.410885] ? ext4_iomap_begin+0x1350/0x1350 [ 308.415392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.420953] ? __dquot_initialize+0x61d/0xde0 [ 308.425460] ext4_bread+0x95/0x2b0 [ 308.429007] ? ext4_getblk+0x630/0x630 [ 308.432914] ? dquot_get_next_dqblk+0x180/0x180 [ 308.437602] ? debug_check_no_obj_freed+0x30b/0x595 [ 308.442617] ? kasan_check_write+0x14/0x20 [ 308.446865] ext4_append+0x14e/0x370 [ 308.450594] ext4_mkdir+0x532/0xe60 [ 308.454246] ? ext4_init_dot_dotdot+0x510/0x510 [ 308.458941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.464485] ? security_inode_permission+0xd2/0x100 [ 308.469506] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.475045] ? security_inode_mkdir+0xe8/0x120 [ 308.479650] vfs_mkdir+0x42e/0x6b0 [ 308.483200] do_mkdirat+0x27b/0x310 [ 308.486875] ? __ia32_sys_mknod+0xb0/0xb0 [ 308.491050] ? ksys_ioctl+0x81/0xd0 [ 308.494694] __x64_sys_mkdir+0x5c/0x80 [ 308.498586] do_syscall_64+0x1b9/0x820 [ 308.502500] ? finish_task_switch+0x1d3/0x870 [ 308.507004] ? syscall_return_slowpath+0x5e0/0x5e0 [ 308.511961] ? syscall_return_slowpath+0x31d/0x5e0 [ 308.516936] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 308.522320] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.527187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.532374] RIP: 0033:0x4564c7 22:50:40 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000002000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:40 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x28, 0x0) [ 308.535573] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.554471] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 308.562181] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 00000000004564c7 [ 308.569563] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 308.576847] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 308.584144] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 308.591414] R13: 0000000000000000 R14: 00000000004c9c3c R15: 000000000000001b [ 308.626928] hfs: type requires a 4 character value [ 308.626958] hfs: type requires a 4 character value [ 308.631985] hfs: unable to parse mount options [ 308.636875] hfs: unable to parse mount options 22:50:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:40 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xaa, 0x0) 22:50:40 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000004", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:40 executing program 3 (fault-call:2 fault-nth:28): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:40 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f00000000c0)}) dup2(r4, r3) 22:50:40 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) socket$inet6(0xa, 0x1, 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) [ 308.821547] FAULT_INJECTION: forcing a failure. [ 308.821547] name failslab, interval 1, probability 0, space 0, times 0 [ 308.833242] CPU: 0 PID: 17664 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 308.840273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.849634] Call Trace: [ 308.852239] dump_stack+0x1c9/0x2b4 [ 308.855894] ? dump_stack_print_info.cold.2+0x52/0x52 [ 308.861141] should_fail.cold.4+0xa/0x11 [ 308.865233] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 308.870347] ? kasan_check_write+0x14/0x20 [ 308.874583] ? __brelse+0x104/0x180 [ 308.878216] ? graph_lock+0x170/0x170 [ 308.882023] ? __find_get_block+0xa37/0xe60 [ 308.886353] ? graph_lock+0x170/0x170 [ 308.890176] ? __find_get_block+0x36d/0xe60 [ 308.894505] ? __lock_is_held+0xb5/0x140 [ 308.898573] ? __lock_is_held+0xb5/0x140 [ 308.902658] ? check_same_owner+0x340/0x340 [ 308.906987] ? check_same_owner+0x340/0x340 [ 308.911317] ? rcu_note_context_switch+0x730/0x730 [ 308.916276] __should_failslab+0x124/0x180 [ 308.920520] should_failslab+0x9/0x14 [ 308.924345] kmem_cache_alloc+0x2af/0x760 [ 308.928514] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 308.933546] jbd2_journal_add_journal_head+0x1ef/0x5d0 [ 308.938860] ? jbd2_journal_write_metadata_buffer+0xf00/0xf00 [ 308.944760] jbd2_journal_get_create_access+0x42/0x600 [ 308.950058] ? rcu_note_context_switch+0x730/0x730 [ 308.955002] __ext4_journal_get_create_access+0x46/0x90 [ 308.960376] ext4_getblk+0x2be/0x630 [ 308.964113] ? ext4_iomap_begin+0x1350/0x1350 [ 308.968619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.974161] ? __dquot_initialize+0x61d/0xde0 [ 308.978681] ext4_bread+0x95/0x2b0 [ 308.982230] ? ext4_getblk+0x630/0x630 [ 308.986129] ? dquot_get_next_dqblk+0x180/0x180 [ 308.990804] ? debug_check_no_obj_freed+0x30b/0x595 [ 308.995824] ? kasan_check_write+0x14/0x20 [ 309.000091] ext4_append+0x14e/0x370 [ 309.003818] ext4_mkdir+0x532/0xe60 [ 309.007459] ? ext4_init_dot_dotdot+0x510/0x510 [ 309.012139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.017676] ? security_inode_permission+0xd2/0x100 [ 309.022711] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.028292] ? security_inode_mkdir+0xe8/0x120 [ 309.032876] vfs_mkdir+0x42e/0x6b0 [ 309.036420] do_mkdirat+0x27b/0x310 [ 309.040052] ? __ia32_sys_mknod+0xb0/0xb0 [ 309.044214] ? ksys_ioctl+0x81/0xd0 [ 309.047861] __x64_sys_mkdir+0x5c/0x80 [ 309.051762] do_syscall_64+0x1b9/0x820 [ 309.055663] ? finish_task_switch+0x1d3/0x870 [ 309.060173] ? syscall_return_slowpath+0x5e0/0x5e0 [ 309.065110] ? syscall_return_slowpath+0x31d/0x5e0 [ 309.070047] ? __switch_to_asm+0x34/0x70 [ 309.074109] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 309.079481] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.084346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.089547] RIP: 0033:0x4564c7 [ 309.092742] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.111645] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 309.119357] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 00000000004564c7 [ 309.126641] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 309.133908] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 309.141210] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 309.148476] R13: 0000000000000000 R14: 00000000004c9c3c R15: 000000000000001c [ 309.156781] ENOMEM in journal_alloc_journal_head, retrying. [ 309.164216] hfs: type requires a 4 character value [ 309.169234] hfs: unable to parse mount options [ 309.175669] hfs: type requires a 4 character value [ 309.180721] hfs: unable to parse mount options [ 309.212971] hfs: type requires a 4 character value [ 309.218051] hfs: unable to parse mount options 22:50:41 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 22:50:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f00000000c0)="de4f000f0866b9430800000f322ef40f350f01d70f00d4670f0e66b9f708000066b8b100000066ba000000000f308285040004", 0x33}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r0, r0) 22:50:41 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000020000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:41 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x173, 0x0) 22:50:41 executing program 3 (fault-call:2 fault-nth:29): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:41 executing program 6: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) [ 309.535251] FAULT_INJECTION: forcing a failure. [ 309.535251] name failslab, interval 1, probability 0, space 0, times 0 [ 309.540517] hfs: type requires a 4 character value [ 309.547050] CPU: 1 PID: 17691 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 309.551937] hfs: unable to parse mount options [ 309.558905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.558912] Call Trace: [ 309.558946] dump_stack+0x1c9/0x2b4 [ 309.558982] ? dump_stack_print_info.cold.2+0x52/0x52 [ 309.559009] ? graph_lock+0x170/0x170 [ 309.588216] should_fail.cold.4+0xa/0x11 [ 309.592295] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 309.597420] ? __lock_is_held+0xb5/0x140 [ 309.601514] ? graph_lock+0x170/0x170 [ 309.605327] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 309.610891] ? __mark_inode_dirty+0x495/0x1550 [ 309.615503] ? __inode_attach_wb+0x13d0/0x13d0 [ 309.620099] ? kasan_check_read+0x11/0x20 [ 309.624255] ? __lock_is_held+0xb5/0x140 [ 309.628355] ? check_same_owner+0x340/0x340 [ 309.632682] ? __dquot_alloc_space+0x4b6/0x8c0 [ 309.637270] ? rcu_note_context_switch+0x730/0x730 [ 309.642206] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 309.647320] __should_failslab+0x124/0x180 [ 309.651561] should_failslab+0x9/0x14 [ 309.655364] kmem_cache_alloc+0x2af/0x760 [ 309.659516] ? percpu_counter_add_batch+0xf2/0x150 [ 309.664466] ext4_mb_new_blocks+0x774/0x4740 [ 309.668883] ? find_held_lock+0x36/0x1c0 [ 309.672975] ? ext4_discard_preallocations+0x13d0/0x13d0 [ 309.678451] ? kasan_check_read+0x11/0x20 [ 309.682620] ? rcu_is_watching+0x8c/0x150 [ 309.686774] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 309.691470] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 309.696161] ? is_bpf_text_address+0xd7/0x170 [ 309.700657] ? kernel_text_address+0x79/0xf0 [ 309.705070] ? __kernel_text_address+0xd/0x40 [ 309.709661] ? unwind_get_return_address+0x61/0xa0 [ 309.714598] ? __save_stack_trace+0x8d/0xf0 [ 309.718945] ? save_stack+0xa9/0xd0 [ 309.722581] ? save_stack+0x43/0xd0 [ 309.726228] ? kasan_kmalloc+0xc4/0xe0 [ 309.730121] ? __kmalloc+0x14e/0x760 [ 309.733841] ? ext4_find_extent+0x775/0xa10 [ 309.738172] ? ext4_ext_map_blocks+0x293/0x62e0 [ 309.742847] ? ext4_map_blocks+0x8f3/0x1b60 [ 309.747186] ? ext4_getblk+0x10e/0x630 [ 309.751079] ? ext4_bread+0x95/0x2b0 [ 309.754800] ? ext4_append+0x14e/0x370 [ 309.758702] ? ext4_mkdir+0x532/0xe60 [ 309.762506] ? vfs_mkdir+0x42e/0x6b0 [ 309.766225] ? do_mkdirat+0x27b/0x310 [ 309.770028] ? __x64_sys_mkdir+0x5c/0x80 [ 309.774094] ? do_syscall_64+0x1b9/0x820 [ 309.778159] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.783557] ? save_stack+0xa9/0xd0 [ 309.787210] ? print_usage_bug+0xc0/0xc0 [ 309.791281] ? graph_lock+0x170/0x170 [ 309.795082] ? __lock_is_held+0xb5/0x140 [ 309.799145] ? ext4_bread+0x95/0x2b0 [ 309.802867] ? kasan_check_read+0x11/0x20 [ 309.807026] ? __lock_is_held+0xb5/0x140 [ 309.811103] ? rcu_read_lock_sched_held+0x108/0x120 [ 309.816121] ? __kmalloc+0x5f9/0x760 [ 309.819857] ? ext4_find_extent+0x775/0xa10 [ 309.824189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.829737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.835295] ? ext4_inode_to_goal_block+0x2e3/0x3f0 [ 309.840408] ext4_ext_map_blocks+0x2dc0/0x62e0 [ 309.845012] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 309.850035] ? block_commit_write+0x30/0x30 [ 309.854364] ? find_held_lock+0x36/0x1c0 [ 309.858437] ? graph_lock+0x170/0x170 [ 309.862245] ? graph_lock+0x170/0x170 [ 309.866056] ? graph_lock+0x170/0x170 [ 309.869860] ? lock_downgrade+0x8f0/0x8f0 [ 309.874072] ? lock_acquire+0x1e4/0x540 [ 309.878053] ? ext4_map_blocks+0x88b/0x1b60 [ 309.882381] ? lock_release+0xa30/0xa30 [ 309.886359] ? check_same_owner+0x340/0x340 [ 309.890686] ? rcu_note_context_switch+0x730/0x730 [ 309.895627] ? down_write+0x8f/0x130 [ 309.899346] ? ext4_map_blocks+0x88b/0x1b60 [ 309.903672] ? down_read+0x1d0/0x1d0 [ 309.907401] ext4_map_blocks+0x8f3/0x1b60 [ 309.911581] ? __save_stack_trace+0x8d/0xf0 [ 309.915953] ? ext4_issue_zeroout+0x190/0x190 [ 309.920462] ? save_stack+0x43/0xd0 [ 309.924092] ? __kasan_slab_free+0x11a/0x170 [ 309.928519] ? kasan_slab_free+0xe/0x10 [ 309.932499] ? kmem_cache_free+0x86/0x2d0 [ 309.936652] ext4_getblk+0x10e/0x630 [ 309.940376] ? ext4_iomap_begin+0x1350/0x1350 [ 309.944880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.950420] ? __dquot_initialize+0x61d/0xde0 [ 309.954937] ext4_bread+0x95/0x2b0 [ 309.958502] ? ext4_getblk+0x630/0x630 [ 309.962393] ? dquot_get_next_dqblk+0x180/0x180 [ 309.967098] ? debug_check_no_obj_freed+0x30b/0x595 [ 309.972115] ? kasan_check_write+0x14/0x20 [ 309.976363] ext4_append+0x14e/0x370 [ 309.980088] ext4_mkdir+0x532/0xe60 [ 309.983729] ? ext4_init_dot_dotdot+0x510/0x510 [ 309.988422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.993995] ? security_inode_permission+0xd2/0x100 [ 309.999020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.004560] ? security_inode_mkdir+0xe8/0x120 [ 310.009148] vfs_mkdir+0x42e/0x6b0 [ 310.012695] do_mkdirat+0x27b/0x310 [ 310.016351] ? __ia32_sys_mknod+0xb0/0xb0 [ 310.020509] ? syscall_slow_exit_work+0x500/0x500 [ 310.025359] ? ksys_ioctl+0x81/0xd0 [ 310.028994] __x64_sys_mkdir+0x5c/0x80 [ 310.032888] do_syscall_64+0x1b9/0x820 [ 310.036791] ? finish_task_switch+0x1d3/0x870 [ 310.041297] ? syscall_return_slowpath+0x5e0/0x5e0 [ 310.046236] ? syscall_return_slowpath+0x31d/0x5e0 [ 310.051177] ? __switch_to_asm+0x34/0x70 [ 310.055242] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 310.060614] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.065484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.070672] RIP: 0033:0x4564c7 22:50:41 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:41 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x18, 0x0) [ 310.073868] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.092775] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 310.100491] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 00000000004564c7 [ 310.108000] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 310.115272] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 310.122542] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 310.129808] R13: 0000000000000000 R14: 00000000004c9c3c R15: 000000000000001d 22:50:42 executing program 3 (fault-call:2 fault-nth:30): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:42 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x40000000008912, &(0x7f00000001c0)="0a9bcb9478a61a6ca65ce12900315fe3") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text32={0x20, &(0x7f00000000c0)="0f205d640f01d166ba410066b80c0066ef66b871000f00d0260f0132b8dabc00000f23d80f21f835800000000f23f80faf6dc6c4c3e90c2c020c0f00590066b8c0000f00d8", 0x45}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x2) dup2(r2, r0) 22:50:42 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x80000001, &(0x7f0000000000)='p') accept(r0, &(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000300)=0x80) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10400011}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x3c, r2, 0x0, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x1) r3 = semget$private(0x0, 0x7, 0x0) semtimedop(r3, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) get_mempolicy(&(0x7f00000004c0), &(0x7f0000000500), 0x5, &(0x7f0000ffc000/0x4000)=nil, 0x1) semctl$GETNCNT(r3, 0x3, 0xe, &(0x7f0000000040)=""/26) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x10800, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x2, 0x8, [0x6, 0x185, 0x5, 0x7f, 0x0, 0x9, 0x800, 0x1f]}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000240)={r5, 0x9, 0xffffffffffffb728}, 0x8) fchmodat(r4, &(0x7f0000000540)='./file0\x00', 0x6) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) ftruncate(r0, 0xfffffffffffffffe) semtimedop(r3, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 310.273602] FAULT_INJECTION: forcing a failure. [ 310.273602] name failslab, interval 1, probability 0, space 0, times 0 [ 310.285062] CPU: 1 PID: 17714 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 310.292092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.301454] Call Trace: [ 310.304053] dump_stack+0x1c9/0x2b4 [ 310.307694] ? dump_stack_print_info.cold.2+0x52/0x52 [ 310.312892] ? graph_lock+0x170/0x170 [ 310.316709] ? lock_downgrade+0x8f0/0x8f0 [ 310.320882] should_fail.cold.4+0xa/0x11 [ 310.324963] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 310.330076] ? find_held_lock+0x36/0x1c0 [ 310.334153] ? lock_downgrade+0x8f0/0x8f0 [ 310.338326] ? find_held_lock+0x36/0x1c0 [ 310.342412] ? check_same_owner+0x340/0x340 [ 310.346752] ? rcu_note_context_switch+0x730/0x730 [ 310.351699] ? dput.part.26+0x276/0x7a0 [ 310.355683] __should_failslab+0x124/0x180 [ 310.359956] should_failslab+0x9/0x14 [ 310.363789] __kmalloc_track_caller+0x2c4/0x760 [ 310.368472] ? strncpy_from_user+0x510/0x510 [ 310.372885] ? strndup_user+0x77/0xd0 [ 310.376752] memdup_user+0x2c/0xa0 [ 310.380308] strndup_user+0x77/0xd0 [ 310.383954] ksys_mount+0x3c/0x140 [ 310.387505] __x64_sys_mount+0xbe/0x150 [ 310.391484] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 310.396511] do_syscall_64+0x1b9/0x820 [ 310.400407] ? finish_task_switch+0x1d3/0x870 [ 310.404952] ? syscall_return_slowpath+0x5e0/0x5e0 [ 310.409893] ? syscall_return_slowpath+0x31d/0x5e0 [ 310.414857] ? __switch_to_asm+0x34/0x70 [ 310.418932] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 310.424313] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.429199] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.434392] RIP: 0033:0x459aba [ 310.437593] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 310.456523] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 310.464235] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba [ 310.471531] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 [ 310.478801] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 [ 310.486070] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 310.493340] R13: 0000000000000000 R14: 00000000004c9c3c R15: 000000000000001e [ 310.519967] hfs: type requires a 4 character value 22:50:42 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x19f, 0x0) 22:50:42 executing program 3 (fault-call:2 fault-nth:31): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 310.525043] hfs: unable to parse mount options 22:50:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 310.630581] FAULT_INJECTION: forcing a failure. [ 310.630581] name failslab, interval 1, probability 0, space 0, times 0 [ 310.642008] CPU: 1 PID: 17729 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 310.649036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.658396] Call Trace: [ 310.661018] dump_stack+0x1c9/0x2b4 [ 310.664678] ? dump_stack_print_info.cold.2+0x52/0x52 [ 310.669908] ? ext4_getblk+0x10e/0x630 [ 310.673822] ? ext4_bread+0x95/0x2b0 [ 310.677556] ? ext4_append+0x14e/0x370 [ 310.681460] ? ext4_mkdir+0x532/0xe60 [ 310.685290] should_fail.cold.4+0xa/0x11 [ 310.689386] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 310.694500] ? kasan_check_write+0x14/0x20 [ 310.698783] ? trace_hardirqs_on+0x10/0x10 [ 310.703093] ? debug_check_no_obj_freed+0x30b/0x595 [ 310.708140] ? __lock_is_held+0xb5/0x140 [ 310.712237] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.715129] hfs: type requires a 4 character value [ 310.717789] ? ext4_ext_map_blocks+0xfb2/0x62e0 [ 310.717903] __should_failslab+0x124/0x180 [ 310.722843] hfs: unable to parse mount options [ 310.727486] should_failslab+0x9/0x14 [ 310.727500] kmem_cache_alloc+0x47/0x760 [ 310.727519] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 310.727535] ? ext4_es_can_be_merged+0x238/0x2a0 [ 310.727555] __es_insert_extent+0x305/0x1140 [ 310.758392] ? ext4_es_free_extent+0x820/0x820 [ 310.762992] ? lock_release+0xa30/0xa30 [ 310.766995] ? __lock_is_held+0xb5/0x140 [ 310.771075] ? kasan_check_write+0x14/0x20 [ 310.775326] ? do_raw_write_lock+0xbd/0x1b0 [ 310.779667] ext4_es_insert_extent+0x2ea/0x7e0 [ 310.784261] ? lock_release+0xa30/0xa30 [ 310.788258] ? ext4_es_find_delayed_extent_range+0xd80/0xd80 [ 310.794076] ? rcu_note_context_switch+0x730/0x730 [ 310.799041] ? down_write+0x8f/0x130 [ 310.802792] ? ext4_map_blocks+0x88b/0x1b60 [ 310.807126] ? down_read+0x1d0/0x1d0 [ 310.810879] ext4_map_blocks+0xb08/0x1b60 [ 310.815048] ? __save_stack_trace+0x8d/0xf0 [ 310.819392] ? ext4_issue_zeroout+0x190/0x190 [ 310.823911] ? save_stack+0x43/0xd0 [ 310.827567] ? __kasan_slab_free+0x11a/0x170 [ 310.831987] ? kasan_slab_free+0xe/0x10 [ 310.835984] ? kmem_cache_free+0x86/0x2d0 [ 310.840152] ext4_getblk+0x10e/0x630 [ 310.843899] ? ext4_iomap_begin+0x1350/0x1350 [ 310.848427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.853999] ? __dquot_initialize+0x61d/0xde0 [ 310.858505] ext4_bread+0x95/0x2b0 [ 310.862073] ? ext4_getblk+0x630/0x630 [ 310.865979] ? dquot_get_next_dqblk+0x180/0x180 [ 310.870659] ? debug_check_no_obj_freed+0x30b/0x595 [ 310.875688] ? kasan_check_write+0x14/0x20 [ 310.879954] ext4_append+0x14e/0x370 [ 310.883694] ext4_mkdir+0x532/0xe60 [ 310.887369] ? ext4_init_dot_dotdot+0x510/0x510 [ 310.892057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.897631] ? security_inode_permission+0xd2/0x100 [ 310.902662] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.908226] ? security_inode_mkdir+0xe8/0x120 [ 310.912822] vfs_mkdir+0x42e/0x6b0 [ 310.916383] do_mkdirat+0x27b/0x310 [ 310.920032] ? __ia32_sys_mknod+0xb0/0xb0 [ 310.924199] ? ksys_ioctl+0x81/0xd0 [ 310.927843] __x64_sys_mkdir+0x5c/0x80 [ 310.931748] do_syscall_64+0x1b9/0x820 [ 310.935650] ? syscall_slow_exit_work+0x500/0x500 [ 310.940510] ? syscall_return_slowpath+0x5e0/0x5e0 [ 310.945463] ? syscall_return_slowpath+0x31d/0x5e0 [ 310.950418] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 310.955807] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.960671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.965865] RIP: 0033:0x4564c7 [ 310.969061] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.987964] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 310.995677] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 00000000004564c7 [ 311.002957] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 311.010226] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 311.017513] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 311.024792] R13: 0000000000000000 R14: 00000000004c9c3c R15: 000000000000001f 22:50:42 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) r2 = socket(0x2, 0x3, 0x401) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000080), 0x4) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) pwrite64(r0, &(0x7f0000000340)="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", 0xfd, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000020000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:42 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x19a, 0x0) 22:50:42 executing program 3 (fault-call:2 fault-nth:32): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 311.034834] hfs: type requires a 4 character value [ 311.039839] hfs: unable to parse mount options [ 311.059201] hfs: type requires a 4 character value [ 311.064213] hfs: unable to parse mount options 22:50:43 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000340000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 311.144673] FAULT_INJECTION: forcing a failure. [ 311.144673] name failslab, interval 1, probability 0, space 0, times 0 [ 311.156513] CPU: 0 PID: 17749 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 311.163562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.172941] Call Trace: [ 311.175543] dump_stack+0x1c9/0x2b4 [ 311.179193] ? dump_stack_print_info.cold.2+0x52/0x52 [ 311.184416] should_fail.cold.4+0xa/0x11 [ 311.188501] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 311.193618] ? kasan_check_write+0x14/0x20 [ 311.197865] ? __brelse+0x104/0x180 [ 311.201502] ? graph_lock+0x170/0x170 [ 311.205305] ? __find_get_block+0xa37/0xe60 [ 311.209633] ? graph_lock+0x170/0x170 [ 311.213460] ? __find_get_block+0x36d/0xe60 [ 311.217792] ? __lock_is_held+0xb5/0x140 [ 311.221898] ? __lock_is_held+0xb5/0x140 [ 311.226004] ? check_same_owner+0x340/0x340 [ 311.230353] ? check_same_owner+0x340/0x340 [ 311.234693] ? rcu_note_context_switch+0x730/0x730 [ 311.239638] __should_failslab+0x124/0x180 [ 311.243881] should_failslab+0x9/0x14 [ 311.247721] kmem_cache_alloc+0x2af/0x760 [ 311.251900] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 311.256967] jbd2_journal_add_journal_head+0x1ef/0x5d0 [ 311.262257] ? jbd2_journal_write_metadata_buffer+0xf00/0xf00 [ 311.268170] jbd2_journal_get_create_access+0x42/0x600 [ 311.273454] ? rcu_note_context_switch+0x730/0x730 [ 311.278398] __ext4_journal_get_create_access+0x46/0x90 [ 311.283778] ext4_getblk+0x2be/0x630 [ 311.287507] ? ext4_iomap_begin+0x1350/0x1350 [ 311.292028] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.297571] ? __dquot_initialize+0x61d/0xde0 [ 311.302075] ext4_bread+0x95/0x2b0 [ 311.305625] ? ext4_getblk+0x630/0x630 [ 311.309553] ? dquot_get_next_dqblk+0x180/0x180 [ 311.314250] ? debug_check_no_obj_freed+0x30b/0x595 [ 311.319269] ? kasan_check_write+0x14/0x20 [ 311.323520] ext4_append+0x14e/0x370 [ 311.327249] ext4_mkdir+0x532/0xe60 [ 311.330904] ? ext4_init_dot_dotdot+0x510/0x510 [ 311.335608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.341167] ? security_inode_permission+0xd2/0x100 [ 311.346192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.351732] ? security_inode_mkdir+0xe8/0x120 [ 311.356338] vfs_mkdir+0x42e/0x6b0 [ 311.359908] do_mkdirat+0x27b/0x310 [ 311.363585] ? __ia32_sys_mknod+0xb0/0xb0 [ 311.367740] ? ksys_ioctl+0x81/0xd0 [ 311.371380] __x64_sys_mkdir+0x5c/0x80 [ 311.375273] do_syscall_64+0x1b9/0x820 [ 311.379166] ? finish_task_switch+0x1d3/0x870 [ 311.383665] ? syscall_return_slowpath+0x5e0/0x5e0 [ 311.388601] ? syscall_return_slowpath+0x31d/0x5e0 [ 311.393562] ? __switch_to_asm+0x34/0x70 [ 311.397639] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 311.403016] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.407872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.413060] RIP: 0033:0x4564c7 [ 311.416271] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.435186] RSP: 002b:00007f43a945ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 22:50:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:43 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0xe00000000000) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000002c0)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x58, 0x0, &(0x7f00000001c0)=[@release={0x40046306, 0x1}, @register_looper, @decrefs={0x40046307, 0x1}, @reply={0x40406301, {0x0, 0x0, 0x4, 0x0, 0x11, 0x0, 0x0, 0x40, 0x20, &(0x7f00000000c0)=[@fda={0x66646185, 0x5, 0x0, 0xe}, @fda={0x66646185, 0x6, 0x1, 0xe}], &(0x7f0000000100)=[0x0, 0x28, 0x38, 0x58]}}], 0x65, 0x0, &(0x7f0000000240)="59cc7185a2a95b1fb077bf3cc88daf4a8e113134fba0340a30c9a3c8652778de6ff0e84704a48b7b4a429a46e6c1395cebaaf0fee009567ab144905a69943c8584e37851a7753b388983c4ca249afb5c9513bbdbb80d99aae91a91a8177ef74609d71459aa"}) r5 = dup2(r4, r3) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r5, 0x28, 0x1, &(0x7f0000000340)=0x24000000, 0x8) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000380)={0x2, 0x2, 0x2000}, 0x4) [ 311.442893] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 00000000004564c7 [ 311.450187] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 311.457458] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 311.464723] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 311.471996] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000020 [ 311.479510] ENOMEM in journal_alloc_journal_head, retrying. 22:50:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xc9, 0x0) 22:50:43 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) r3 = fcntl$getown(r2, 0x9) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x2, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_none='cache=none'}, {@nodevmap='nodevmap'}, {@loose='loose'}, {@fscache='fscache'}, {@loose='loose'}, {@msize={'msize', 0x3d, 0x80000001}}, {@cache_loose='cache=loose'}, {@fscache='fscache'}, {@debug={'debug', 0x3d, 0x1000}}]}}) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f00000004c0)={0x400, {0x2, 0x4e23}, {0x2, 0x4e23}, {0x2, 0x4e24, @local}, 0x4, 0xe9bf, 0x5b, 0xfff, 0xffffffffffffffff, &(0x7f0000000240)='veth1_to_bond\x00', 0x2, 0x2ad, 0x73a}) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f00000002c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000380)={{0x9, 0x0, 0x100000000, 0xf39f, '\x00', 0xdf68}, 0x6, 0x20000310, 0x32f9, r3, 0x4, 0x8000, 'syz0\x00', &(0x7f0000000140)=['/dev/sequencer\x00', '^keyringwlan1]vmnet1trustedproc\'vboxnet0+GPL{\x00', 'cpusetppp1*\x00', '/dev/sequencer\x00'], 0x58, [], [0x7fffffff, 0x5, 0x8001, 0x3f]}) 22:50:43 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000004000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 311.543873] hfs: type requires a 4 character value [ 311.548963] hfs: unable to parse mount options [ 311.578459] hfs: type requires a 4 character value [ 311.583478] hfs: unable to parse mount options [ 311.625961] hfs: type requires a 4 character value [ 311.631072] hfs: unable to parse mount options 22:50:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = msgget(0x1, 0x20) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f00000000c0)={&(0x7f000000f000/0x13000)=nil, 0x13000}) msgctl$IPC_RMID(r5, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r2) dup2(r4, r3) 22:50:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x183, 0x0) 22:50:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:43 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000040000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:43 executing program 3 (fault-call:2 fault-nth:33): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1b8, 0x0) 22:50:43 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) [ 311.778585] hfs: type requires a 4 character value [ 311.783664] hfs: unable to parse mount options [ 311.822414] hfs: type requires a 4 character value [ 311.827443] hfs: unable to parse mount options 22:50:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:43 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000004003000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:43 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000000c0)={0x7, 0x7, 0x735, 0xed41, 0x3, 0x401, 0xa739, 0x7, 0x9, 0x4, 0x80000000, 0x4}) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x0, 0x0, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000100), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @remote, @remote, 0x1, 0x1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @mac=@remote, @multicast1, @broadcast, 0xf, 0x1}}}, {{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x4}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) 22:50:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x75, 0x0) [ 311.946625] hfs: type requires a 4 character value [ 311.951678] hfs: unable to parse mount options 22:50:43 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000003", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r1, 0x8914, &(0x7f0000000080)="0a5cc80700315f85715070") sync_file_range(r0, 0x9, 0x3fc0000000, 0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f00000000c0)={0x10000000}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000480)=0xc) setresuid(r5, r6, r7) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x1000000000000057) r8 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x40000, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f00000001c0), &(0x7f0000000140)=0x60) dup2(r2, r4) dup2(r4, r3) 22:50:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x9, 0x0) [ 311.999906] hfs: type requires a 4 character value [ 312.004973] hfs: unable to parse mount options [ 312.220677] FAULT_INJECTION: forcing a failure. [ 312.220677] name failslab, interval 1, probability 0, space 0, times 0 [ 312.232015] CPU: 1 PID: 17828 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 312.239033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.248394] Call Trace: [ 312.251003] dump_stack+0x1c9/0x2b4 [ 312.254647] ? dump_stack_print_info.cold.2+0x52/0x52 [ 312.260334] ? __kernel_text_address+0xd/0x40 [ 312.264895] ? unwind_get_return_address+0x61/0xa0 [ 312.269867] should_fail.cold.4+0xa/0x11 [ 312.273972] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 312.279104] ? save_stack+0x43/0xd0 [ 312.282748] ? kasan_kmalloc+0xc4/0xe0 [ 312.286654] ? __kmalloc_track_caller+0x14a/0x760 [ 312.291510] ? memdup_user+0x2c/0xa0 [ 312.295237] ? strndup_user+0x77/0xd0 [ 312.299069] ? graph_lock+0x170/0x170 [ 312.302885] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.308304] ? find_held_lock+0x36/0x1c0 [ 312.312425] ? check_same_owner+0x340/0x340 [ 312.316767] ? lock_release+0xa30/0xa30 [ 312.320764] ? rcu_note_context_switch+0x730/0x730 [ 312.325712] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 312.330747] __should_failslab+0x124/0x180 [ 312.335018] should_failslab+0x9/0x14 [ 312.338836] __kmalloc_track_caller+0x2c4/0x760 [ 312.343529] ? strncpy_from_user+0x510/0x510 [ 312.347978] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 312.353531] ? strndup_user+0x77/0xd0 [ 312.357349] memdup_user+0x2c/0xa0 [ 312.360909] strndup_user+0x77/0xd0 [ 312.364564] ksys_mount+0x73/0x140 [ 312.368128] __x64_sys_mount+0xbe/0x150 [ 312.372115] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 312.377163] do_syscall_64+0x1b9/0x820 [ 312.381065] ? finish_task_switch+0x1d3/0x870 [ 312.385579] ? syscall_return_slowpath+0x5e0/0x5e0 [ 312.390526] ? syscall_return_slowpath+0x31d/0x5e0 [ 312.395497] ? __switch_to_asm+0x34/0x70 [ 312.399582] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 312.404981] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.409852] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.415059] RIP: 0033:0x459aba [ 312.418271] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 312.437192] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 312.444939] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba [ 312.452225] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 [ 312.459502] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 [ 312.466780] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 312.474056] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000021 22:50:44 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x5) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(r1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:44 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xb6, 0x0) 22:50:44 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000000c0)=0x4) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x301000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000001c0)="597915f49ce9214af1181f0d0f0ff61e66fc8f1179b2c6a1fb1bb03a95e5ed5f9aca9823ff7b0c097a95aa968aa4f2820c79cd0e57054ce6bd4bcc03b8870b13b6c56aa63e9bf44458c1eaa84c77c7e103e85dec69dc94362f3615b6b7fe2aee7f4887e646cfd10fff63b844d25fa9541ec87578ea92c4366098bc88df80f9f6e08826b4924028e3341892bb4dde3cbc4b06b13e233949ba0ba7ef3729c12a1e706abcead9f67d05553e3da1530f391f858e9933dac0a12fd023563627084abff3f6654dc4372828af7ce40add19d64b68f238ba86435b7e56584a04dc3446c6d953c88f7226b11c05e0f358b38bf6b37048fb63cec5b1459bcb90742840d055") bind$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0x100000000, {0x80000000, 0x7, 0x0, 0x7, 0x7, 0x2}, 0x6d1b, 0x9}, 0xe) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r1, r3) dup2(r4, r3) 22:50:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f00000000c0), 0x1) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) 22:50:44 executing program 3 (fault-call:2 fault-nth:34): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:44 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xb33) syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0x9, 0x40000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f00000000000000000000e2ffffff00011800000000000000046dfe11a10047f0ae052cbb35324a86f1000000009c64ab4b8034113a200a4c12c0c1986043ad06f8fde4eaba9221c39ad660c4f05f831c1d84e71bdb608f54aa00000000000002000000000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:44 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x128, 0x0) [ 312.592355] hfs: type requires a 4 character value [ 312.597426] hfs: unable to parse mount options [ 312.645012] FAULT_INJECTION: forcing a failure. [ 312.645012] name failslab, interval 1, probability 0, space 0, times 0 [ 312.656297] CPU: 1 PID: 17847 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 312.660676] hfs: type requires a 4 character value [ 312.663322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.663330] Call Trace: [ 312.663353] dump_stack+0x1c9/0x2b4 [ 312.663374] ? dump_stack_print_info.cold.2+0x52/0x52 [ 312.663403] should_fail.cold.4+0xa/0x11 [ 312.668374] hfs: unable to parse mount options [ 312.677714] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 312.677732] ? lock_downgrade+0x8f0/0x8f0 [ 312.677752] ? kasan_check_read+0x11/0x20 [ 312.677766] ? rcu_is_watching+0x8c/0x150 [ 312.677780] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 312.677798] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 312.724674] ? find_held_lock+0x36/0x1c0 [ 312.728757] ? check_same_owner+0x340/0x340 [ 312.733091] ? rcu_note_context_switch+0x730/0x730 [ 312.738020] ? save_stack+0xa9/0xd0 [ 312.741655] __should_failslab+0x124/0x180 [ 312.745896] should_failslab+0x9/0x14 [ 312.749734] kmem_cache_alloc+0x2af/0x760 [ 312.753901] getname_flags+0xd0/0x5a0 [ 312.757719] user_path_at_empty+0x2d/0x50 [ 312.761874] do_mount+0x17a/0x30e0 [ 312.765421] ? copy_mount_string+0x40/0x40 [ 312.769672] ? rcu_pm_notify+0xc0/0xc0 [ 312.773565] ? copy_mount_options+0x5f/0x380 [ 312.777986] ? rcu_read_lock_sched_held+0x108/0x120 [ 312.783021] ? kmem_cache_alloc_trace+0x616/0x780 [ 312.787873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 312.793421] ? _copy_from_user+0xdf/0x150 [ 312.797578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.803127] ? copy_mount_options+0x285/0x380 [ 312.807651] ksys_mount+0x12d/0x140 [ 312.811282] __x64_sys_mount+0xbe/0x150 [ 312.815256] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 312.820281] do_syscall_64+0x1b9/0x820 [ 312.824186] ? syscall_return_slowpath+0x5e0/0x5e0 [ 312.829138] ? syscall_return_slowpath+0x31d/0x5e0 [ 312.834076] ? __switch_to_asm+0x34/0x70 [ 312.838151] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 312.843519] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.848380] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.853567] RIP: 0033:0x459aba [ 312.856762] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 312.875682] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 312.883412] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba 22:50:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000010000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:44 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f00000001c0)={0x3, 0x0, [{0x8000000f, 0x1, 0xbc24000, 0x2, 0x889}, {0x1, 0x5, 0x6, 0x10000, 0x6}, {0xc0000005, 0x100, 0x6, 0x9, 0x1}]}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text32={0x20, &(0x7f0000000100)="c4e13210fc66baf80cb8de68d683ef66bafc0c66b8000066ef0f22040fc71bc4c2c547b8f0a9ed6ff0ff0866baa000edc4c3791557e9d10fc79d00f000000f06", 0x40}], 0x1, 0x26, &(0x7f00000000c0)=[@dstype3={0x7, 0x3}, @dstype3={0x7, 0xd}], 0x2) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) [ 312.890730] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 [ 312.898030] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 [ 312.905307] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 312.912604] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000022 22:50:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:44 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x2, 0x0) 22:50:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000200000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:44 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x200000, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000001380)=""/4096) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r2 = semget$private(0x0, 0x7, 0x0) sysfs$1(0x1, &(0x7f0000000040)='.user-*selinux&cgroupvmnet1lo-\']}wlan1\x00') ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x474f) semtimedop(r2, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000000240)=""/244, 0xf4}, {&(0x7f00000000c0)=""/24, 0x18}], 0x3) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) [ 313.058471] hfs: type requires a 4 character value [ 313.063593] hfs: unable to parse mount options 22:50:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000040030000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:44 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x6c, 0x0) [ 313.132166] hfs: type requires a 4 character value [ 313.137205] hfs: unable to parse mount options 22:50:45 executing program 3 (fault-call:2 fault-nth:35): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:45 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673f6", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:45 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x145, 0x0) [ 313.363150] FAULT_INJECTION: forcing a failure. [ 313.363150] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 313.375008] CPU: 1 PID: 17906 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 313.382027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.391400] Call Trace: [ 313.394042] dump_stack+0x1c9/0x2b4 [ 313.397701] ? dump_stack_print_info.cold.2+0x52/0x52 [ 313.402931] should_fail.cold.4+0xa/0x11 [ 313.407024] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 313.412155] ? __lock_acquire+0x7fc/0x5020 [ 313.416410] ? lock_downgrade+0x8f0/0x8f0 [ 313.420591] ? trace_hardirqs_on+0x10/0x10 [ 313.424844] ? trace_hardirqs_on+0x10/0x10 [ 313.429100] ? is_bpf_text_address+0xd7/0x170 [ 313.433638] ? kernel_text_address+0x79/0xf0 [ 313.438075] ? __kernel_text_address+0xd/0x40 [ 313.442587] ? unwind_get_return_address+0x61/0xa0 [ 313.447529] ? __save_stack_trace+0x8d/0xf0 [ 313.451874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.457415] ? should_fail+0x246/0xd86 [ 313.461326] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 313.466452] __alloc_pages_nodemask+0x36e/0xdb0 [ 313.471133] ? __kmalloc_track_caller+0x14a/0x760 [ 313.475996] ? memdup_user+0x2c/0xa0 [ 313.479730] ? strndup_user+0x77/0xd0 [ 313.483545] ? __alloc_pages_slowpath+0x2d60/0x2d60 [ 313.488585] ? find_held_lock+0x36/0x1c0 [ 313.492672] ? check_same_owner+0x340/0x340 [ 313.497000] ? lock_release+0xa30/0xa30 [ 313.500998] cache_grow_begin+0x91/0x710 [ 313.505072] kmem_cache_alloc_trace+0x6a5/0x780 [ 313.509758] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 313.515348] copy_mount_options+0x5f/0x380 [ 313.519594] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 313.525143] ksys_mount+0xd0/0x140 [ 313.528709] __x64_sys_mount+0xbe/0x150 [ 313.532695] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 313.537731] do_syscall_64+0x1b9/0x820 [ 313.541653] ? finish_task_switch+0x1d3/0x870 [ 313.546168] ? syscall_return_slowpath+0x5e0/0x5e0 [ 313.551114] ? syscall_return_slowpath+0x31d/0x5e0 [ 313.556071] ? __switch_to_asm+0x34/0x70 [ 313.560137] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 313.565531] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.570391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.575598] RIP: 0033:0x459aba [ 313.578815] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 313.597723] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 313.605461] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba [ 313.612744] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 [ 313.620032] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 [ 313.627315] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 313.634611] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000023 [ 313.655086] hfs: type requires a 4 character value 22:50:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f00000000c0)) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) 22:50:45 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 313.660216] hfs: unable to parse mount options 22:50:45 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = syz_open_dev$mouse(&(0x7f00000003c0)='/dev/input/mouse#\x00', 0x9, 0x20a002) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000400)=@req3={0x7f, 0x1, 0x7fffffff, 0x6, 0x20, 0x7, 0x9}, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000240)=0xc) perf_event_open(&(0x7f0000000340)={0x7, 0x70, 0x5, 0x6, 0x101, 0xffffffffffffff81, 0x0, 0xdd, 0x802a, 0x4, 0xfffffffffffffffd, 0x6, 0x2, 0x5, 0x8, 0x2, 0x8000, 0x7, 0x8, 0x10000, 0x7, 0x0, 0x100, 0x2, 0x2, 0x7f, 0x200, 0x43e, 0x7da3e9d5, 0x7ff, 0xfa, 0x7, 0x7f, 0x3f, 0x3, 0x1000, 0x401, 0x53, 0x0, 0x1b, 0x0, @perf_config_ext={0x7}, 0x104, 0x0, 0x3, 0x7, 0x6, 0x6, 0x200}, r4, 0xf, r1, 0x1) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f00000001c0)={0x5, 0x0, 0x4, {0x0, 0x989680}, 0x80000001, 0xfff}) 22:50:45 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x34, 0x0) 22:50:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:45 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000100", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:45 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") getpeername$unix(r1, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) 22:50:45 executing program 3 (fault-call:2 fault-nth:36): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x400000000000) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0x91) ioprio_set$uid(0x3, r4, 0x0) dup2(r3, r2) [ 313.871852] hfs: type requires a 4 character value [ 313.877023] hfs: unable to parse mount options [ 313.886050] FAULT_INJECTION: forcing a failure. [ 313.886050] name failslab, interval 1, probability 0, space 0, times 0 [ 313.897419] CPU: 0 PID: 17932 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 313.904442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.913844] Call Trace: [ 313.916470] dump_stack+0x1c9/0x2b4 [ 313.920115] ? dump_stack_print_info.cold.2+0x52/0x52 [ 313.925345] should_fail.cold.4+0xa/0x11 [ 313.929425] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 313.934547] ? print_usage_bug+0xc0/0xc0 [ 313.938621] ? rcu_is_watching+0x8c/0x150 [ 313.942790] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 313.947498] ? is_bpf_text_address+0xd7/0x170 [ 313.952019] ? find_held_lock+0x36/0x1c0 [ 313.956132] ? check_same_owner+0x340/0x340 [ 313.960481] ? kasan_slab_free+0xe/0x10 [ 313.964469] ? kmem_cache_free+0x86/0x2d0 [ 313.968644] ? putname+0xf2/0x130 [ 313.972132] ? rcu_note_context_switch+0x730/0x730 [ 313.977113] ? ksys_mount+0x12d/0x140 [ 313.980950] ? __x64_sys_mount+0xbe/0x150 [ 313.985135] __should_failslab+0x124/0x180 [ 313.989407] should_failslab+0x9/0x14 [ 313.993221] kmem_cache_alloc+0x2af/0x760 [ 313.997407] ? kasan_check_write+0x14/0x20 [ 314.001671] ? do_raw_spin_lock+0xc1/0x200 [ 314.005917] alloc_vfsmnt+0xe8/0x9f0 [ 314.009655] ? mnt_free_id.isra.27+0x60/0x60 [ 314.014079] ? graph_lock+0x170/0x170 [ 314.017903] ? rcu_pm_notify+0xc0/0xc0 [ 314.021853] ? putname+0xf2/0x130 [ 314.025319] ? find_held_lock+0x36/0x1c0 [ 314.029398] ? lock_downgrade+0x8f0/0x8f0 [ 314.033557] ? lock_release+0xa30/0xa30 [ 314.037547] ? mpi_free.cold.1+0x19/0x19 [ 314.041622] vfs_kern_mount.part.34+0x90/0x4e0 [ 314.046217] ? may_umount+0xb0/0xb0 [ 314.049863] ? _raw_read_unlock+0x22/0x30 [ 314.054016] ? __get_fs_type+0x97/0xc0 [ 314.057918] do_mount+0x581/0x30e0 [ 314.061492] ? copy_mount_string+0x40/0x40 [ 314.065735] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 314.070509] ? retint_kernel+0x10/0x10 [ 314.074412] ? copy_mount_options+0x1f0/0x380 [ 314.078974] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 314.083826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 314.089370] ? copy_mount_options+0x285/0x380 [ 314.093871] ksys_mount+0x12d/0x140 [ 314.097501] __x64_sys_mount+0xbe/0x150 [ 314.101524] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 314.106548] do_syscall_64+0x1b9/0x820 [ 314.110439] ? finish_task_switch+0x1d3/0x870 [ 314.114955] ? syscall_return_slowpath+0x5e0/0x5e0 [ 314.119895] ? syscall_return_slowpath+0x31d/0x5e0 [ 314.124854] ? __switch_to_asm+0x34/0x70 [ 314.128929] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 314.134309] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.139160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.144351] RIP: 0033:0x459aba [ 314.147584] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 314.166966] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 314.174675] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba [ 314.181970] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 [ 314.189281] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 [ 314.196566] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 314.203849] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000024 22:50:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semop(r1, &(0x7f0000000040)=[{0x1, 0xff, 0x800}], 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$9p_virtio(&(0x7f00000000c0)='\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x10, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_none='cache=none'}, {@access_uid={'access', 0x3d, r2}}]}}) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:46 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000003400000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:46 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x13e, 0x0) 22:50:46 executing program 3 (fault-call:2 fault-nth:37): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") open(&(0x7f00000001c0)='./file0\x00', 0x2000, 0x20) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000340)="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", 0xfc, 0xfffffffffffffff8) keyctl$get_security(0x11, r2, &(0x7f0000000280)=""/9, 0x9) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000440)={{0x3, 0x2, 0x7, 0x0, 0x4007ff}, 0x1000, 0xffff, 'id1\x00', 'timer0\x00', 0x0, 0x3, 0x7f, 0x7, 0xffffffffa45d2fc5}) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup2(r3, r5) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r6, 0x6c}, 0x8) dup2(r5, r4) [ 314.224566] hfs: type requires a 4 character value [ 314.229641] hfs: unable to parse mount options [ 314.323051] FAULT_INJECTION: forcing a failure. [ 314.323051] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 314.334945] CPU: 0 PID: 17950 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 314.341994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.351370] Call Trace: [ 314.354011] dump_stack+0x1c9/0x2b4 [ 314.357666] ? dump_stack_print_info.cold.2+0x52/0x52 [ 314.362879] ? kernel_text_address+0x79/0xf0 [ 314.367313] should_fail.cold.4+0xa/0x11 22:50:46 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000400000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:46 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x105, 0x0) 22:50:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f00000000c0)={0x4, 0xb79, 0xaf, 0x4, 0x80000001}) [ 314.371401] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 314.376803] ? trace_hardirqs_on+0x10/0x10 [ 314.381071] ? print_usage_bug+0xc0/0xc0 [ 314.385166] ? graph_lock+0x170/0x170 [ 314.389000] ? kasan_check_read+0x11/0x20 [ 314.393181] ? do_raw_spin_unlock+0xa7/0x2f0 [ 314.397612] ? print_usage_bug+0xc0/0xc0 [ 314.401725] ? find_held_lock+0x36/0x1c0 [ 314.405821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 314.411377] ? should_fail+0x246/0xd86 [ 314.415287] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 314.420411] __alloc_pages_nodemask+0x36e/0xdb0 [ 314.425099] ? kasan_check_read+0x11/0x20 [ 314.429273] ? __alloc_pages_slowpath+0x2d60/0x2d60 [ 314.434308] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 314.439009] ? find_held_lock+0x36/0x1c0 [ 314.443108] ? check_same_owner+0x340/0x340 [ 314.447462] cache_grow_begin+0x91/0x710 [ 314.451548] kmem_cache_alloc+0x689/0x760 [ 314.455752] ? find_held_lock+0x36/0x1c0 [ 314.459843] getname_flags+0xd0/0x5a0 [ 314.463684] user_path_at_empty+0x2d/0x50 [ 314.467863] do_mount+0x17a/0x30e0 22:50:46 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 314.471425] ? do_raw_spin_unlock+0xa7/0x2f0 [ 314.475855] ? copy_mount_string+0x40/0x40 [ 314.480107] ? rcu_pm_notify+0xc0/0xc0 [ 314.484044] ? copy_mount_options+0x5f/0x380 [ 314.488475] ? rcu_read_lock_sched_held+0x108/0x120 [ 314.493525] ? kmem_cache_alloc_trace+0x616/0x780 [ 314.498390] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 314.503999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 314.509560] ? copy_mount_options+0x285/0x380 [ 314.514074] ksys_mount+0x12d/0x140 [ 314.517720] __x64_sys_mount+0xbe/0x150 [ 314.521703] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 314.526735] do_syscall_64+0x1b9/0x820 [ 314.530637] ? finish_task_switch+0x1d3/0x870 [ 314.535146] ? syscall_return_slowpath+0x5e0/0x5e0 [ 314.540100] ? syscall_return_slowpath+0x31d/0x5e0 [ 314.545066] ? __switch_to_asm+0x34/0x70 [ 314.549143] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 314.554539] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.559404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.564604] RIP: 0033:0x459aba [ 314.567813] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 314.586725] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 314.594453] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba [ 314.601780] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 [ 314.609068] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 [ 314.616361] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 314.623638] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000025 [ 314.644680] hfs: type requires a 4 character value [ 314.649919] hfs: unable to parse mount options 22:50:46 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0xfffffffffffffe8b) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:46 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xdb, 0x0) 22:50:46 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:46 executing program 3 (fault-call:2 fault-nth:38): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) epoll_create(0x1000) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f00000001c0)=""/250) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000340)={{0x5000, 0x5001, 0xf, 0x452, 0x4, 0x9, 0x0, 0xfffffffffffffffd, 0x101, 0x689b, 0x7ff, 0x9}, {0x3004, 0x2, 0xc, 0x4, 0xb1, 0x0, 0x5, 0x8, 0x10001, 0x80000001, 0x800, 0x7ff}, {0xf000, 0x3002, 0xf, 0x1, 0x76fe, 0x2, 0x8, 0x10000, 0x2, 0x40, 0xfffffffffffffffb, 0xede}, {0x0, 0x10000, 0x8, 0x5, 0x36, 0x2, 0x400, 0xfcf, 0x20, 0x7fffffff, 0xfffffffffffff9fa, 0x7}, {0x5000, 0x16000, 0x9, 0xc2c, 0x40, 0x6, 0x0, 0x8, 0x5, 0x16, 0xfffffffffffffffb, 0xb0}, {0x10000, 0x7005, 0xc, 0xffffffffffffffc0, 0x6, 0xffff, 0xb2be, 0x7091, 0x5, 0x7ff, 0x2, 0x80000001}, {0x4000, 0x2005, 0x1a, 0x7ff, 0x1, 0x0, 0x9, 0xfa78, 0xfff, 0xb6c6, 0x1, 0x8}, {0xf000, 0x10000, 0x0, 0x79e, 0x54e, 0x3bfd, 0x5, 0x9, 0x8001, 0x6, 0xfffffffffffffff8, 0x100000001}, {0x10f001, 0x100000}, {0x103000, 0x4}, 0x40000000, 0x0, 0xf000, 0x540000, 0x8, 0xc00, 0xd000, [0xc, 0x100000000, 0x80000000, 0x3f7fd85e]}) dup2(r2, r4) dup2(r4, r3) 22:50:46 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x48000, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @remote}}, [0x3a0, 0x226e, 0x3, 0x61f0, 0x10000, 0x7ff, 0x80, 0x4, 0x1, 0x80000000, 0x7, 0x4, 0x80000000, 0x3f, 0x7]}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000140)=r6, 0x4) dup2(r3, r5) dup2(r5, r4) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f00000002c0)={r6, 0x1}, 0x8) [ 314.844254] hfs: type requires a 4 character value [ 314.849340] hfs: unable to parse mount options [ 314.891010] FAULT_INJECTION: forcing a failure. [ 314.891010] name failslab, interval 1, probability 0, space 0, times 0 [ 314.902370] CPU: 0 PID: 17990 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 314.909397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.918785] Call Trace: [ 314.921408] dump_stack+0x1c9/0x2b4 [ 314.925054] ? dump_stack_print_info.cold.2+0x52/0x52 [ 314.930257] ? trace_hardirqs_on+0x10/0x10 [ 314.934506] should_fail.cold.4+0xa/0x11 [ 314.938572] ? mark_held_locks+0xc9/0x160 [ 314.942730] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 314.947848] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 314.952878] ? retint_kernel+0x10/0x10 [ 314.956779] ? find_held_lock+0x36/0x1c0 [ 314.960882] ? check_same_owner+0x340/0x340 [ 314.965212] ? rcu_note_context_switch+0x730/0x730 [ 314.970159] __should_failslab+0x124/0x180 [ 314.974417] should_failslab+0x9/0x14 [ 314.978238] __kmalloc_track_caller+0x2c4/0x760 [ 314.982946] ? kasan_check_read+0x11/0x20 [ 314.987107] ? do_raw_spin_unlock+0xa7/0x2f0 [ 314.991525] ? kstrdup_const+0x66/0x80 [ 314.995425] kstrdup+0x39/0x70 [ 314.998632] kstrdup_const+0x66/0x80 [ 315.002352] alloc_vfsmnt+0x1bb/0x9f0 [ 315.006179] ? mnt_free_id.isra.27+0x60/0x60 [ 315.010600] ? graph_lock+0x170/0x170 [ 315.014421] ? rcu_pm_notify+0xc0/0xc0 [ 315.018317] ? putname+0xf2/0x130 [ 315.021787] ? find_held_lock+0x36/0x1c0 [ 315.025867] ? lock_downgrade+0x8f0/0x8f0 [ 315.030024] ? lock_release+0xa30/0xa30 [ 315.034014] ? mpi_free.cold.1+0x19/0x19 [ 315.038113] vfs_kern_mount.part.34+0x90/0x4e0 [ 315.042708] ? may_umount+0xb0/0xb0 [ 315.046347] ? _raw_read_unlock+0x22/0x30 [ 315.050503] ? __get_fs_type+0x97/0xc0 [ 315.054404] do_mount+0x581/0x30e0 [ 315.057970] ? copy_mount_string+0x40/0x40 [ 315.062222] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 315.067004] ? retint_kernel+0x10/0x10 [ 315.070943] ? copy_mount_options+0x213/0x380 [ 315.075452] ? __sanitizer_cov_trace_const_cmp4+0x11/0x20 [ 315.081000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.086538] ? copy_mount_options+0x285/0x380 [ 315.091041] ksys_mount+0x12d/0x140 [ 315.094673] __x64_sys_mount+0xbe/0x150 [ 315.098645] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 315.103664] do_syscall_64+0x1b9/0x820 [ 315.107556] ? finish_task_switch+0x1d3/0x870 [ 315.112069] ? syscall_return_slowpath+0x5e0/0x5e0 [ 315.117026] ? syscall_return_slowpath+0x31d/0x5e0 [ 315.121973] ? __switch_to_asm+0x34/0x70 [ 315.126039] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 315.131415] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 315.136269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.141460] RIP: 0033:0x459aba [ 315.144659] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 315.164051] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 315.171780] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba [ 315.179055] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 22:50:47 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc8c000315f85f45070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0xfffffffffffffffc, 0x0, 0x1800}], 0x1, &(0x7f0000000040)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:47 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x19b, 0x0) 22:50:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000200", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:47 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000000000000000000000118000000000007000000000000000095000000000000003108d643b422796c3ad464a0bcd4a2ea620bbacfcc226812f86e54a7a572507a2c39231b2088d11887b284b9ecb294bd3455fd86b8d781d3f3e3820000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) [ 315.186329] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 [ 315.193619] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 315.200899] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000026 [ 315.227061] hfs: type requires a 4 character value [ 315.232113] hfs: unable to parse mount options 22:50:47 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x5, 0x84) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000140)="ba410066b80380000066ef66b9750a000066b8f6363bb866bab9dcfc120f300f38cd980010f0f69a7fbd0f1ab20c00baf80c66b85489668d66efbafc0c66ed260fc76a660f017c0066b9800000c00f326635001000000f30e90030", 0x5b}], 0x1, 0xfee64b5def490aec, &(0x7f00000001c0), 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r4, r1) dup2(r3, r2) 22:50:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000040000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673c0", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:47 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xbe, 0x0) 22:50:47 executing program 3 (fault-call:2 fault-nth:39): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000034000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:47 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:50:47 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xf2, 0x0) [ 315.525131] FAULT_INJECTION: forcing a failure. [ 315.525131] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 315.537202] CPU: 0 PID: 18032 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 315.544234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.553600] Call Trace: [ 315.556211] dump_stack+0x1c9/0x2b4 [ 315.559860] ? dump_stack_print_info.cold.2+0x52/0x52 [ 315.565070] ? rcu_pm_notify+0xc0/0xc0 [ 315.568987] should_fail.cold.4+0xa/0x11 [ 315.573079] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 315.578206] ? pcpu_alloc+0x190/0x13a0 [ 315.582114] ? graph_lock+0x170/0x170 [ 315.585963] ? find_held_lock+0x36/0x1c0 [ 315.590075] ? check_same_owner+0x340/0x340 [ 315.594418] ? rcu_note_context_switch+0x730/0x730 [ 315.599420] __alloc_pages_nodemask+0x36e/0xdb0 [ 315.604120] ? __alloc_pages_slowpath+0x2d60/0x2d60 [ 315.609159] ? graph_lock+0x170/0x170 [ 315.612987] ? rcu_pm_notify+0xc0/0xc0 [ 315.616902] ? find_held_lock+0x36/0x1c0 22:50:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000004000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 315.621027] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 315.626593] alloc_pages_current+0x10c/0x210 [ 315.631032] get_zeroed_page+0x14/0x50 [ 315.634959] mount_fs+0x210/0x328 [ 315.638430] ? mpi_free.cold.1+0x19/0x19 [ 315.642518] vfs_kern_mount.part.34+0xdc/0x4e0 [ 315.647124] ? may_umount+0xb0/0xb0 [ 315.650768] ? _raw_read_unlock+0x22/0x30 [ 315.654965] ? __get_fs_type+0x97/0xc0 [ 315.658878] do_mount+0x581/0x30e0 [ 315.662478] ? copy_mount_string+0x40/0x40 [ 315.666736] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 315.671541] ? retint_kernel+0x10/0x10 [ 315.675453] ? copy_mount_options+0x213/0x380 [ 315.679995] ? write_comp_data+0x70/0x70 [ 315.684081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.689640] ? copy_mount_options+0x285/0x380 [ 315.694162] ksys_mount+0x12d/0x140 [ 315.697815] __x64_sys_mount+0xbe/0x150 [ 315.701803] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 315.706844] do_syscall_64+0x1b9/0x820 [ 315.710747] ? syscall_return_slowpath+0x5e0/0x5e0 [ 315.715694] ? syscall_return_slowpath+0x31d/0x5e0 [ 315.720643] ? __switch_to_asm+0x34/0x70 [ 315.724718] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 315.730095] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 315.734965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.740159] RIP: 0033:0x459aba [ 315.743359] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 315.762279] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 315.769997] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba [ 315.777269] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 [ 315.784538] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 [ 315.791808] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 315.799081] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000027 22:50:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000400300", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:47 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000100)=""/43) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = gettid() ptrace$getsig(0x4202, r3, 0x7, &(0x7f0000000140)) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x9) ioctl$KVM_RUN(r6, 0xae80, 0x0) dup2(r4, r6) dup2(r6, r5) [ 315.936511] hfs: type requires a 4 character value [ 315.941609] hfs: unable to parse mount options [ 315.989389] hfs: type requires a 4 character value [ 315.994569] hfs: unable to parse mount options 22:50:48 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x4000, 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000080)='/\x00', &(0x7f00000000c0)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000200)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000440)='./file1\x00', 0x0, 0x0, &(0x7f00000014c0), 0x30, &(0x7f0000000040)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2000000}}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @empty, @multicast1}, &(0x7f0000000140)=0xc) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000180)={r1, 0x2, 0x6, 0x3ffc000000000000, 0xe08, 0x7ff, 0x4}) openat$random(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f00000004c0)) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) memfd_create(&(0x7f0000000380)='/\x00', 0x3) r3 = semget(0x1, 0x4, 0x2) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) semtimedop(r3, &(0x7f00000003c0)=[{0x3, 0xfff, 0x1000}, {0x4, 0x1, 0x1000}], 0x2, &(0x7f0000000480)={r4, r5+30000000}) ioctl(r2, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r6 = semget$private(0x0, 0x7, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000240)={0x5, 0x4, 0x66c9, 0xe3, 0xfffffffffffffff8, 0x2, 0x0, 0x7fff, 0x7ff, 0x3, 0x1, 0x20}) semtimedop(r6, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r6, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) 22:50:48 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x91, 0x0) 22:50:48 executing program 6: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x1a10, &(0x7f0000000340)="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") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:50:48 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673fd", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:48 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = open(&(0x7f0000000080)='./file0\x00', 0x422202, 0x10) r2 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x3ff, 0x7, 0x1, 0x40, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, r1, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x4000000100000080, 0x1000000000}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:48 executing program 2: r0 = socket$inet6(0xa, 0xf, 0x2) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f00000001c0)={0x929, {{0x2, 0x4e24, @broadcast}}, {{0x2, 0x4e24, @multicast2}}}, 0x108) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) 22:50:48 executing program 3 (fault-call:2 fault-nth:40): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 316.288339] FAULT_INJECTION: forcing a failure. [ 316.288339] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 316.300198] CPU: 1 PID: 18069 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 316.307216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.316572] Call Trace: [ 316.319175] dump_stack+0x1c9/0x2b4 [ 316.322821] ? dump_stack_print_info.cold.2+0x52/0x52 [ 316.328026] ? lock_downgrade+0x8f0/0x8f0 [ 316.332191] should_fail.cold.4+0xa/0x11 [ 316.336268] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 316.341382] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 316.346408] ? find_next_bit+0x104/0x130 [ 316.350497] ? trace_hardirqs_on+0x10/0x10 [ 316.354741] ? retint_kernel+0x10/0x10 [ 316.358644] ? wait_for_completion+0x8d0/0x8d0 [ 316.363236] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 316.368263] ? print_usage_bug+0xc0/0xc0 [ 316.372342] ? kasan_check_read+0x11/0x20 [ 316.376499] ? rcu_pm_notify+0xc0/0xc0 [ 316.380404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.386007] ? should_fail+0x246/0xd86 [ 316.389930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.395523] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 316.400645] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 316.405780] __alloc_pages_nodemask+0x36e/0xdb0 [ 316.410480] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 316.415256] ? __alloc_pages_slowpath+0x2d60/0x2d60 [ 316.420291] ? find_held_lock+0x36/0x1c0 [ 316.424381] ? check_same_owner+0x340/0x340 [ 316.428730] cache_grow_begin+0x91/0x710 [ 316.432828] kmem_cache_alloc+0x689/0x760 [ 316.436998] getname_kernel+0x54/0x370 [ 316.440898] kern_path+0x1e/0x40 [ 316.444285] lookup_bdev+0x10c/0x250 [ 316.448007] ? blkdev_open+0x280/0x280 [ 316.451917] ? find_held_lock+0x36/0x1c0 [ 316.456046] blkdev_get_by_path+0x1f/0xe0 [ 316.460206] mount_bdev+0x5d/0x3e0 [ 316.463755] ? hfs_show_options+0x6f0/0x6f0 [ 316.468100] hfs_mount+0x34/0x40 [ 316.471489] mount_fs+0xae/0x328 [ 316.474880] vfs_kern_mount.part.34+0xdc/0x4e0 [ 316.479475] ? retint_kernel+0x10/0x10 [ 316.483407] ? may_umount+0xb0/0xb0 [ 316.487073] do_mount+0x581/0x30e0 [ 316.490622] ? copy_mount_string+0x40/0x40 [ 316.494870] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 316.499641] ? retint_kernel+0x10/0x10 [ 316.503555] ? copy_mount_options+0x1f0/0x380 [ 316.508066] ? copy_mount_options+0x202/0x380 [ 316.512570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.518126] ? copy_mount_options+0x285/0x380 [ 316.522633] ksys_mount+0x12d/0x140 [ 316.526271] __x64_sys_mount+0xbe/0x150 [ 316.530250] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 316.535274] do_syscall_64+0x1b9/0x820 [ 316.539170] ? syscall_return_slowpath+0x5e0/0x5e0 [ 316.544108] ? syscall_return_slowpath+0x31d/0x5e0 [ 316.549047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.554606] ? retint_user+0x18/0x18 [ 316.558330] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.563188] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.568381] RIP: 0033:0x459aba [ 316.571592] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 316.590501] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 316.598221] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba [ 316.605501] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 [ 316.612776] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 [ 316.620064] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 316.627335] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000028 22:50:48 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:48 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x77, 0x0) [ 316.639475] hfs: type requires a 4 character value [ 316.644582] hfs: unable to parse mount options 22:50:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0xfffffffffffffffc, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:50:48 executing program 3 (fault-call:2 fault-nth:41): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs!', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:48 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xbb, 0x0) 22:50:48 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000100)={@empty, r3}, 0x14) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup2(r2, r5) dup2(r5, r4) [ 316.891595] FAULT_INJECTION: forcing a failure. [ 316.891595] name failslab, interval 1, probability 0, space 0, times 0 [ 316.903294] CPU: 0 PID: 18100 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 316.910314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.919676] Call Trace: [ 316.922296] dump_stack+0x1c9/0x2b4 [ 316.925960] ? dump_stack_print_info.cold.2+0x52/0x52 [ 316.931184] ? kasan_check_read+0x11/0x20 [ 316.935359] ? rcu_is_watching+0x8c/0x150 [ 316.939572] should_fail.cold.4+0xa/0x11 [ 316.943649] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 316.948759] ? is_bpf_text_address+0xd7/0x170 [ 316.953280] ? kernel_text_address+0x79/0xf0 [ 316.957697] ? unwind_get_return_address+0x61/0xa0 [ 316.962634] ? __save_stack_trace+0x8d/0xf0 [ 316.966972] ? graph_lock+0x170/0x170 [ 316.970783] ? find_held_lock+0x36/0x1c0 [ 316.974856] ? __lock_is_held+0xb5/0x140 [ 316.978951] ? check_same_owner+0x340/0x340 [ 316.983286] ? rcu_note_context_switch+0x730/0x730 [ 316.988248] __should_failslab+0x124/0x180 [ 316.992522] should_failslab+0x9/0x14 [ 316.996331] kmem_cache_alloc_trace+0x2cb/0x780 [ 317.001044] ? __kmalloc_node+0x33/0x70 [ 317.005042] ? __kmalloc_node+0x33/0x70 [ 317.009026] ? rcu_read_lock_sched_held+0x108/0x120 [ 317.014062] __memcg_init_list_lru_node+0x185/0x2d0 [ 317.019095] ? kvfree_rcu+0x20/0x20 [ 317.022730] ? __kmalloc_node+0x47/0x70 [ 317.026752] __list_lru_init+0x4d6/0x840 [ 317.030834] ? list_lru_destroy+0x500/0x500 [ 317.035197] ? up_write+0x7b/0x220 [ 317.038762] ? up_read+0x110/0x110 [ 317.042315] ? down_read+0x1d0/0x1d0 [ 317.046043] ? init_wait_entry+0x1c0/0x1c0 [ 317.050284] ? prealloc_shrinker+0xd6/0x320 [ 317.054626] sget_userns+0x9ba/0xf30 [ 317.058344] ? kill_litter_super+0x90/0x90 [ 317.062589] ? ns_test_super+0x50/0x50 [ 317.066495] ? destroy_unused_super.part.11+0x110/0x110 [ 317.071871] ? kasan_check_write+0x14/0x20 [ 317.076113] ? do_raw_spin_lock+0xc1/0x200 [ 317.080384] ? blkdev_get+0xc8/0xb50 [ 317.084137] ? cap_capable+0x1f9/0x260 [ 317.088044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.093589] ? security_capable+0x99/0xc0 [ 317.097746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.103291] ? ns_capable_common+0x13f/0x170 [ 317.107708] ? kill_litter_super+0x90/0x90 [ 317.111961] sget+0x10b/0x150 [ 317.115073] ? ns_test_super+0x50/0x50 [ 317.118977] mount_bdev+0x111/0x3e0 [ 317.122607] ? hfs_show_options+0x6f0/0x6f0 [ 317.126949] hfs_mount+0x34/0x40 [ 317.130327] mount_fs+0xae/0x328 [ 317.133706] vfs_kern_mount.part.34+0xdc/0x4e0 [ 317.138294] ? may_umount+0xb0/0xb0 [ 317.141934] ? _raw_read_unlock+0x22/0x30 [ 317.146106] ? __get_fs_type+0x97/0xc0 [ 317.150003] do_mount+0x581/0x30e0 [ 317.154050] ? copy_mount_string+0x40/0x40 [ 317.158301] ? copy_mount_options+0x5f/0x380 [ 317.162716] ? rcu_read_lock_sched_held+0x108/0x120 [ 317.167741] ? kmem_cache_alloc_trace+0x616/0x780 [ 317.172598] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 317.178150] ? _copy_from_user+0xdf/0x150 [ 317.182311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.187850] ? copy_mount_options+0x285/0x380 [ 317.192355] ksys_mount+0x12d/0x140 [ 317.195993] __x64_sys_mount+0xbe/0x150 [ 317.199976] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 317.205002] do_syscall_64+0x1b9/0x820 [ 317.208919] ? finish_task_switch+0x1d3/0x870 [ 317.213471] ? syscall_return_slowpath+0x5e0/0x5e0 [ 317.218406] ? syscall_return_slowpath+0x31d/0x5e0 [ 317.223343] ? __switch_to_asm+0x34/0x70 [ 317.227412] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 317.232785] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.237639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.242830] RIP: 0033:0x459aba [ 317.246036] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 317.264971] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 317.272708] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba [ 317.279991] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 [ 317.287261] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 [ 317.294528] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 317.301798] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000029 [ 317.325195] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000002000000,,errors=continue 22:50:49 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) semget$private(0x0, 0x4, 0x404) fanotify_init(0xc, 0x1000) 22:50:49 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000001", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:49 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x188, 0x0) 22:50:49 executing program 6: r0 = socket$inet6(0xa, 0x805, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:50:49 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) r2 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000200)) r3 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x1, 0x16982) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000440)={r3, 0x0, 0x8, "3876ed12abada41123835f975577f3dd58b5fa002ad79792192f1838c41878ac4f0a640e2dc30293a0fa632f1e7a3a4866a4d95d241996974f1c040d1841de8d81506ba54fe7b0ff3954f7dbe0e0824df641229ad2c60921e5465976cf7c1f924c"}) openat$cgroup(r2, &(0x7f00000004c0)='syz0\x00', 0x200002, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x79b, 0x80) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) r5 = semget$private(0x0, 0x0, 0x10) semctl$GETZCNT(r5, 0x1, 0xf, &(0x7f0000000340)=""/219) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:49 executing program 3 (fault-call:2 fault-nth:42): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x0, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:50:49 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000002000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:49 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x6b, 0x0) [ 317.826566] hfs: type requires a 4 character value [ 317.831664] hfs: unable to parse mount options [ 317.876109] hfs: type requires a 4 character value [ 317.881164] hfs: unable to parse mount options [ 317.891524] FAULT_INJECTION: forcing a failure. [ 317.891524] name failslab, interval 1, probability 0, space 0, times 0 [ 317.902948] CPU: 1 PID: 18144 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 317.909980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.919341] Call Trace: [ 317.921959] dump_stack+0x1c9/0x2b4 [ 317.925621] ? dump_stack_print_info.cold.2+0x52/0x52 [ 317.930838] should_fail.cold.4+0xa/0x11 [ 317.934936] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 317.940083] ? graph_lock+0x170/0x170 [ 317.943899] ? save_stack+0x43/0xd0 [ 317.947563] ? kasan_kmalloc+0xc4/0xe0 [ 317.951481] ? __kmalloc+0x14e/0x760 [ 317.955229] ? find_held_lock+0x36/0x1c0 [ 317.959308] ? __lock_is_held+0xb5/0x140 [ 317.963421] ? check_same_owner+0x340/0x340 [ 317.967788] ? rcu_note_context_switch+0x730/0x730 [ 317.972743] __should_failslab+0x124/0x180 [ 317.976998] should_failslab+0x9/0x14 [ 317.980806] kmem_cache_alloc_node_trace+0x26f/0x770 [ 317.985941] __kmalloc_node+0x33/0x70 [ 317.989781] kvmalloc_node+0x65/0xf0 [ 317.993523] __list_lru_init+0x5d9/0x840 [ 317.997597] ? list_lru_destroy+0x500/0x500 [ 318.001946] ? up_write+0x7b/0x220 [ 318.005502] ? up_read+0x110/0x110 [ 318.009061] ? down_read+0x1d0/0x1d0 [ 318.012782] ? init_wait_entry+0x1c0/0x1c0 [ 318.017043] ? prealloc_shrinker+0xd6/0x320 [ 318.021386] sget_userns+0x9ba/0xf30 [ 318.025127] ? kill_litter_super+0x90/0x90 [ 318.029372] ? ns_test_super+0x50/0x50 [ 318.033283] ? destroy_unused_super.part.11+0x110/0x110 [ 318.038657] ? kasan_check_write+0x14/0x20 [ 318.042900] ? do_raw_spin_lock+0xc1/0x200 [ 318.047155] ? blkdev_get+0xc8/0xb50 [ 318.050877] ? cap_capable+0x1f9/0x260 [ 318.054803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.060343] ? security_capable+0x99/0xc0 [ 318.064503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.070057] ? ns_capable_common+0x13f/0x170 [ 318.074473] ? kill_litter_super+0x90/0x90 [ 318.078716] sget+0x10b/0x150 [ 318.081842] ? ns_test_super+0x50/0x50 [ 318.085734] mount_bdev+0x111/0x3e0 [ 318.089367] ? hfs_show_options+0x6f0/0x6f0 [ 318.093692] hfs_mount+0x34/0x40 [ 318.097069] mount_fs+0xae/0x328 [ 318.100451] vfs_kern_mount.part.34+0xdc/0x4e0 [ 318.105044] ? may_umount+0xb0/0xb0 [ 318.108685] ? _raw_read_unlock+0x22/0x30 [ 318.112850] ? __get_fs_type+0x97/0xc0 [ 318.116755] do_mount+0x581/0x30e0 [ 318.120309] ? copy_mount_string+0x40/0x40 [ 318.124561] ? copy_mount_options+0x5f/0x380 [ 318.128989] ? rcu_read_lock_sched_held+0x108/0x120 [ 318.134013] ? kmem_cache_alloc_trace+0x616/0x780 [ 318.138872] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 318.144534] ? _copy_from_user+0xdf/0x150 [ 318.148693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.154251] ? copy_mount_options+0x285/0x380 [ 318.158756] ksys_mount+0x12d/0x140 [ 318.162391] __x64_sys_mount+0xbe/0x150 [ 318.166413] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 318.171477] do_syscall_64+0x1b9/0x820 [ 318.175369] ? finish_task_switch+0x1d3/0x870 [ 318.179872] ? syscall_return_slowpath+0x5e0/0x5e0 [ 318.184822] ? syscall_return_slowpath+0x31d/0x5e0 [ 318.189762] ? __switch_to_asm+0x34/0x70 [ 318.193831] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 318.199208] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 318.204064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.209293] RIP: 0033:0x459aba [ 318.212489] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 318.231397] RSP: 002b:00007f43a943da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 318.239115] RAX: ffffffffffffffda RBX: 00007f43a943db30 RCX: 0000000000459aba [ 318.246383] RDX: 00007f43a943dad0 RSI: 0000000020000080 RDI: 00007f43a943daf0 [ 318.253651] RBP: 0000000020000080 R08: 00007f43a943db30 R09: 00007f43a943dad0 [ 318.261418] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 318.268693] R13: 0000000000000000 R14: 00000000004c9c3c R15: 000000000000002a 22:50:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) dup2(r1, r3) dup2(r3, r2) 22:50:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="6866737f", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:50 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x13a, 0x0) 22:50:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:50 executing program 3 (fault-call:2 fault-nth:43): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:50 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x9c, r4, 0xa01, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x78, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x19}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xf}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0x9c}, 0x1, 0x0, 0x0, 0xd0}, 0x1) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:50:50 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='coredump_filter\x00') getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000180), &(0x7f0000000240)=0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x7f, 0x7, 0x5}, 0x97) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r2}) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:50 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x80000001, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x8, @time, 0x0, {0x8, 0xe43}, 0x10000800, 0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f0000000340)="a59e0d7723d7d792f62f9360c9b2606c22bd320ff886e43c07724ec1bc15d158f6415fd09e8c2f4a5c8ea525a157150497eb91e161790c1470901a9da59b954caf5303411047f7d80ea352fef985962e530441c583c782b040e375afc0264a1e0b65fa5c4bb9c9893ee17ce19b62243bdc7599656962440ec6a7024894466595ca3f4516844d", &(0x7f0000000400)="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"}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 22:50:50 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xf6, 0x0) 22:50:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000002", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000140)={0x2, r4}) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1a) dup2(r2, r5) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f00000001c0)={{0xa, 0x4e21, 0x0, @local, 0x3}, {0xa, 0x4e23, 0x3ff, @remote, 0xcd}, 0x7c22, [0x8000, 0x81, 0x7fffffff, 0x871f, 0x1, 0x100, 0x80, 0x101]}, 0x5c) dup2(r5, r3) [ 318.739241] FAULT_INJECTION: forcing a failure. [ 318.739241] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 318.751277] CPU: 0 PID: 18170 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 318.758296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.767670] Call Trace: [ 318.770271] dump_stack+0x1c9/0x2b4 [ 318.773987] ? dump_stack_print_info.cold.2+0x52/0x52 [ 318.779205] ? __lock_acquire+0x7fc/0x5020 [ 318.783463] should_fail.cold.4+0xa/0x11 [ 318.787545] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 318.792662] ? trace_hardirqs_on+0x10/0x10 [ 318.796942] ? trace_hardirqs_on+0x10/0x10 [ 318.801193] ? lock_release+0xa30/0xa30 [ 318.805190] ? trace_hardirqs_on+0x10/0x10 [ 318.809448] ? __lock_acquire+0x7fc/0x5020 [ 318.813710] ? blkdev_get+0x5f2/0xb50 [ 318.817537] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.823189] ? should_fail+0x246/0xd86 [ 318.827119] ? lock_release+0xa30/0xa30 [ 318.831111] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 318.836259] __alloc_pages_nodemask+0x36e/0xdb0 [ 318.840970] ? __alloc_pages_slowpath+0x2d60/0x2d60 [ 318.846006] ? find_held_lock+0x36/0x1c0 [ 318.850086] ? __lock_is_held+0xb5/0x140 [ 318.854181] ? check_same_owner+0x340/0x340 [ 318.858559] cache_grow_begin+0x91/0x710 [ 318.862646] kmem_cache_alloc_trace+0x6a5/0x780 [ 318.867335] ? kasan_check_write+0x14/0x20 [ 318.871608] ? do_raw_spin_lock+0xc1/0x200 [ 318.875880] sget_userns+0x1d3/0xf30 [ 318.879604] ? kill_litter_super+0x90/0x90 [ 318.883857] ? ns_test_super+0x50/0x50 [ 318.887759] ? destroy_unused_super.part.11+0x110/0x110 [ 318.893161] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 318.897759] ? kasan_check_write+0x14/0x20 [ 318.902027] ? do_raw_spin_lock+0xc1/0x200 [ 318.906296] ? blkdev_get+0xc8/0xb50 [ 318.910026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.915598] ? cap_capable+0x1f9/0x260 [ 318.919529] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.925085] ? security_capable+0x99/0xc0 [ 318.929256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.934802] ? ns_capable_common+0x13f/0x170 [ 318.939223] ? kill_litter_super+0x90/0x90 [ 318.943471] sget+0x10b/0x150 [ 318.946613] ? ns_test_super+0x50/0x50 [ 318.950513] mount_bdev+0x111/0x3e0 [ 318.954188] ? hfs_show_options+0x6f0/0x6f0 [ 318.958526] hfs_mount+0x34/0x40 [ 318.961906] mount_fs+0xae/0x328 [ 318.965308] vfs_kern_mount.part.34+0xdc/0x4e0 [ 318.969902] ? may_umount+0xb0/0xb0 [ 318.973554] ? _raw_read_unlock+0x22/0x30 [ 318.977723] ? __get_fs_type+0x97/0xc0 [ 318.981619] do_mount+0x581/0x30e0 [ 318.985185] ? do_raw_spin_unlock+0xa7/0x2f0 [ 318.989607] ? copy_mount_string+0x40/0x40 [ 318.993884] ? copy_mount_options+0x5f/0x380 [ 318.998337] ? rcu_read_lock_sched_held+0x108/0x120 [ 319.003363] ? kmem_cache_alloc_trace+0x616/0x780 [ 319.008229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 319.013792] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.019339] ? copy_mount_options+0x285/0x380 [ 319.023869] ksys_mount+0x12d/0x140 [ 319.027512] __x64_sys_mount+0xbe/0x150 [ 319.031495] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 319.036528] do_syscall_64+0x1b9/0x820 [ 319.040461] ? finish_task_switch+0x1d3/0x870 [ 319.044988] ? syscall_return_slowpath+0x5e0/0x5e0 [ 319.049947] ? syscall_return_slowpath+0x31d/0x5e0 [ 319.054921] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 319.060343] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 319.066711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.071907] RIP: 0033:0x459aba [ 319.075126] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 319.094040] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 319.101769] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba [ 319.109065] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 [ 319.116350] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 [ 319.123637] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 319.130909] R13: 0000000000000000 R14: 00000000004c9c3c R15: 000000000000002b 22:50:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 319.142865] hfs: type requires a 4 character value [ 319.148046] hfs: unable to parse mount options 22:50:51 executing program 3 (fault-call:2 fault-nth:44): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:51 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f00000000c0)=0x2, 0x4) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) ioctl$void(r1, 0x5451) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 22:50:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000400", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:51 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1bb, 0x0) 22:50:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x72, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f00000001c0)={{0x8, 0x1f, 0x80, 0x8, 0xe81, 0x4}, 0x3, 0xfff, 0x4e, 0x401, 0x400, "d7ea479c8666f36eb8c2bf59e92289c8450c71008693afe3539410830fde836745841f8027c3fef78be52f944cd21aef7c6bc2ad7dcc727429fcd0e19f51f05ec0bf1c0bac6c4af3fcf4aa94d109c946b51746606570ed503d45ee6ada446b4b644e1267c8e3deecf5c0fc7c776931c831e4866044afa419728f67dc43035936"}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x1, &(0x7f00000000c0), 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000000)={0xffffffff, 0xffffffff, 0x8, 0x8, 0xffffffffffffff81, 0x4, 0x4}, 0xc) ioctl$KVM_RUN(r1, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) [ 319.667984] FAULT_INJECTION: forcing a failure. [ 319.667984] name failslab, interval 1, probability 0, space 0, times 0 [ 319.668889] hfs: type requires a 4 character value [ 319.679381] CPU: 1 PID: 18199 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 319.679475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.684429] hfs: unable to parse mount options [ 319.691416] Call Trace: [ 319.691460] dump_stack+0x1c9/0x2b4 [ 319.691486] ? dump_stack_print_info.cold.2+0x52/0x52 [ 319.716819] ? __kernel_text_address+0xd/0x40 [ 319.721307] ? unwind_get_return_address+0x61/0xa0 [ 319.726239] should_fail.cold.4+0xa/0x11 [ 319.730304] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 319.735407] ? save_stack+0x43/0xd0 [ 319.739028] ? kasan_kmalloc+0xc4/0xe0 [ 319.742917] ? kmem_cache_alloc_trace+0x152/0x780 [ 319.747793] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 319.752994] ? __list_lru_init+0x4d6/0x840 [ 319.757237] ? sget_userns+0x9ba/0xf30 [ 319.761130] ? graph_lock+0x170/0x170 [ 319.764947] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 319.769693] ? do_mount+0x581/0x30e0 [ 319.773396] ? ksys_mount+0x12d/0x140 [ 319.777195] ? __x64_sys_mount+0xbe/0x150 [ 319.781351] ? do_syscall_64+0x1b9/0x820 [ 319.785430] ? find_held_lock+0x36/0x1c0 [ 319.789518] ? __lock_is_held+0xb5/0x140 [ 319.793591] ? check_same_owner+0x340/0x340 [ 319.797941] ? rcu_note_context_switch+0x730/0x730 [ 319.802906] __should_failslab+0x124/0x180 [ 319.807191] should_failslab+0x9/0x14 [ 319.810997] kmem_cache_alloc_trace+0x2cb/0x780 [ 319.815658] ? __kmalloc_node+0x33/0x70 [ 319.819643] ? __kmalloc_node+0x33/0x70 [ 319.823639] ? rcu_read_lock_sched_held+0x108/0x120 [ 319.828663] __memcg_init_list_lru_node+0x185/0x2d0 [ 319.833677] ? kvfree_rcu+0x20/0x20 [ 319.837304] ? __kmalloc_node+0x47/0x70 [ 319.841294] __list_lru_init+0x4d6/0x840 [ 319.845375] ? list_lru_destroy+0x500/0x500 [ 319.849710] ? up_write+0x7b/0x220 [ 319.853250] ? up_read+0x110/0x110 [ 319.856799] ? down_read+0x1d0/0x1d0 [ 319.860520] ? init_wait_entry+0x1c0/0x1c0 [ 319.864753] ? prealloc_shrinker+0xd6/0x320 [ 319.869097] sget_userns+0x9ba/0xf30 [ 319.872819] ? kill_litter_super+0x90/0x90 [ 319.877062] ? ns_test_super+0x50/0x50 [ 319.880958] ? destroy_unused_super.part.11+0x110/0x110 [ 319.886331] ? kasan_check_write+0x14/0x20 [ 319.890578] ? do_raw_spin_lock+0xc1/0x200 [ 319.894828] ? blkdev_get+0xc8/0xb50 [ 319.898569] ? cap_capable+0x1f9/0x260 [ 319.902475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.908058] ? security_capable+0x99/0xc0 [ 319.912243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.917793] ? ns_capable_common+0x13f/0x170 [ 319.922194] ? kill_litter_super+0x90/0x90 [ 319.926429] sget+0x10b/0x150 [ 319.929568] ? ns_test_super+0x50/0x50 [ 319.933479] mount_bdev+0x111/0x3e0 [ 319.937097] ? hfs_show_options+0x6f0/0x6f0 [ 319.941407] hfs_mount+0x34/0x40 [ 319.944774] mount_fs+0xae/0x328 [ 319.948160] vfs_kern_mount.part.34+0xdc/0x4e0 [ 319.952763] ? may_umount+0xb0/0xb0 [ 319.956448] ? _raw_read_unlock+0x22/0x30 [ 319.960601] ? __get_fs_type+0x97/0xc0 [ 319.964496] do_mount+0x581/0x30e0 [ 319.968056] ? copy_mount_string+0x40/0x40 [ 319.972298] ? copy_mount_options+0x5f/0x380 [ 319.976717] ? rcu_read_lock_sched_held+0x108/0x120 [ 319.981770] ? kmem_cache_alloc_trace+0x616/0x780 [ 319.986616] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 319.992142] ? _copy_from_user+0xdf/0x150 [ 319.996293] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.001841] ? copy_mount_options+0x285/0x380 [ 320.006352] ksys_mount+0x12d/0x140 [ 320.009994] __x64_sys_mount+0xbe/0x150 [ 320.013991] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 320.019025] do_syscall_64+0x1b9/0x820 [ 320.022917] ? syscall_return_slowpath+0x5e0/0x5e0 [ 320.027872] ? syscall_return_slowpath+0x31d/0x5e0 [ 320.032801] ? __switch_to_asm+0x34/0x70 [ 320.036867] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 320.042238] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 320.047085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.052283] RIP: 0033:0x459aba 22:50:51 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x3) fcntl$setstatus(r1, 0x4, 0x7fd) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}, 0x2, 0x0, 0x2, {0xfffffffffffffbff}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f00000001c0)={{0x64d, 0x1}, 0x1, 0x9, 0xffff, {0xdd20, 0x8}, 0x1, 0x400000000000000}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000001180000000000000000f09efdba4afd4169000000000000424e05c3b93417438692e834d4afd8899e9385d3347c53151800e8611391a5a630c6255c42a158d447599825593fbc00000000000000bda8eada694ca712e9811b1a3a5d1d28d80d4c7ea0db37ec968c2124b31983bbf95c49df9dc44af948d28c2101aa6ae9893826b3f1b4e9333def46fd3c0b551b22e577b67e1a779ad870b14bb30ddbf90400178b05"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) [ 320.055485] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 320.074396] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 320.082102] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba [ 320.089371] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 [ 320.096661] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 [ 320.103961] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 320.111257] R13: 0000000000000000 R14: 00000000004c9c3c R15: 000000000000002c 22:50:52 executing program 3 (fault-call:2 fault-nth:45): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 320.167818] hfs: type requires a 4 character value [ 320.173078] hfs: unable to parse mount options 22:50:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:52 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) dup2(r0, r1) dup2(r3, r2) 22:50:52 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000340", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0xffffffffffffffff) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:52 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x150, 0x0) 22:50:52 executing program 2: r0 = socket$inet6(0xa, 0x8000b, 0xfffffffffffffffb) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") dup2(r0, r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x402000, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) getrandom(&(0x7f00000000c0)=""/48, 0x30, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup2(r2, r4) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000140)={0x6, 0x6, 0x8}) write$binfmt_elf32(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x346) getsockopt$inet6_tcp_int(r5, 0x6, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) dup2(r4, r3) [ 320.494240] FAULT_INJECTION: forcing a failure. [ 320.494240] name failslab, interval 1, probability 0, space 0, times 0 [ 320.505616] CPU: 1 PID: 18225 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 320.512656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.522014] Call Trace: [ 320.524618] dump_stack+0x1c9/0x2b4 [ 320.528287] ? dump_stack_print_info.cold.2+0x52/0x52 [ 320.533528] should_fail.cold.4+0xa/0x11 [ 320.537665] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 320.542808] ? graph_lock+0x170/0x170 [ 320.546628] ? save_stack+0x43/0xd0 [ 320.550270] ? kasan_kmalloc+0xc4/0xe0 [ 320.554179] ? __kmalloc+0x14e/0x760 [ 320.557921] ? find_held_lock+0x36/0x1c0 [ 320.562017] ? __lock_is_held+0xb5/0x140 [ 320.566135] ? check_same_owner+0x340/0x340 [ 320.570485] ? rcu_note_context_switch+0x730/0x730 [ 320.575455] __should_failslab+0x124/0x180 [ 320.579712] should_failslab+0x9/0x14 [ 320.583535] kmem_cache_alloc_node_trace+0x26f/0x770 [ 320.588670] __kmalloc_node+0x33/0x70 [ 320.592491] kvmalloc_node+0x65/0xf0 [ 320.596230] __list_lru_init+0x5d9/0x840 [ 320.600321] ? list_lru_destroy+0x500/0x500 [ 320.604665] ? up_write+0x7b/0x220 [ 320.608227] ? up_read+0x110/0x110 [ 320.611783] ? down_read+0x1d0/0x1d0 [ 320.615515] ? init_wait_entry+0x1c0/0x1c0 [ 320.619780] ? prealloc_shrinker+0xd6/0x320 [ 320.624127] sget_userns+0x9ba/0xf30 [ 320.627872] ? kill_litter_super+0x90/0x90 [ 320.632169] ? ns_test_super+0x50/0x50 [ 320.636082] ? destroy_unused_super.part.11+0x110/0x110 [ 320.641475] ? kasan_check_write+0x14/0x20 [ 320.645726] ? do_raw_spin_lock+0xc1/0x200 [ 320.649974] ? blkdev_get+0xc8/0xb50 [ 320.653695] ? cap_capable+0x1f9/0x260 [ 320.657593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.663135] ? security_capable+0x99/0xc0 [ 320.667313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.672867] ? ns_capable_common+0x13f/0x170 [ 320.677296] ? kill_litter_super+0x90/0x90 [ 320.681564] sget+0x10b/0x150 [ 320.684690] ? ns_test_super+0x50/0x50 [ 320.688607] mount_bdev+0x111/0x3e0 [ 320.692262] ? hfs_show_options+0x6f0/0x6f0 [ 320.696609] hfs_mount+0x34/0x40 [ 320.699992] mount_fs+0xae/0x328 [ 320.703402] vfs_kern_mount.part.34+0xdc/0x4e0 [ 320.708018] ? may_umount+0xb0/0xb0 [ 320.711694] ? _raw_read_unlock+0x22/0x30 [ 320.715896] ? __get_fs_type+0x97/0xc0 [ 320.719841] do_mount+0x581/0x30e0 [ 320.723407] ? do_raw_spin_unlock+0xa7/0x2f0 [ 320.723950] hfs: type requires a 4 character value [ 320.727846] ? copy_mount_string+0x40/0x40 [ 320.727871] ? copy_mount_options+0x5f/0x380 [ 320.727890] ? rcu_read_lock_sched_held+0x108/0x120 [ 320.727905] ? kmem_cache_alloc_trace+0x616/0x780 [ 320.727937] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 320.727964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.732932] hfs: unable to parse mount options [ 320.737147] ? copy_mount_options+0x285/0x380 [ 320.737164] ksys_mount+0x12d/0x140 [ 320.737181] __x64_sys_mount+0xbe/0x150 [ 320.737202] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 320.784244] do_syscall_64+0x1b9/0x820 [ 320.788149] ? finish_task_switch+0x1d3/0x870 [ 320.792650] ? syscall_return_slowpath+0x5e0/0x5e0 [ 320.797584] ? syscall_return_slowpath+0x31d/0x5e0 [ 320.802549] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 320.807921] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 320.812783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.818001] RIP: 0033:0x459aba [ 320.821210] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 22:50:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f00000003c0)={0x0, r1}) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000440)=ANY=[@ANYBLOB="090000000000000000000000000000000000973106033d0e375ab6a60031949fdf5100000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) ioctl$TIOCSCTTY(r1, 0x540e, 0x2) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000400)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) dup2(r2, r4) dup2(r4, r3) preadv(r1, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/78, 0x4e}, {&(0x7f00000001c0)=""/159, 0x9f}, {&(0x7f0000000140)=""/18, 0x12}, {&(0x7f0000000280)=""/5, 0x5}, {&(0x7f00000002c0)=""/37, 0x25}], 0x5, 0x0) 22:50:52 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:52 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x24, 0x0) [ 320.840116] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 320.847814] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba [ 320.855081] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 [ 320.862356] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 [ 320.869624] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 320.876882] R13: 0000000000000000 R14: 00000000004c9c3c R15: 000000000000002d 22:50:52 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:52 executing program 3 (fault-call:2 fault-nth:46): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 320.997141] hfs: type requires a 4 character value [ 321.002260] hfs: unable to parse mount options 22:50:52 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getsockopt$inet_buf(r1, 0x0, 0x38, &(0x7f00000001c0)=""/62, &(0x7f0000000200)=0x3e) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x210100, 0x0) dup2(r2, r4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2140, 0x0) clock_settime(0x6, &(0x7f0000000100)={0x0, 0x1c9c380}) dup2(r4, r3) 22:50:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:53 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) 22:50:53 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$int_in(r1, 0x5473, &(0x7f0000000080)=0x4) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time, 0x0, {}, 0x0, 0xfffffffffffffffc}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 321.447543] hfs: type requires a 4 character value [ 321.452597] hfs: unable to parse mount options [ 321.472987] FAULT_INJECTION: forcing a failure. [ 321.472987] name failslab, interval 1, probability 0, space 0, times 0 [ 321.484328] CPU: 0 PID: 18264 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 321.491379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.500758] Call Trace: [ 321.503367] dump_stack+0x1c9/0x2b4 [ 321.507013] ? dump_stack_print_info.cold.2+0x52/0x52 [ 321.512239] ? __kernel_text_address+0xd/0x40 [ 321.516756] ? unwind_get_return_address+0x61/0xa0 [ 321.521714] should_fail.cold.4+0xa/0x11 [ 321.525800] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 321.530920] ? save_stack+0x43/0xd0 [ 321.534572] ? kasan_kmalloc+0xc4/0xe0 [ 321.538464] ? kmem_cache_alloc_trace+0x152/0x780 [ 321.543330] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 321.548549] ? __list_lru_init+0x4d6/0x840 [ 321.552813] ? sget_userns+0x9ba/0xf30 [ 321.556709] ? graph_lock+0x170/0x170 [ 321.560552] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 321.565308] ? do_mount+0x581/0x30e0 [ 321.569033] ? ksys_mount+0x12d/0x140 [ 321.572838] ? __x64_sys_mount+0xbe/0x150 [ 321.576993] ? do_syscall_64+0x1b9/0x820 [ 321.581062] ? find_held_lock+0x36/0x1c0 [ 321.585136] ? __lock_is_held+0xb5/0x140 [ 321.589217] ? check_same_owner+0x340/0x340 [ 321.593591] ? rcu_note_context_switch+0x730/0x730 [ 321.598540] __should_failslab+0x124/0x180 [ 321.602797] should_failslab+0x9/0x14 [ 321.606641] kmem_cache_alloc_trace+0x2cb/0x780 [ 321.611315] ? __kmalloc_node+0x33/0x70 [ 321.615319] ? __kmalloc_node+0x33/0x70 [ 321.619304] ? rcu_read_lock_sched_held+0x108/0x120 [ 321.624332] __memcg_init_list_lru_node+0x185/0x2d0 [ 321.629355] ? kvfree_rcu+0x20/0x20 [ 321.632988] ? __kmalloc_node+0x47/0x70 [ 321.636995] __list_lru_init+0x4d6/0x840 [ 321.641080] ? list_lru_destroy+0x500/0x500 [ 321.645411] ? up_write+0x7b/0x220 [ 321.648972] ? up_read+0x110/0x110 [ 321.652521] ? down_read+0x1d0/0x1d0 [ 321.656244] ? init_wait_entry+0x1c0/0x1c0 [ 321.660486] ? prealloc_shrinker+0xd6/0x320 [ 321.664828] sget_userns+0x9ba/0xf30 [ 321.668560] ? kill_litter_super+0x90/0x90 [ 321.672801] ? ns_test_super+0x50/0x50 [ 321.676694] ? destroy_unused_super.part.11+0x110/0x110 [ 321.682068] ? kasan_check_write+0x14/0x20 [ 321.686305] ? do_raw_spin_lock+0xc1/0x200 [ 321.690553] ? blkdev_get+0xc8/0xb50 [ 321.694276] ? cap_capable+0x1f9/0x260 [ 321.698178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.703720] ? security_capable+0x99/0xc0 [ 321.707881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.713423] ? ns_capable_common+0x13f/0x170 [ 321.717867] ? kill_litter_super+0x90/0x90 [ 321.722109] sget+0x10b/0x150 [ 321.725218] ? ns_test_super+0x50/0x50 [ 321.729115] mount_bdev+0x111/0x3e0 [ 321.732751] ? hfs_show_options+0x6f0/0x6f0 [ 321.737098] hfs_mount+0x34/0x40 [ 321.740484] mount_fs+0xae/0x328 [ 321.743864] vfs_kern_mount.part.34+0xdc/0x4e0 [ 321.748496] ? may_umount+0xb0/0xb0 [ 321.752128] ? _raw_read_unlock+0x22/0x30 [ 321.756281] ? __get_fs_type+0x97/0xc0 [ 321.760180] do_mount+0x581/0x30e0 [ 321.763731] ? copy_mount_string+0x40/0x40 [ 321.767982] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 321.772753] ? retint_kernel+0x10/0x10 [ 321.776669] ? __sanitizer_cov_trace_const_cmp4+0x3/0x20 [ 321.782128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.787695] ? copy_mount_options+0x285/0x380 [ 321.792197] ksys_mount+0x12d/0x140 [ 321.795832] __x64_sys_mount+0xbe/0x150 [ 321.799810] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 321.804840] do_syscall_64+0x1b9/0x820 [ 321.808737] ? finish_task_switch+0x1d3/0x870 [ 321.813256] ? syscall_return_slowpath+0x5e0/0x5e0 [ 321.818192] ? syscall_return_slowpath+0x31d/0x5e0 [ 321.823126] ? __switch_to_asm+0x34/0x70 [ 321.827196] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 321.832573] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 321.837430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.842622] RIP: 0033:0x459aba [ 321.845820] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 321.864795] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 321.872552] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba [ 321.879823] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 [ 321.887093] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 22:50:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 321.894361] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 321.901633] R13: 0000000000000000 R14: 00000000004c9c3c R15: 000000000000002e 22:50:53 executing program 3 (fault-call:2 fault-nth:47): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:53 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) socketpair(0x3, 0x5, 0x4, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000840)={&(0x7f0000000740), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x2c, 0x0, 0x12, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x400}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8080}, 0x0) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) open(&(0x7f0000000040)='./file0\x00', 0x80, 0x2a) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x7}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={r1, 0x3}, 0x8) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f00000000c0)=0x1) fstat(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getgid() write$FUSE_ATTR(r2, &(0x7f0000000280)={0x78, 0x0, 0x1, {0x52af, 0x1f, 0x0, {0x6, 0x1, 0x7, 0x1ff, 0x3, 0x94e, 0xffffffffffff7fff, 0x9, 0x1f2d87e, 0xb0b, 0x100000001, r6, r7, 0x3, 0x5}}}, 0x78) dup2(r3, r5) dup2(r5, r4) 22:50:53 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x1) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x485510f7, 0x40) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x186) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup2(r2, r2) fcntl$setlease(r5, 0x400, 0x2) dup2(r4, r3) 22:50:53 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1a, 0x0) 22:50:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 322.290117] hfs: type requires a 4 character value [ 322.295161] hfs: unable to parse mount options [ 322.326058] hfs: type requires a 4 character value [ 322.331238] hfs: unable to parse mount options [ 322.385210] FAULT_INJECTION: forcing a failure. [ 322.385210] name failslab, interval 1, probability 0, space 0, times 0 [ 322.396756] CPU: 0 PID: 18301 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 322.403792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.413155] Call Trace: [ 322.415762] dump_stack+0x1c9/0x2b4 [ 322.419416] ? dump_stack_print_info.cold.2+0x52/0x52 [ 322.424639] ? __kernel_text_address+0xd/0x40 [ 322.429131] ? unwind_get_return_address+0x61/0xa0 [ 322.434089] should_fail.cold.4+0xa/0x11 [ 322.438186] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 322.443329] ? save_stack+0x43/0xd0 [ 322.446981] ? kasan_kmalloc+0xc4/0xe0 [ 322.450871] ? kmem_cache_alloc_trace+0x152/0x780 [ 322.455739] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 322.460956] ? __list_lru_init+0x4d6/0x840 [ 322.465189] ? sget_userns+0x9ba/0xf30 [ 322.469070] ? graph_lock+0x170/0x170 [ 322.472898] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 322.477663] ? do_mount+0x581/0x30e0 [ 322.481401] ? ksys_mount+0x12d/0x140 [ 322.485209] ? __x64_sys_mount+0xbe/0x150 [ 322.489361] ? do_syscall_64+0x1b9/0x820 [ 322.493429] ? find_held_lock+0x36/0x1c0 [ 322.497499] ? __lock_is_held+0xb5/0x140 [ 322.501590] ? check_same_owner+0x340/0x340 [ 322.505976] ? rcu_note_context_switch+0x730/0x730 [ 322.510931] __should_failslab+0x124/0x180 [ 322.515169] should_failslab+0x9/0x14 [ 322.518986] kmem_cache_alloc_trace+0x2cb/0x780 [ 322.523681] ? __kmalloc_node+0x33/0x70 [ 322.527660] ? __kmalloc_node+0x33/0x70 [ 322.531643] ? rcu_read_lock_sched_held+0x108/0x120 [ 322.536685] __memcg_init_list_lru_node+0x185/0x2d0 [ 322.541723] ? kvfree_rcu+0x20/0x20 [ 322.545385] ? __kmalloc_node+0x47/0x70 [ 322.549361] __list_lru_init+0x4d6/0x840 [ 322.553419] ? list_lru_destroy+0x500/0x500 [ 322.557737] ? up_write+0x7b/0x220 [ 322.561293] ? up_read+0x110/0x110 [ 322.564822] ? down_read+0x1d0/0x1d0 [ 322.568534] ? init_wait_entry+0x1c0/0x1c0 [ 322.572776] ? prealloc_shrinker+0xd6/0x320 [ 322.577105] sget_userns+0x9ba/0xf30 [ 322.580830] ? kill_litter_super+0x90/0x90 [ 322.585071] ? ns_test_super+0x50/0x50 [ 322.588995] ? destroy_unused_super.part.11+0x110/0x110 [ 322.594362] ? kasan_check_write+0x14/0x20 [ 322.598591] ? do_raw_spin_lock+0xc1/0x200 [ 322.602832] ? blkdev_get+0xc8/0xb50 [ 322.606537] ? cap_capable+0x1f9/0x260 [ 322.610429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.615980] ? security_capable+0x99/0xc0 [ 322.620145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.625688] ? ns_capable_common+0x13f/0x170 [ 322.630110] ? kill_litter_super+0x90/0x90 [ 322.634359] sget+0x10b/0x150 [ 322.637468] ? ns_test_super+0x50/0x50 [ 322.641382] mount_bdev+0x111/0x3e0 [ 322.645003] ? hfs_show_options+0x6f0/0x6f0 [ 322.649328] hfs_mount+0x34/0x40 [ 322.652747] mount_fs+0xae/0x328 [ 322.656133] vfs_kern_mount.part.34+0xdc/0x4e0 [ 322.660738] ? may_umount+0xb0/0xb0 [ 322.664386] ? _raw_read_unlock+0x22/0x30 [ 322.668528] ? __get_fs_type+0x97/0xc0 [ 322.672421] do_mount+0x581/0x30e0 [ 322.675978] ? do_raw_spin_unlock+0xa7/0x2f0 [ 322.680408] ? copy_mount_string+0x40/0x40 [ 322.684661] ? copy_mount_options+0x5f/0x380 [ 322.689068] ? rcu_read_lock_sched_held+0x108/0x120 [ 322.694081] ? kmem_cache_alloc_trace+0x616/0x780 [ 322.698952] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 322.704509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.710060] ? copy_mount_options+0x285/0x380 [ 322.714572] ksys_mount+0x12d/0x140 [ 322.718220] __x64_sys_mount+0xbe/0x150 [ 322.722186] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 322.727209] do_syscall_64+0x1b9/0x820 [ 322.731104] ? finish_task_switch+0x1d3/0x870 [ 322.735588] ? syscall_return_slowpath+0x5e0/0x5e0 [ 322.740507] ? syscall_return_slowpath+0x31d/0x5e0 [ 322.745454] ? __switch_to_asm+0x34/0x70 [ 322.749559] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 322.754918] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 322.759802] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.764991] RIP: 0033:0x459aba [ 322.768184] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 22:50:54 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x14b, 0x0) 22:50:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="68667306", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 322.787097] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 322.794800] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba [ 322.802066] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 [ 322.809338] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 [ 322.816603] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 322.823876] R13: 0000000000000000 R14: 00000000004c9c3c R15: 000000000000002f 22:50:54 executing program 3 (fault-call:2 fault-nth:48): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:54 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000004", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:54 executing program 2: r0 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x80) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000280)={'mangle\x00'}, &(0x7f0000000340)=0x54) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) munmap(&(0x7f0000006000/0x4000)=nil, 0x4000) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, [], 0x13}, 0x6}, 0x1c) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup2(r3, r5) dup2(r5, r4) 22:50:54 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) r2 = dup3(r0, r1, 0x80000) r3 = fcntl$getown(r1, 0x9) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000480)={0x6, 0x80000001, [{0x100000000, 0x0, 0x1}, {0x7, 0x0, 0x80000001}, {0x6, 0x0, 0x8}, {0x1, 0x0, 0x3ff}, {0xd, 0x0, 0x7fffffff}, {0x4, 0x0, 0x3b}]}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000340)={{0x1, 0x4, 0x400, 0x5b, 'syz1\x00', 0x100}, 0x2, 0x20, 0xffffffffffffffe0, r3, 0x6, 0x6, 'syz0\x00', &(0x7f00000001c0)=[')\x00', '-+\x00', '}\x00', '\\posix_acl_access$proc$ppp1eth0keyringWself\\\x00', '&*+\x00', "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"], 0x78, [], [0x6, 0x4, 0x5, 0xf7a]}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000080)) 22:50:54 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl(r3, 0x5, &(0x7f00000001c0)="c2554167d27650553261b20c63bcbd10d84fcc512eb432c8a405011887cd27ed393bab8488db72c0d66af14f39dce68121f04cf6a87d4023f7e049774ccadc4fc830a7bbd47efc029902b1c7441c96ab3acdd7cff91c9aa2acd3fcde6645a2db9b82e8ee9a42e13a2df11e54151f0a6c400728c81ed3ff2cb7128ad741451c7c876f354d9a1102900dfd1620c8763593a7200fa7770dc0779e864764e7c268968111389c6e5fcffc9ac4c1b026d94ff1414ba06f1f8b683f76784bad25d73415eb081ba81b554b69db9ef165c4fb6b86e4419364badae9fbdfb3376c5de084e84e6962a2424d0592ab3a7fc11d1d") dup2(r1, r3) dup2(r3, r2) 22:50:54 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x47, 0x0) [ 323.224164] FAULT_INJECTION: forcing a failure. [ 323.224164] name failslab, interval 1, probability 0, space 0, times 0 [ 323.235506] CPU: 1 PID: 18340 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 323.242550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.251900] Call Trace: [ 323.254506] dump_stack+0x1c9/0x2b4 [ 323.258518] ? dump_stack_print_info.cold.2+0x52/0x52 [ 323.263728] ? __kernel_text_address+0xd/0x40 [ 323.268267] ? unwind_get_return_address+0x61/0xa0 [ 323.273212] should_fail.cold.4+0xa/0x11 [ 323.277288] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 323.282405] ? save_stack+0x43/0xd0 [ 323.286042] ? kasan_kmalloc+0xc4/0xe0 [ 323.289948] ? kmem_cache_alloc_trace+0x152/0x780 [ 323.294804] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 323.300006] ? __list_lru_init+0x4d6/0x840 [ 323.304246] ? sget_userns+0x9ba/0xf30 [ 323.308145] ? graph_lock+0x170/0x170 [ 323.311967] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 323.316736] ? do_mount+0x581/0x30e0 [ 323.320465] ? ksys_mount+0x12d/0x140 [ 323.324267] ? __x64_sys_mount+0xbe/0x150 [ 323.328446] ? do_syscall_64+0x1b9/0x820 [ 323.332536] ? find_held_lock+0x36/0x1c0 [ 323.336615] ? __lock_is_held+0xb5/0x140 [ 323.340696] ? check_same_owner+0x340/0x340 [ 323.345028] ? rcu_note_context_switch+0x730/0x730 [ 323.349981] __should_failslab+0x124/0x180 [ 323.354607] should_failslab+0x9/0x14 [ 323.358459] kmem_cache_alloc_trace+0x2cb/0x780 [ 323.363133] ? __kmalloc_node+0x33/0x70 [ 323.367112] ? __kmalloc_node+0x33/0x70 [ 323.371102] ? rcu_read_lock_sched_held+0x108/0x120 [ 323.376142] __memcg_init_list_lru_node+0x185/0x2d0 [ 323.381172] ? kvfree_rcu+0x20/0x20 [ 323.384807] ? __kmalloc_node+0x47/0x70 [ 323.388799] __list_lru_init+0x4d6/0x840 [ 323.392902] ? list_lru_destroy+0x500/0x500 [ 323.397252] ? up_write+0x7b/0x220 [ 323.400800] ? up_read+0x110/0x110 [ 323.404345] ? down_read+0x1d0/0x1d0 [ 323.408078] ? init_wait_entry+0x1c0/0x1c0 [ 323.412325] ? prealloc_shrinker+0xd6/0x320 [ 323.416661] sget_userns+0x9ba/0xf30 [ 323.420397] ? kill_litter_super+0x90/0x90 [ 323.424641] ? ns_test_super+0x50/0x50 [ 323.428533] ? destroy_unused_super.part.11+0x110/0x110 [ 323.433904] ? kasan_check_write+0x14/0x20 [ 323.438156] ? do_raw_spin_lock+0xc1/0x200 [ 323.442400] ? blkdev_get+0xc8/0xb50 [ 323.446135] ? cap_capable+0x1f9/0x260 [ 323.450037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.455601] ? security_capable+0x99/0xc0 [ 323.459755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.465301] ? ns_capable_common+0x13f/0x170 [ 323.469728] ? kill_litter_super+0x90/0x90 [ 323.473971] sget+0x10b/0x150 [ 323.477088] ? ns_test_super+0x50/0x50 [ 323.480982] mount_bdev+0x111/0x3e0 [ 323.484626] ? hfs_show_options+0x6f0/0x6f0 [ 323.488960] hfs_mount+0x34/0x40 [ 323.492348] mount_fs+0xae/0x328 [ 323.495722] vfs_kern_mount.part.34+0xdc/0x4e0 [ 323.500329] ? may_umount+0xb0/0xb0 [ 323.503968] ? _raw_read_unlock+0x22/0x30 [ 323.508120] ? __get_fs_type+0x97/0xc0 [ 323.512042] do_mount+0x581/0x30e0 [ 323.515589] ? copy_mount_string+0x40/0x40 [ 323.519828] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 323.524609] ? retint_kernel+0x10/0x10 [ 323.528524] ? copy_mount_options+0x1f0/0x380 [ 323.533027] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 323.537895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.543480] ? copy_mount_options+0x285/0x380 [ 323.547985] ksys_mount+0x12d/0x140 [ 323.551618] __x64_sys_mount+0xbe/0x150 [ 323.555595] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 323.560633] do_syscall_64+0x1b9/0x820 [ 323.564527] ? syscall_return_slowpath+0x5e0/0x5e0 [ 323.569468] ? syscall_return_slowpath+0x31d/0x5e0 [ 323.574447] ? __switch_to_asm+0x34/0x70 [ 323.578515] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 323.583890] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 323.588742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.593951] RIP: 0033:0x459aba [ 323.597152] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 323.616054] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:50:55 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000140)=""/12) ioctl$VT_RELDISP(r2, 0x5605) semtimedop(r1, &(0x7f0000000040)=[{0x0, 0x3, 0x1800}], 0x2aaaaaaaaaaaabdf, &(0x7f0000000340)={0x0, 0x989680}) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) write$binfmt_elf64(r0, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], 0xa91) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:55 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000040000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="6866738c", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000280)={0x18, 0x1, 0x0, {0xb39}}, 0x18) openat$random(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000240)={'bond_slave_1\x00', {0x2, 0x4e22, @broadcast}}) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000340)=""/194) dup2(r2, 0xffffffffffffffff) dup2(0xffffffffffffffff, r3) getsockopt$inet6_dccp_buf(r0, 0x21, 0x8d, &(0x7f00000000c0)=""/167, &(0x7f00000001c0)=0xa7) [ 323.623766] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba [ 323.631054] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 [ 323.638326] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 [ 323.645604] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 323.652871] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000030 22:50:55 executing program 3 (fault-call:2 fault-nth:49): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:55 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x92, 0x0) 22:50:55 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xda) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) 22:50:55 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000020000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:55 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x131a00, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f0000000080)='./file0\x00', r2}, 0x10) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000008080000000000008e93f285016f677100b089912d6e063d8c9639fb6c"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) [ 324.001530] FAULT_INJECTION: forcing a failure. [ 324.001530] name failslab, interval 1, probability 0, space 0, times 0 [ 324.012826] CPU: 1 PID: 18364 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 324.019852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.029209] Call Trace: [ 324.031812] dump_stack+0x1c9/0x2b4 [ 324.035468] ? dump_stack_print_info.cold.2+0x52/0x52 [ 324.040690] ? __kernel_text_address+0xd/0x40 [ 324.045231] ? unwind_get_return_address+0x61/0xa0 [ 324.050203] should_fail.cold.4+0xa/0x11 [ 324.054279] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 324.059410] ? save_stack+0x43/0xd0 [ 324.063057] ? kasan_kmalloc+0xc4/0xe0 [ 324.066955] ? kmem_cache_alloc_trace+0x152/0x780 [ 324.071820] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 324.077020] ? __list_lru_init+0x4d6/0x840 [ 324.081257] ? sget_userns+0x9ba/0xf30 [ 324.085153] ? graph_lock+0x170/0x170 [ 324.088969] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 324.093728] ? do_mount+0x581/0x30e0 [ 324.097452] ? ksys_mount+0x12d/0x140 [ 324.101258] ? __x64_sys_mount+0xbe/0x150 [ 324.105414] ? do_syscall_64+0x1b9/0x820 [ 324.109488] ? find_held_lock+0x36/0x1c0 [ 324.113561] ? __lock_is_held+0xb5/0x140 [ 324.117654] ? check_same_owner+0x340/0x340 [ 324.121984] ? rcu_note_context_switch+0x730/0x730 [ 324.126937] __should_failslab+0x124/0x180 [ 324.131187] should_failslab+0x9/0x14 [ 324.135004] kmem_cache_alloc_trace+0x2cb/0x780 [ 324.139678] ? __kmalloc_node+0x33/0x70 [ 324.143658] ? __kmalloc_node+0x33/0x70 [ 324.147640] ? rcu_read_lock_sched_held+0x108/0x120 [ 324.152680] __memcg_init_list_lru_node+0x185/0x2d0 [ 324.157706] ? kvfree_rcu+0x20/0x20 [ 324.161334] ? __kmalloc_node+0x47/0x70 [ 324.165319] __list_lru_init+0x4d6/0x840 [ 324.169391] ? list_lru_destroy+0x500/0x500 [ 324.173722] ? up_write+0x7b/0x220 [ 324.177271] ? up_read+0x110/0x110 [ 324.180820] ? down_read+0x1d0/0x1d0 [ 324.184539] ? init_wait_entry+0x1c0/0x1c0 [ 324.188782] ? prealloc_shrinker+0xd6/0x320 [ 324.193118] sget_userns+0x9ba/0xf30 [ 324.196859] ? kill_litter_super+0x90/0x90 [ 324.201125] ? ns_test_super+0x50/0x50 [ 324.205017] ? destroy_unused_super.part.11+0x110/0x110 [ 324.210388] ? kasan_check_write+0x14/0x20 [ 324.214625] ? do_raw_spin_lock+0xc1/0x200 [ 324.218880] ? blkdev_get+0xc8/0xb50 [ 324.222600] ? cap_capable+0x1f9/0x260 [ 324.226498] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 324.232038] ? security_capable+0x99/0xc0 [ 324.236192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 324.241730] ? ns_capable_common+0x13f/0x170 [ 324.246147] ? kill_litter_super+0x90/0x90 [ 324.250400] sget+0x10b/0x150 [ 324.253537] ? ns_test_super+0x50/0x50 [ 324.257429] mount_bdev+0x111/0x3e0 [ 324.261558] ? hfs_show_options+0x6f0/0x6f0 [ 324.265884] hfs_mount+0x34/0x40 [ 324.269284] mount_fs+0xae/0x328 [ 324.272697] vfs_kern_mount.part.34+0xdc/0x4e0 [ 324.277319] ? may_umount+0xb0/0xb0 [ 324.280965] ? _raw_read_unlock+0x22/0x30 [ 324.285128] ? __get_fs_type+0x97/0xc0 [ 324.289024] do_mount+0x581/0x30e0 [ 324.292573] ? copy_mount_string+0x40/0x40 [ 324.296830] ? copy_mount_options+0x5f/0x380 [ 324.301245] ? rcu_read_lock_sched_held+0x108/0x120 [ 324.306263] ? kmem_cache_alloc_trace+0x616/0x780 [ 324.311118] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 324.316662] ? _copy_from_user+0xdf/0x150 [ 324.320830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 324.326370] ? copy_mount_options+0x285/0x380 [ 324.330870] ksys_mount+0x12d/0x140 [ 324.334504] __x64_sys_mount+0xbe/0x150 [ 324.338481] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 324.343505] do_syscall_64+0x1b9/0x820 [ 324.347395] ? finish_task_switch+0x1d3/0x870 [ 324.351897] ? syscall_return_slowpath+0x5e0/0x5e0 [ 324.356838] ? syscall_return_slowpath+0x31d/0x5e0 [ 324.361770] ? __switch_to_asm+0x34/0x70 [ 324.365837] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 324.371211] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 324.376070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.381262] RIP: 0033:0x459aba [ 324.384465] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 22:50:56 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1ca, 0x0) [ 324.403409] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 324.411154] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba [ 324.418425] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 [ 324.425698] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 [ 324.433001] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 324.440265] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000031 22:50:56 executing program 2: socket$inet6(0xa, 0x5, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc8070031b1f6d4e65f") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) 22:50:56 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000004003", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:56 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000000140)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000240)=""/211, 0xd3}, {&(0x7f0000000380)=""/226, 0xe2}, {&(0x7f0000000480)=""/143, 0x8f}, {&(0x7f0000000540)=""/250, 0xfa}], 0x4, &(0x7f0000000640)=""/4096, 0x1000, 0xfffffffffffff801}, 0x2000) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r2 = semget$private(0x0, 0x7, 0x0) semtimedop(r2, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:56 executing program 3 (fault-call:2 fault-nth:50): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:56 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x2, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) write$binfmt_script(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x119) r5 = dup2(r2, r4) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x240200) fremovexattr(r5, &(0x7f00000000c0)=@known='security.capability\x00') dup2(r4, r3) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000140)) 22:50:56 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x123, 0x0) 22:50:56 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{0x20, '/dev/usbmon#\x00'}, {}, {0x20, '[}em1cgroup$$keyringmd5sum[}'}, {0x20, '/dev/usbmon#\x00'}, {0x20, '/dev/kvm\x00'}, {0x20, '/dev/kvm\x00'}], 0xa, "e6049c31a7fbf905da96c64fec4d86f5e18129cc7e8283a4f599880f8cf8d128630edd179b8b608d9b7f3cccd98e944f36377cb0b03bcca6086a2ed58d8c692e695be2a93ba666f0d1eedbe49ab8a3eb0cf7eacf40ecf261af8fd3f14c5282419abd90d8c7888af412ff94b6c152f9db51ac86023c7e24251081ca6491aebafb389962c937faaead79e98af8109d09d1f7f659da31987b897c5d56f5f9aed6d24525c6f753047b9292a05fee6d77d3c50c6351238901f2160b8f9ba41e8b4f525aed84e19650482d"}, 0x121) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:50:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 324.827117] hfs: type requires a 4 character value [ 324.832193] hfs: unable to parse mount options [ 324.851818] hfs: type requires a 4 character value [ 324.856838] hfs: unable to parse mount options [ 325.024832] FAULT_INJECTION: forcing a failure. [ 325.024832] name failslab, interval 1, probability 0, space 0, times 0 [ 325.036174] CPU: 0 PID: 18410 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 325.043223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.052571] Call Trace: [ 325.055191] dump_stack+0x1c9/0x2b4 [ 325.058830] ? dump_stack_print_info.cold.2+0x52/0x52 [ 325.064009] ? __kernel_text_address+0xd/0x40 [ 325.068508] ? unwind_get_return_address+0x61/0xa0 [ 325.073456] should_fail.cold.4+0xa/0x11 [ 325.077548] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 325.082690] ? save_stack+0x43/0xd0 [ 325.086331] ? kasan_kmalloc+0xc4/0xe0 [ 325.090220] ? kmem_cache_alloc_trace+0x152/0x780 [ 325.095071] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 325.100266] ? __list_lru_init+0x4d6/0x840 [ 325.104517] ? sget_userns+0x9ba/0xf30 [ 325.108430] ? graph_lock+0x170/0x170 [ 325.112252] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 325.117013] ? do_mount+0x581/0x30e0 [ 325.120746] ? ksys_mount+0x12d/0x140 [ 325.124565] ? __x64_sys_mount+0xbe/0x150 [ 325.128722] ? do_syscall_64+0x1b9/0x820 [ 325.132793] ? find_held_lock+0x36/0x1c0 [ 325.136864] ? __lock_is_held+0xb5/0x140 [ 325.140966] ? check_same_owner+0x340/0x340 [ 325.145301] ? rcu_note_context_switch+0x730/0x730 [ 325.150243] __should_failslab+0x124/0x180 [ 325.155014] should_failslab+0x9/0x14 [ 325.158821] kmem_cache_alloc_trace+0x2cb/0x780 [ 325.163495] ? __kmalloc_node+0x33/0x70 [ 325.167475] ? __kmalloc_node+0x33/0x70 [ 325.171463] ? rcu_read_lock_sched_held+0x108/0x120 [ 325.176525] __memcg_init_list_lru_node+0x185/0x2d0 [ 325.181563] ? kvfree_rcu+0x20/0x20 [ 325.185198] ? __kmalloc_node+0x47/0x70 [ 325.189186] __list_lru_init+0x4d6/0x840 [ 325.193259] ? list_lru_destroy+0x500/0x500 [ 325.197592] ? up_write+0x7b/0x220 [ 325.201137] ? up_read+0x110/0x110 [ 325.204677] ? down_read+0x1d0/0x1d0 [ 325.208399] ? init_wait_entry+0x1c0/0x1c0 [ 325.212642] ? prealloc_shrinker+0xd6/0x320 [ 325.216982] sget_userns+0x9ba/0xf30 [ 325.220699] ? kill_litter_super+0x90/0x90 [ 325.224955] ? ns_test_super+0x50/0x50 [ 325.228850] ? destroy_unused_super.part.11+0x110/0x110 [ 325.234222] ? kasan_check_write+0x14/0x20 [ 325.238472] ? do_raw_spin_lock+0xc1/0x200 [ 325.242737] ? blkdev_get+0xc8/0xb50 [ 325.246458] ? cap_capable+0x1f9/0x260 [ 325.250360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 325.255901] ? security_capable+0x99/0xc0 [ 325.260073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 325.265611] ? ns_capable_common+0x13f/0x170 [ 325.270026] ? kill_litter_super+0x90/0x90 [ 325.274262] sget+0x10b/0x150 [ 325.277370] ? ns_test_super+0x50/0x50 [ 325.281261] mount_bdev+0x111/0x3e0 [ 325.284893] ? hfs_show_options+0x6f0/0x6f0 [ 325.289228] hfs_mount+0x34/0x40 [ 325.292597] mount_fs+0xae/0x328 [ 325.295983] vfs_kern_mount.part.34+0xdc/0x4e0 [ 325.300603] ? may_umount+0xb0/0xb0 [ 325.304247] ? _raw_read_unlock+0x22/0x30 [ 325.308412] ? __get_fs_type+0x97/0xc0 [ 325.312307] do_mount+0x581/0x30e0 [ 325.315852] ? do_raw_spin_unlock+0xa7/0x2f0 [ 325.320268] ? copy_mount_string+0x40/0x40 [ 325.324528] ? copy_mount_options+0x5f/0x380 [ 325.328956] ? rcu_read_lock_sched_held+0x108/0x120 [ 325.333978] ? kmem_cache_alloc_trace+0x616/0x780 [ 325.338846] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 325.344391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 325.349956] ? copy_mount_options+0x285/0x380 [ 325.354458] ksys_mount+0x12d/0x140 [ 325.358095] __x64_sys_mount+0xbe/0x150 [ 325.362074] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 325.367096] do_syscall_64+0x1b9/0x820 [ 325.370985] ? finish_task_switch+0x1d3/0x870 [ 325.375509] ? syscall_return_slowpath+0x5e0/0x5e0 [ 325.380448] ? syscall_return_slowpath+0x31d/0x5e0 [ 325.385412] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 325.390785] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 325.395660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 325.400851] RIP: 0033:0x459aba [ 325.404049] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 325.422960] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 325.430685] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba [ 325.437964] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 [ 325.445232] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 [ 325.452503] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 325.459783] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000032 22:50:57 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x12f, 0x0) 22:50:57 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:57 executing program 3 (fault-call:2 fault-nth:51): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:57 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x10040, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) [ 325.553442] hfs: type requires a 4 character value [ 325.558574] hfs: unable to parse mount options 22:50:57 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) r4 = dup2(r3, r2) ioctl$EVIOCGRAB(r4, 0x40044590, &(0x7f00000000c0)=0x9) 22:50:57 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0xfffffffffffffffe, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) [ 325.612244] hfs: type requires a 4 character value [ 325.617300] hfs: unable to parse mount options 22:50:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:57 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:57 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x99, 0x0) [ 325.781184] FAULT_INJECTION: forcing a failure. [ 325.781184] name failslab, interval 1, probability 0, space 0, times 0 [ 325.792675] CPU: 1 PID: 18442 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 325.799714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.809087] Call Trace: [ 325.811708] dump_stack+0x1c9/0x2b4 [ 325.815382] ? dump_stack_print_info.cold.2+0x52/0x52 [ 325.820592] ? __kernel_text_address+0xd/0x40 [ 325.825107] ? unwind_get_return_address+0x61/0xa0 [ 325.830144] should_fail.cold.4+0xa/0x11 [ 325.834237] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 325.839372] ? save_stack+0x43/0xd0 [ 325.843010] ? kasan_kmalloc+0xc4/0xe0 [ 325.846905] ? kmem_cache_alloc_trace+0x152/0x780 [ 325.851786] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 325.856995] ? __list_lru_init+0x4d6/0x840 [ 325.861233] ? sget_userns+0x9ba/0xf30 [ 325.865134] ? graph_lock+0x170/0x170 [ 325.868953] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 325.873727] ? do_mount+0x581/0x30e0 [ 325.877451] ? ksys_mount+0x12d/0x140 [ 325.881256] ? __x64_sys_mount+0xbe/0x150 [ 325.885413] ? do_syscall_64+0x1b9/0x820 [ 325.889494] ? find_held_lock+0x36/0x1c0 [ 325.893583] ? __lock_is_held+0xb5/0x140 [ 325.897688] ? check_same_owner+0x340/0x340 [ 325.902038] ? rcu_note_context_switch+0x730/0x730 [ 325.906983] __should_failslab+0x124/0x180 [ 325.911242] should_failslab+0x9/0x14 [ 325.915050] kmem_cache_alloc_trace+0x2cb/0x780 [ 325.919725] ? __kmalloc_node+0x33/0x70 [ 325.923756] ? __kmalloc_node+0x33/0x70 [ 325.927751] ? rcu_read_lock_sched_held+0x108/0x120 [ 325.932803] __memcg_init_list_lru_node+0x185/0x2d0 [ 325.937838] ? kvfree_rcu+0x20/0x20 [ 325.941480] ? __kmalloc_node+0x47/0x70 [ 325.945475] __list_lru_init+0x4d6/0x840 [ 325.949551] ? list_lru_destroy+0x500/0x500 [ 325.953899] ? up_write+0x7b/0x220 [ 325.957496] ? up_read+0x110/0x110 [ 325.961070] ? down_read+0x1d0/0x1d0 [ 325.964805] ? init_wait_entry+0x1c0/0x1c0 [ 325.969049] ? prealloc_shrinker+0xd6/0x320 [ 325.973385] sget_userns+0x9ba/0xf30 [ 325.977105] ? kill_litter_super+0x90/0x90 [ 325.981346] ? ns_test_super+0x50/0x50 [ 325.985252] ? destroy_unused_super.part.11+0x110/0x110 [ 325.990625] ? kasan_check_write+0x14/0x20 [ 325.994869] ? do_raw_spin_lock+0xc1/0x200 [ 325.999114] ? blkdev_get+0xc8/0xb50 [ 326.002834] ? cap_capable+0x1f9/0x260 [ 326.006734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.012303] ? security_capable+0x99/0xc0 [ 326.016477] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.022018] ? ns_capable_common+0x13f/0x170 [ 326.026434] ? kill_litter_super+0x90/0x90 [ 326.030681] sget+0x10b/0x150 [ 326.033789] ? ns_test_super+0x50/0x50 [ 326.037695] mount_bdev+0x111/0x3e0 [ 326.041334] ? hfs_show_options+0x6f0/0x6f0 [ 326.045685] hfs_mount+0x34/0x40 [ 326.049059] mount_fs+0xae/0x328 [ 326.052439] vfs_kern_mount.part.34+0xdc/0x4e0 [ 326.057035] ? may_umount+0xb0/0xb0 [ 326.060666] ? _raw_read_unlock+0x22/0x30 [ 326.064818] ? __get_fs_type+0x97/0xc0 [ 326.068711] do_mount+0x581/0x30e0 [ 326.072258] ? interrupt_entry+0xb1/0xf0 [ 326.076323] ? copy_mount_string+0x40/0x40 [ 326.080567] ? retint_kernel+0x10/0x10 [ 326.084477] ? copy_mount_options+0x1e3/0x380 [ 326.088996] ? write_comp_data+0x1/0x70 [ 326.092978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.098517] ? copy_mount_options+0x285/0x380 [ 326.103019] ksys_mount+0x12d/0x140 [ 326.106653] __x64_sys_mount+0xbe/0x150 [ 326.110634] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 326.115659] do_syscall_64+0x1b9/0x820 [ 326.119560] ? finish_task_switch+0x1d3/0x870 [ 326.124061] ? syscall_return_slowpath+0x5e0/0x5e0 [ 326.128999] ? syscall_return_slowpath+0x31d/0x5e0 [ 326.133946] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 326.139322] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 326.144180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.149372] RIP: 0033:0x459aba [ 326.152570] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 326.171482] RSP: 002b:00007f43a945ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:50:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000100)={0x0, 0x2000000001, 0x1, &(0x7f0000000080)}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r4 = semget$private(0x0, 0x7, 0x0) semtimedop(r4, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2040, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f0000000140)={0x7fff, 0xfff, 0x3, {r6, r7+10000000}, 0x7f, 0x8001}) ioctl$fiemap(r5, 0xc020660b, &(0x7f0000000240)={0x3, 0x6, 0x4, 0xfdc0000000000000, 0x1, [{0x3, 0x4, 0x5a, 0x0, 0x0, 0x80}]}) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r4, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) [ 326.179204] RAX: ffffffffffffffda RBX: 00007f43a945eb30 RCX: 0000000000459aba [ 326.186503] RDX: 00007f43a945ead0 RSI: 0000000020000080 RDI: 00007f43a945eaf0 [ 326.193787] RBP: 0000000020000080 R08: 00007f43a945eb30 R09: 00007f43a945ead0 [ 326.201076] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 326.208347] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000033 22:50:58 executing program 3 (fault-call:2 fault-nth:52): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000340)={0x5, 0xe0, 0x4, 0x2, 0x6, [{0x7, 0x100000001, 0x1}, {0x0, 0x1, 0x7, 0x0, 0x0, 0x3088}, {0x67, 0x3, 0x5, 0x0, 0x0, 0x200}, {0x40, 0x9, 0x8001, 0x0, 0x0, 0x400}, {0x401, 0xe39, 0x3, 0x0, 0x0, 0x1003}, {0x80000001, 0x5, 0x0, 0x0, 0x0, 0x268e}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:50:58 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000400", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:58 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = dup2(r1, r3) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() write$FUSE_ATTR(r4, &(0x7f00000001c0)={0x78, 0x0, 0x4, {0x9, 0x9, 0x0, {0x0, 0x3, 0xcee, 0x3, 0x346, 0xd5, 0x40, 0x8675, 0x3, 0x5, 0xdadb, r5, r6, 0x6, 0x4287}}}, 0x78) openat$cgroup_ro(r4, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) dup2(r3, r2) 22:50:58 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xe0, 0x0) [ 326.384173] hfs: type requires a 4 character value [ 326.389199] hfs: unable to parse mount options 22:50:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 326.428963] hfs: type requires a 4 character value [ 326.434023] hfs: unable to parse mount options 22:50:58 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x8001, 0x400000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000004000000a19d88f03f9207b602a0ece25d23c32145f795db00000000009eeb136c1334b2945b41786379d5d7660429980106000000000000000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:58 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000200", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:58 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1b9, 0x0) 22:50:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f00000000c0)="4bbfca32b7467223f552a2663ba2ff79c22ce3416479fab88a290e73dba10a2bd90ac9267803252ad02391d6d9c6130f3a02bc6eaace7dc386dd3cf5508184125e6117d4b4f0f24c185812e911a4fd", &(0x7f00000001c0)="705cf766a094e5c9c662974344285bc7200350c9c96af1aacc08d5b437743264f209cb0236797c1b1d64a9fc4a40139a2ad2c40e8d79a6a33d8a007e9d36be03803c6c5515a0adc3ebdc5f5a95cae7ba248b2227de8f163c9c64b53aa516a833f90203d0b2d6f39de3bc"}, 0x20) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) [ 326.683333] hfs: type requires a 4 character value [ 326.688428] hfs: unable to parse mount options [ 326.750966] hfs: type requires a 4 character value [ 326.756018] hfs: unable to parse mount options 22:50:58 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000040", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:58 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x100000000000002) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000009000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:50:58 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 327.095550] hfs: type requires a 4 character value [ 327.100652] hfs: unable to parse mount options [ 327.110627] FAULT_INJECTION: forcing a failure. [ 327.110627] name failslab, interval 1, probability 0, space 0, times 0 [ 327.122002] CPU: 1 PID: 18477 Comm: syz-executor3 Not tainted 4.18.0+ #199 [ 327.129047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.138456] Call Trace: [ 327.141065] dump_stack+0x1c9/0x2b4 [ 327.144717] ? dump_stack_print_info.cold.2+0x52/0x52 [ 327.149943] ? __kernel_text_address+0xd/0x40 [ 327.154795] ? unwind_get_return_address+0x61/0xa0 [ 327.159760] should_fail.cold.4+0xa/0x11 [ 327.163856] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 327.168981] ? save_stack+0x43/0xd0 [ 327.172613] ? kasan_kmalloc+0xc4/0xe0 [ 327.176521] ? kmem_cache_alloc_trace+0x152/0x780 [ 327.181389] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 327.186597] ? __list_lru_init+0x4d6/0x840 [ 327.190861] ? sget_userns+0x9ba/0xf30 [ 327.194776] ? graph_lock+0x170/0x170 [ 327.198598] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 327.203361] ? do_mount+0x581/0x30e0 [ 327.207081] ? ksys_mount+0x12d/0x140 [ 327.210888] ? __x64_sys_mount+0xbe/0x150 [ 327.215053] ? do_syscall_64+0x1b9/0x820 [ 327.219130] ? find_held_lock+0x36/0x1c0 [ 327.223206] ? __lock_is_held+0xb5/0x140 [ 327.227295] ? check_same_owner+0x340/0x340 [ 327.231641] ? rcu_note_context_switch+0x730/0x730 [ 327.236605] __should_failslab+0x124/0x180 [ 327.240864] should_failslab+0x9/0x14 [ 327.244683] kmem_cache_alloc_trace+0x2cb/0x780 [ 327.249369] ? __kmalloc_node+0x33/0x70 [ 327.253358] ? __kmalloc_node+0x33/0x70 [ 327.257354] ? rcu_read_lock_sched_held+0x108/0x120 [ 327.262888] __memcg_init_list_lru_node+0x185/0x2d0 [ 327.267961] ? kvfree_rcu+0x20/0x20 [ 327.271600] ? __kmalloc_node+0x47/0x70 [ 327.275606] __list_lru_init+0x4d6/0x840 [ 327.279688] ? list_lru_destroy+0x500/0x500 [ 327.284035] ? up_write+0x7b/0x220 [ 327.287599] ? up_read+0x110/0x110 [ 327.291145] ? down_read+0x1d0/0x1d0 [ 327.294873] ? init_wait_entry+0x1c0/0x1c0 [ 327.299129] ? prealloc_shrinker+0xd6/0x320 [ 327.303481] sget_userns+0x9ba/0xf30 [ 327.307207] ? kill_litter_super+0x90/0x90 [ 327.311470] ? ns_test_super+0x50/0x50 [ 327.315382] ? destroy_unused_super.part.11+0x110/0x110 [ 327.320806] ? kasan_check_write+0x14/0x20 [ 327.325080] ? do_raw_spin_lock+0xc1/0x200 [ 327.329330] ? blkdev_get+0xc8/0xb50 [ 327.333070] ? cap_capable+0x1f9/0x260 [ 327.336989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.342531] ? security_capable+0x99/0xc0 [ 327.346688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.352230] ? ns_capable_common+0x13f/0x170 [ 327.356643] ? kill_litter_super+0x90/0x90 [ 327.360891] sget+0x10b/0x150 [ 327.364019] ? ns_test_super+0x50/0x50 [ 327.367943] mount_bdev+0x111/0x3e0 [ 327.371580] ? hfs_show_options+0x6f0/0x6f0 [ 327.375907] hfs_mount+0x34/0x40 [ 327.379307] mount_fs+0xae/0x328 [ 327.382684] vfs_kern_mount.part.34+0xdc/0x4e0 [ 327.387276] ? may_umount+0xb0/0xb0 [ 327.390910] ? _raw_read_unlock+0x22/0x30 [ 327.395074] ? __get_fs_type+0x97/0xc0 [ 327.398986] do_mount+0x581/0x30e0 [ 327.402532] ? do_raw_spin_unlock+0xa7/0x2f0 [ 327.406974] ? copy_mount_string+0x40/0x40 [ 327.411221] ? copy_mount_options+0x5f/0x380 [ 327.415662] ? rcu_read_lock_sched_held+0x108/0x120 [ 327.420707] ? kmem_cache_alloc_trace+0x616/0x780 [ 327.425558] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.431117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.436656] ? copy_mount_options+0x285/0x380 [ 327.441162] ksys_mount+0x12d/0x140 [ 327.444800] __x64_sys_mount+0xbe/0x150 [ 327.448778] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 327.453807] do_syscall_64+0x1b9/0x820 [ 327.457701] ? finish_task_switch+0x1d3/0x870 [ 327.462213] ? syscall_return_slowpath+0x5e0/0x5e0 [ 327.467152] ? syscall_return_slowpath+0x31d/0x5e0 [ 327.472093] ? __switch_to_asm+0x34/0x70 [ 327.476166] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 327.481553] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 327.486410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.491607] RIP: 0033:0x459aba [ 327.494809] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 327.513723] RSP: 002b:00007f43a941ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 327.521462] RAX: ffffffffffffffda RBX: 00007f43a941cb30 RCX: 0000000000459aba [ 327.528747] RDX: 00007f43a941cad0 RSI: 0000000020000080 RDI: 00007f43a941caf0 [ 327.536038] RBP: 0000000020000080 R08: 00007f43a941cb30 R09: 00007f43a941cad0 22:50:58 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x6d, 0x0) [ 327.543313] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 327.550586] R13: 0000000000000000 R14: 00000000004c9c3c R15: 0000000000000034 [ 327.580533] hfs: type requires a 4 character value [ 327.585628] hfs: unable to parse mount options 22:50:59 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r0 = semget$private(0x0, 0x7, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r2, 0x3c, 0x0, @ib={0x1b, 0xff, 0x5, {"e26f7d78b7b214281988658f1b89f4d7"}, 0x80000001, 0x10000, 0x400}}}, 0x90) semtimedop(r0, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r0, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:50:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r2) dup2(r4, r3) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x400000, 0x0) 22:50:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:59 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x5, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x8, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x200000000, 0x0, 0x80000000000007}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:50:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:59 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x15d, 0x0) 22:50:59 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f00000001c0)="3e3e0f01ca0aaa00a00f20d86635080000000f22d80f01c80f01ca2e35c500f336f64747e366b9a90b00000f32360fc75b00a20800", 0x35}], 0xe4, 0xfea64b5def490aeb, &(0x7f0000000200)=[@cr4={0x1, 0x20000}], 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000040)={0x3, r1, 0x1}) dup2(r2, r4) dup2(r4, r3) 22:50:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000003", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:50:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f0000000100), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) socket$packet(0x11, 0x2, 0x300) [ 328.022944] hfs: type requires a 4 character value [ 328.027971] hfs: unable to parse mount options [ 328.054554] hfs: type requires a 4 character value [ 328.059641] hfs: unable to parse mount options 22:50:59 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xde, 0x0) 22:50:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:50:59 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getegid() r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x4000005, 0x2580) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000100)) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x6, 0xfffffffffffffc00, 0x200}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x101400, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) [ 328.077906] hfs: type requires a 4 character value [ 328.082950] hfs: unable to parse mount options 22:50:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='\nfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:00 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:00 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xb3, 0x0) [ 328.366694] hfs: type requires a 4 character value [ 328.371722] hfs: unable to parse mount options [ 328.400721] hfs: type requires a 4 character value [ 328.405859] hfs: unable to parse mount options 22:51:00 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r2, &(0x7f0000000380)="5d81bd106d6d75a4627be65f68bd7571aa452d1f9d457db7f939d9c6650501e571dc123b3822d718cdaf7dd3dae90360cb540ab74bf623bb1756d17a9a3d9070e9f21cbef98bec348a1dd467ddae2c3675cdc5a3f6b7119d00066acfd0705a7f1bbc00e6eb879ac1ce0bbe4e66ad399d1445e3fb960f1f8857713f976eb31ddac3f9e705d1c7631f068d3563411838ee792a78b353cf46f6241fbc3852a1fc3de817e7bc6ec8f214f1a9328e75d92cdf3e3d9dc4e2ab1b135793778b8371325124f34694753e5878cbc3a9eb644378d91aca89d5c000f31c23498368bde15b3f09b180a4593adeea1ddfe4c339a957ad19e80561a13bea35a88d2f93df4b155907b70b85a755951a3d9afb10cd49eeff699b4592193ef14664079b713514070e54594dfb3e6986e80c30fe0a17e9e6cb2ddcb936226354132977df741a18cbcc4278a2bfd3eff39e8fe030b34c2f7f5d09ceffb72f1b74503690232ade629490faba5f06a2a28a3e7f849630ca228f769578462ff34e0aa314ac22bdb34ac6c3a574a6ace1d3f7c2f009c8fdbfda3f93a42f508738a6e00cbb2debfcfe1f4475e218c73efe9f0e54cc6204828fa9708fd634981ca3626787cf3a6c2522987fb3d1321c43ba8677a73fff726fb99dee0335dfe00b6ba87c37a25c5632014f256e46bb988c20710416d1a3d8635fd4ab96dad02d6a5d92cd5f400c53f178d75028f7683a441a9e29474cea7ef55028fa9d81e2c950321889c77181b3aff430e394b5229eba6b7ff1d4b5e18052234a3c2097bae96984324182b217cdbf6e0bebe7f94e0ba34ad96a20d1028c8bab0f95a4b77af3f809a33b46d1c652418fc669dcdfc6de6c24a5bfd6cc1cf08be753d43fd527d9fd4b205a8478594bfc36cc080152a8b37f52cb67d7539280fda7b6aa9117af2bf2a2048f0f18c184623a4f4b2885c1ee491324da6b2a9095c8ab2a55ba43a8bbbdf60f3c0f5b3732d5f2ea298b4bd61a83a33d2336928d89d2d25c3694f9b52db252da0fcf187f97e022d778b1fd1de4b2d2cec883c4d7bf974b393e9e99be6eeb5b676829358ddc2b055c1193aec18d9b334fa6be08739ac9caa4b78e65942c1df035b180dac476016783791f90c8773f8f8a91558b1a6d17f36d0afe5e3ff85fbb5f9b141e39493e337f8945d1175f43a3621d5e6197db0768c5b905cfffb0acdf340f13ae00956bd6c0699d5bc3ff9a4e9fbd78e0ccd7208a7ec6d2782458f7aa16eb23de678d259fee62299922221867d10966b5766362e51c9736dd0bdfd6e3a7de904e33069b167283ec09ba6fffe196a21ff04974d092baad54f685781d64877511fb4dba732b3fba5074a3ae5e60804ebc94f267fcf78260be0392060ed2ade137e3b54b3d1c991fdb089f620e864a9c00d9e07c56ba626a1ce04da41c58b3db84b0b0d4beb690af21b761fd6d8b6abb358b3a106cd475ece8c746de30fd9bd776f97498bd614a5889c181d7e6a367ddf0804c33309e5586affe71d3e2e80cc134b2e24d6e6718dc50b9f6cb19d1bf756db8f79ca912df156315fe82bcd570c15d6ab58853deb8eeb06d0a43cb4b087b5cfd2cf6e694d15dea7f251331b3d8672ffa937ccb516e137bf517dfc4779ceaa1045eb9b16fdb0ef9e3828ba74aa854bc7e8335d16ed0039084e9af29af4ec8af92dbbeb1aaab163a66fdb379a21cdd74e5438a0497fc978c1bd5f29cc2245d412eecd9a1c7ff7f8f774ea0fa7eba05c615dfee9ec90083b267b71259d9398535c963b2f2f3c72a378b34920413165ab5c25d43b6a5068af0ddce97b841331e051446797fe80c4af2c9731ff37dc77a176cbd0f0356fe0038bee2c9816d21d16a0382476b1997df513eee342ac0b336f56f172d5607170784cce223a5b1b08f860c717998a8a5b7750e28e2278039e8aafb9422a2062472c425a29ab50c7c2fcad0057e53f89646544599273401fc885620732e5e690ef0eeb3f764a2bc442df34968ab70385b6c71baed769a2313b108db4e9ced30f920e01143c62e0a6806b653598a9d9727d5d39035968e5dbf6176b028479572144972fd669701196095bd41bd6315835dcf0fb074cc9db2ae483ca9bc117890292818b29a6607cc8820ba3d7842d4ba603661be468df500b8c9d368d0fec86477b334f1fb33739bb6354afe362dd670525b817555ecfc3fb7441a53ceb9a4bfa35cbf9578d17f74cb840e09d3ba0785b6bc04cac5f09b2f4f58b41f4fbf64043973e7f1a0fdbb745db30fd6eb6de7b87134e8d171ff7c588c344036e030302957c76fd60c966e923c6e74e50b00f717f20c3a0a03d29750e4f2283f68c2e09e501f07d51c7fca9bdeed08a354a3cdb3f0beee6086d94cae7d79dfd596d7128814ab25688607475a988069ff78f7afcc465c36de94009b9fccc5716bdcad695685d842ddd400e197d91b5fa3a70edb66d0ffc99711984ada808f8f50be88b48396d9c5268f3844399c504c9a636d81549f230c9b3e42b1b020449f3d724ab0a5bef1bb4a6d6f3d44c9675cae2681a9747bb21a31a474d590782a1b8e893bc4d307df765668f2af209df872062c7081a43e32d40e36725039799299edf8728307096923bbdd1ecad4b4842218d141b32b2f70ff1c83a510d1cf13756c1aa213ee436211b7692a41af76914886b05f183c744a90e2f50013350c53da31f40e57f5172aca1dd48540b8224ef6aa87d4dc787da15ef60a47407ed2d45d20d0abaae4ba748ad1842b8afc3e0485514e2f7fb8408aba4e4bae878143437cfe221afdd33f0a82d978490d18ce969676ea30a5ff9cd91ddc040801de1f303bd3d20577e956beb2c0fbb4548f0773d8f7fb2ec10fef0894b39c2a5c57eaa52b9b37509e7a757f3450616d4c19b7d797f8c710e1d87a9181f0e0fbcdfca53f1884f6bcf4bdbdedb081c9a68d3625356cd8f19ebf21a2178feb2305a55d68d9a22f18a401abcd56e56f743e3fd85a34cf122fcd2ce43e6a276a48d21f829e88ecf2169aa52adf6361fa4ff741c7071911ac9af1126649c5d867a3656af8f490e51740551fbb9933df09b37475dfba1a5daeecfb940eb21bf58f0e70b59011d66d456aebd815ec6592fff4c5bb9e32e1aa488db8631c18a346fcd0008417317f3b65817e58d77faf60c6e5b940c3efb72887ff1931efdf7a1585ab109af10af6d6ff39cbcef51fa4af395ccfa3dfcb28d390769fb968a7441f389a4863d109e7486fce0eb6d6ba15711abae484f4d753a5a392e71de5d7ab5ec950fd0c18df284374a5316667b0bd6f55f1c292a61704e3c092d122c4bd8684c21914800ec5b5862a61a62255fb683d1f24673e42aeb574059c99f8a0ced9f123b126ee601df971425ce072ead6f9b594d98616e8eafa371374c00e20ddf995066f2587baf222a89be85ec41a45bf1c405a538608f167961188c2f95dee6e41167c04aeee71530856206f039d77d6d7d2aed844691434ee3f861e170785eb8115a505978ab1a74ec5eba0a6a77e2a5aaf2712b0faa97906ebc59abbcc21109156c7f8ef4d17cae91d96560e491aaa97e90aecc8bd3f01a15dd315434b967e9bba819d4e75b32849a43b218473dc3215a3642544a2d68e39979f4ec6f7607564bcc94265c7385352c7bd8fba5df05984d7135d15daaf759f2da44a300340cd9a745ef2a0b2d753d7b5c50aba79836f4780766da487829ead825822b5115d8f1bda4a80be28e7d950ac563b146e20032a5391fd40a537b4f239523db9ec7c57ea9590a682bc28037e2dcf687ecc0d8d7a5facfc5badf05efb9939a7806732d5ab3f45ffb1efe29396aeb5896dc6b4d3ddb654bbdd0822406538234d5341079e4020a5ce5be3f2002605d92c49f66be7e5d10de7cc9fa4c354e8b7fd07ef6d5692fe15910ba48b8e914640e4565500011945cb3cd8a9677579d5192a64c1650f3aa559c07cda93ad460b49ab2b2fb0287e8f803c3b80575e71d65c9f3e9d17232fe6a3e83c762111f3ba16f72645a6c13b49760a05557f60db51e1ef7f9ad705df30e7ad4e20d18574d9f8723f50a8f007f64401d26cdbaae34e557e7261bda2a7e1c8da3fad6fcb0d7c900ff97027ceaad5becf75967c8d7de3937420ec197ecc7a509e151fce7a29976ab9a46aaaecaddb58234d9ac10cc311fff22c3b53924f93732c0b216277885c3f5bfc7bcf6ff5cfa784415fa456993348ae293ca0a5f78edd431cfa029483c11995382a3bbc3319a6bcb646dd2a149bc6e84d26ef01ed54f694a1bec24c5e3c477c184caf8997ed519b99fc0c229f1908394244c342179649792b49fd70cb9a441cc7db973ce1e97e9e29910e82eccc2960b3b11a323e249417c7ed28a6245c770347bdc771d356f954e3e6ef27fcb955d1c447553818034265571d1f687e71a7f03899456feeea1db06b8e2172e348ef3cbed6cf43aa889392778594244e1f70d9f24f94d3450c070d7c153ba862adcb56065ae58b8b73172397adeace553a734ed110459e56dfd86578c5946ea8cde29bbde53844610bcdf8d624ed99c1891bb96bafaa9a12c60118b48dbf10f9e17ff56d5a0aeb493f4f66ad2938f503ef6e5c1c4a40caf8898c1de853aff4ced5ffd282b5812552c4c02978df495c58e40345b45bb46a609a515241921cbde698e4c7e44a215ac9dcec028a7b90a2d155a27600f618a1f86c5126824e8a62a8efe8985ecf7ad75d86b7da811c923588c6f972561f9900034b0b60b76cb17c8fdb5a7ef2b4145a6fe8e804f86e74816e3d9dab27c4496f7de3401a0fbf92993d979c0bb19da87f1547aa998bff3b677e2cf41a6b6fff4dd22ac5cf13cfe406fbabbeaf760972c3bae9f543839d262f6378a4f19cac1b21d5017e1d79160ec51f3629f2e8a91525cf3e8d2786494a0947a14021ec65d63f3ba50da064b2cfd1e816078e1b2952527cdba140c52358cd8d8af079669429b5c0080ec5fc29b6b6d896638f4836c80d454927a23cb7ced88b388fa43d2da22f01aae80ec33aeb0d6d57d6308007ed04fed3c65d73a409a51a26f4e143b4ba162a70602d612fd22ad61904ccb2a09c102fd5af6d2184e30d24c18520c29a8caef104426d205f47a6d04fae469946208755f9e0ad1f79b910b9d65873cba23dab47c08481010591149a7676e0f0ea066105c75d6b640c2f5e3482b363e748da8a6893e6d42b99812834a88da7cb86a13d7267428dbd3b75096273ae056c3e7b451ab33dd82a73c523e8b84a6939f2e533251767d53b987e8c37c727628b2d18040feceef8b5a7bc2e5236ddfef8bba880c8ce388426f9d61ef059f0faddaffd985f83e81d5501cbbb7a58e1f7d34c20b428d82ca572e7f80bf04be534a08ed51eed1daf9f67d12576a56ed44c8a7572033bcfa3be32b1d3ad96891041e02ba100caffec7bea33b50286991c613b4e9f04567ad70d579a25d61944762016f26b9599bcf298c1d079b1e3249407d644c0de73b22dbb4c6abb9f8ad49462a14db18021a74c223f3b36a0a89e9e3cbdedfd068734c30ffd92a762693ded77d6088bffcd57eedfbaef6fd74e1c1a1233622037101f6e68f1bdce0aef2d1be3c76487a4897dc8f9fa6eb805e5bcf2a1b98098ea2e02b836479ef433608663722e8262621765317695ce32bc23d4d3d9ff34ad2d4cba8679f7f10f3a5a4651486df7097bab8e9d4b540affd2c9af0866045073b78254c76cbb7c302e341f497da4ef6ef5b6a6f6a5bc81ad18421a3ecddeb6b4a45c7a4435e9b2db6d17e690c0b160b5ada8"}, 0x10) 22:51:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) dup2(r1, r3) dup2(r3, r2) 22:51:00 executing program 6: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x80000000000005, 0x80) ioctl(r0, 0x6, &(0x7f00000000c0)="00315f8571a173225e9c70") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r4 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r4, 0x107, 0x8, &(0x7f0000651000)=""/240, &(0x7f0000000000)=0xf0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup2(r1, r5) dup2(r5, r2) 22:51:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='%fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:00 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xc4, 0x0) 22:51:00 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:00 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) [ 329.012272] hfs: type requires a 4 character value [ 329.017303] hfs: unable to parse mount options 22:51:00 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:00 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xe, 0x0) [ 329.091597] hfs: type requires a 4 character value [ 329.096632] hfs: unable to parse mount options 22:51:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000000c0)={@empty, @multicast2, 0x0, 0x2, [@multicast2, @broadcast]}, 0x18) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000100)=0x5) 22:51:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='h\ns\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:01 executing program 6: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000500)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f00000000c0)={0x2, r0, 0x9f0ac0700fa3ba16}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) fchown(r1, r2, r3) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) r5 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r7, r8, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) dup2(r6, r8) dup2(r8, r7) readv(r5, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/198, 0xc6}, {&(0x7f0000000440)=""/99, 0x63}], 0x2) 22:51:01 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:01 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x162, 0x0) [ 329.578274] hfs: type requires a 4 character value [ 329.583330] hfs: unable to parse mount options [ 329.621092] hfs: type requires a 4 character value [ 329.626126] hfs: unable to parse mount options 22:51:01 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) dup2(r2, r4) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x10, 0x40) dup2(r4, r3) 22:51:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup2(r2, r4) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f000000c000/0x4000)=nil, 0x4000}, 0x3}) r6 = dup2(r4, r3) getsockopt$inet_sctp_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0xfffffe9a) 22:51:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:01 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='h%s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:01 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x131, 0x0) 22:51:01 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xffffffff, 0x200200) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x6, 0x8, 0x6, 0x6, 0x1b}, &(0x7f00000000c0)=0x98) personality(0x8000000000000) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e23, 0x8001, @empty, 0xffffffffffffffe1}}}, 0x84) r2 = socket$inet6(0xa, 0x80023, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r3 = semget$private(0x0, 0x7, 0x0) semtimedop(r3, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={r1, 0x100000000, 0x3, [0x6b, 0x8, 0x8]}, &(0x7f00000001c0)=0xe) semop(0x0, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}], 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000440)={{0x6, 0x5, 0x101, 0x5, 'syz0\x00', 0x1000000000000000}, 0x1, [0x7f, 0x101, 0x3d97534d, 0xfff, 0x9, 0x4, 0x4, 0x2, 0x401, 0x6, 0x3, 0x3f, 0x1, 0x800, 0x3f, 0x1f, 0x3, 0x800, 0x2, 0x9, 0xc1, 0x5d, 0x0, 0x4082, 0x0, 0x7fff, 0x6, 0x4, 0x1, 0x0, 0x40, 0x7, 0x1000, 0x1, 0x10000, 0x3, 0x80000001, 0x4, 0x8, 0x2, 0x2, 0x942, 0xfffffffffffffeff, 0x3, 0x0, 0xeb, 0x8, 0x666d318d, 0x9, 0x40, 0x4, 0x3f, 0x0, 0xa37, 0x1, 0x45, 0x1af, 0x9, 0x7, 0x2, 0x7ff, 0xff, 0x8, 0x4, 0x0, 0x6, 0x7ff, 0x7ff, 0x8271, 0x5, 0x6, 0x0, 0x6, 0x100000001, 0x7, 0x800, 0xf52c, 0x8, 0x4, 0x0, 0x800, 0x3, 0x4, 0xd26, 0x3, 0x2, 0x738, 0x7, 0x33, 0x100000001, 0x7ff, 0xa11, 0x9, 0x4, 0x9, 0x0, 0x7, 0x4, 0xfffffffffffffe00, 0xfd4, 0x26e, 0xdb4, 0x1, 0x40, 0x1, 0x40, 0xf7, 0x9, 0x5, 0x3, 0x5, 0xaf, 0x6a00, 0x8, 0x369d4d5a, 0x2, 0x1, 0x4, 0x5, 0x1, 0x6c, 0x2, 0x6, 0x9, 0x4, 0x2, 0x571e], {0x0, 0x989680}}) semtimedop(r3, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:01 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x18) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/userio\x00', 0x20000, 0x0) openat(r2, &(0x7f0000000480)='./file0\x00', 0x563a82, 0x8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time, 0xffffffffffffffff, {0x20000000000000}, 0x4, 0x0, 0x401}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000001180000000000000000000000000000000000000000000010eef063"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) timer_create(0x6, &(0x7f0000000200)={0x0, 0xc, 0x3, @tid=0xffffffffffffffff}, &(0x7f0000000240)=0x0) timer_gettime(r3, &(0x7f0000000280)) r4 = syz_open_dev$sndpcmp(&(0x7f0000000340)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x210540) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r4, 0xc0505510, &(0x7f00000003c0)={0xffffffffffffffea, 0x1, 0x2, 0x0, &(0x7f0000000380)=[{}]}) 22:51:02 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xa6, 0x0) 22:51:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:02 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f00000001c0)={0x8000, 0x7fff, 0x262, 0x7, 0x7fffffff, 0x10001}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000016000000000000011800000000020000000100000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:02 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/cuse\x00', 0x40, 0x0) recvfrom$llc(r0, &(0x7f0000000740)=""/131, 0x83, 0x10002, &(0x7f0000000800)={0x1a, 0x308, 0x101, 0x1000, 0x9, 0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x440000, 0x0) syz_mount_image$bfs(&(0x7f0000000140)='bfs\x00', &(0x7f0000000280)='./file0\x00', 0x1f, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000340)="0c3b01fd1a1b870756015c4a351be84834477e07659d53cfd267399de68666de9d04ec6ab56c8d2ba6a7da61992f6c9a6c804311aa2187e51fccabb49ebfdfc81e3ab645ceb0b36839e8d40f109ceec36eb0c08a11650b43fe12fe9291bbcedabd6b9916f623868d87daae8b37f9ec927c1e487c10edb6f865e7988c4b533080889e62d9c8ad78f9f6dc5d29916f46d552d4c64d6d79260277258aa2af78935be2504b06a59c2d806a9d2c82e5b4e6c650dd40e4a4d151dfdfceab0efb233bfd310885f82daaec8805a7e4b32d3061addeea9a67bfe3915fc0addfc4968eaf33c8d3918dea1a19670e53a60dfb7923bf1d11a789c97353", 0xf7, 0x1}, {&(0x7f0000000440)="2042297143c205d34d89ebdd378442507c40e919bc7e829b015536f37d1b2babd6dd158df427b5dae62942a9d5e89dcd061765663b87e0b8cd07823bda057204fca4218642d962fa0bfd511a3c12efdbf7e85ea0c6ae582cd13d309be3214cc0516ae894769492c6177b63cfeec8fa912549e455458906f73f085bfe480fa2f3170ce6c47056dc26dd1ea3d0bccdd5499ea671f34f34f9a3c6d0096d2d1f98b8785edbbdf61752aa3357eca96ed196", 0xaf, 0x4}], 0x9400, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r3, 0xae45, 0x9) socket$inet6(0xa, 0xe, 0x100000a) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f00000001c0)={{0x3, 0x7fffffff}, 'port1\x00', 0x80, 0x400, 0x7fff, 0x8, 0x7a, 0x6, 0x3, 0x0, 0x5, 0x40}) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000c2de0000000010000000000000000000000000000000000000000000"], 0x58) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000840)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000008c0), 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) dup2(r2, r0) r7 = dup2(r6, r5) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000100)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000580)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000680)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f00000006c0)={@empty, 0x7c, r8}) 22:51:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='h.s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:02 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000380)={0x0, 0x80, 0x800, 0x8}, &(0x7f00000003c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000400)={r4, 0x7}, 0x8) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000140)={0x3, 0x0, &(0x7f00000000c0)=""/32, &(0x7f0000000100)=""/16, &(0x7f00000001c0)=""/121, 0x3000}) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = dup2(r2, r5) r7 = dup2(r5, r3) getsockopt$inet_sctp_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x200000000000000, 0x4, 0x80000000}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r7, 0x84, 0x1b, &(0x7f00000002c0)={r8, 0x6, "5dbe795faf22af"}, &(0x7f0000000340)=0xf) 22:51:02 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xd8, 0x0) 22:51:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000004", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f00000000c0)={0x7, 0x21, 0x2}, 0x7) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) [ 330.609659] hfs: type requires a 4 character value [ 330.614780] hfs: unable to parse mount options 22:51:02 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x15a, 0x0) 22:51:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 330.666189] hfs: type requires a 4 character value [ 330.671286] hfs: unable to parse mount options 22:51:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfsl', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='h/s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x7fff, 0x8000) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000180)) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f00000000c0)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x101ff, 0x1, 0x1000, 0x1000, &(0x7f000000b000/0x1000)=nil}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xfffffffffffffed0) connect$packet(r1, &(0x7f0000000100)={0x11, 0xf7, r3, 0x1, 0x5, 0x6, @dev={[], 0x14}}, 0x14) r5 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000040), 0x10) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) r7 = dup(r5) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f0000000340)="9e0f20e06635000200000f22e0dbef660f3800083e640f38012e00000f300f01364500baf80c66b874b7d58166efbafc0cedbaf80c66b86097e08066efbafc0cedbaf80c66b8889e788a66efbafc0c66b8fa00000066ef", 0x57}], 0x1, 0x10000000, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) fstat(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r7, &(0x7f00000003c0)={0xa0, 0x19, 0x2, {0x0, {0x0, 0x3, 0x8}, 0x21, r4, r8, 0x4, 0x7ff, 0x81, 0x2, 0x200, 0xe574, 0x2, 0x200, 0x1000, 0xff, 0x20, 0x4, 0x8, 0x2, 0x6}}, 0xa0) dup2(r2, r6) dup2(r6, r5) 22:51:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:02 executing program 6: r0 = socket$inet6(0xa, 0x4, 0x2000007) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x20000, 0x0) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000340)={[], 0xffffffff00000001, 0x100000001, 0x40, 0x0, 0x80, 0x100000, 0x0, [], 0x2}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1b8a, 0x20140) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) 22:51:03 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000011800000000000000000000009500000000000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:03 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xe4, 0x0) 22:51:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hf.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) signalfd(r1, &(0x7f00000000c0)={0x5}, 0x8) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) 22:51:03 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:03 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000000c0)=""/105) dup2(r2, r4) dup2(r4, r3) 22:51:03 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 331.465433] hfs: type requires a 4 character value [ 331.470501] hfs: unable to parse mount options 22:51:03 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x95, 0x0) [ 331.546414] hfs: type requires a 4 character value [ 331.551535] hfs: unable to parse mount options 22:51:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfl\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000001c0)={0x6, 0x1, [{0x1, 0x0, 0x1}, {0x8, 0x0, 0x1ab}, {0x5, 0x0, 0x2f7}, {0x800, 0x0, 0xf503}, {0x8}, {0x3}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) r4 = dup2(r3, r2) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000100)={[0x7ff, 0x3, 0x2, 0xc8f, 0x6, 0x7, 0x400, 0x7fff, 0x0, 0x15e4, 0x0, 0x400, 0xa1c, 0xffffffff, 0x9, 0x4], 0x3000, 0x86}) [ 331.847192] hfs: type requires a 4 character value [ 331.852261] hfs: unable to parse mount options [ 331.875823] hfs: type requires a 4 character value [ 331.880873] hfs: unable to parse mount options 22:51:03 executing program 5: r0 = socket$inet6(0xa, 0x80000, 0xee7) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") fallocate(r0, 0x50, 0x9, 0x303) r1 = semget$private(0x0, 0x7, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x301000, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r2, &(0x7f0000000240)="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", &(0x7f0000000380)=""/213}, 0x18) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000140)={0x100000001, 0x400}) 22:51:03 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xd2, 0x0) 22:51:03 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:03 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup2(r2, r4) fcntl$getownex(r5, 0x10, &(0x7f00000000c0)={0x0, 0x0}) getpgid(r6) dup2(r2, r1) 22:51:04 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_SIOCGIFCONF(r2, 0x8910, &(0x7f0000000080)=@buf={0xfb, &(0x7f0000000340)="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"}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfd\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:51:04 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:04 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x7, 0x0) 22:51:04 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:51:04 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 332.488982] hfs: type requires a 4 character value [ 332.494046] hfs: unable to parse mount options 22:51:04 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x5f, 0x0) 22:51:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hf#\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 332.549103] hfs: type requires a 4 character value [ 332.554136] hfs: unable to parse mount options 22:51:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_settime(0x7, &(0x7f0000000200)={r2, r3+10000000}) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = dup2(r1, r5) r7 = dup2(r5, r4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000140)=r8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r7) [ 332.962004] hfs: type requires a 4 character value [ 332.967026] hfs: unable to parse mount options [ 333.004307] hfs: type requires a 4 character value [ 333.009398] hfs: unable to parse mount options 22:51:04 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl(r0, 0x4000000000000912, &(0x7f0000000380)="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") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:04 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000100)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:51:04 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x10e, 0x0) 22:51:04 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000002", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:05 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfst', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hf\n\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getresuid(&(0x7f0000000380), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) sendmsg$nl_xfrm(r1, &(0x7f0000001780)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2901000}, 0xc, &(0x7f0000001740)={&(0x7f0000000440)=@updsa={0x12c8, 0x1a, 0xc00, 0x70bd2d, 0x25dfdbff, {{@in6, @in=@loopback, 0x4e22, 0x100000000, 0x4e21, 0x2b, 0xa, 0x80, 0x80, 0xff, r5, r6}, {@in6=@dev={0xfe, 0x80, [], 0x16}, 0x4d2, 0x32}, @in6=@remote, {0x91b, 0x200, 0x0, 0xd0f, 0x9, 0x8, 0x80000000, 0x9}, {0x0, 0x0, 0x2, 0x4}, {0x100, 0x5, 0x8000}, 0x70bd29, 0x3500, 0xa, 0x6, 0x9, 0x10}, [@replay_val={0x10, 0xa, {0x70bd27, 0x70bd26, 0x81}}, @algo_comp={0x80, 0x3, {{'lzs\x00'}, 0x1b8, "573dc001e64f187e84e360ed3c961695db46298a38f8ca402bcbea83b3f9bfd80b617ad27620d67314ba582c1fe8139ecacdffd56f45de"}}, @ipv6_hthresh={0x8, 0x4, {0x46, 0x45}}, @algo_comp={0x1048, 0x3, {{'deflate\x00'}, 0x8000, "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"}}, @algo_aead={0xf8, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x550, 0x40, "a2fa69ce339c993e4677dd784fb2a4312a8f64476fb4f1655be12c6d08a63bd1cefbb50e27972c56a1aed5f487d4d17bc42ad245f228389ad98725795328129d018732c1bdf96b2fb66abcecad70312775d718db4cf5d9b6297f33efa9beef06b73e1d6039e406fe3a02129f5c28d2629553aab343a200300f9c26871f46dca89f6dd71ca162e6c6d4c05d085815d01b6feb68f789aead55f04a30ae274f530dbc4ff847ddc24a71b48a"}}]}, 0x12c8}, 0x1, 0x0, 0x0, 0x20008000}, 0x80) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x37, "b0367becd7412c6afa166fb682859e3fb63a44163c578fea3ad60c62bb752dd4e859e3be2796c318e1807b2c0e6ca8d184915124b771b7"}, &(0x7f0000000100)=0x3f) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={r7, 0x21}, 0x8) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) 22:51:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x5000}], 0x1, 0x0) 22:51:05 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xd, 0x0) 22:51:05 executing program 6: r0 = socket$inet6(0xa, 0x100000000000a, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:51:05 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1bc, 0x0) 22:51:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x20000f70}], 0x1, 0x0) 22:51:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hf*\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:05 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x0, 0x9}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)={r5, 0x4, 0x4, [0x2, 0x8, 0x5, 0x8]}, &(0x7f00000001c0)=0x10) dup2(r2, r4) dup2(r4, r3) [ 334.061850] hfs: type requires a 4 character value [ 334.066941] hfs: unable to parse mount options [ 334.104048] hfs: type requires a 4 character value [ 334.109076] hfs: unable to parse mount options 22:51:06 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:06 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000340)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0xf}], 0x1, 0x0) 22:51:06 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r1, 0x912, &(0x7f0000000200)="2a5cc8070031848bfe5770") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x3, 0x0) epoll_wait(r1, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x3) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000140)={0x0, 0x3, 0x6, 0x1000}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) ioctl$KDSKBLED(r1, 0x4b65, 0xff) dup2(r4, r3) 22:51:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x11e, 0x0) 22:51:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hf+\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:51:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x24}], 0x1, 0x0) 22:51:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x116, 0x0) 22:51:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfp\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:06 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f00000001c0)=""/236) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) [ 334.504196] hfs: type requires a 4 character value [ 334.509350] hfs: unable to parse mount options [ 334.533562] hfs: type requires a 4 character value [ 334.538806] hfs: unable to parse mount options 22:51:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x4000000000000}], 0x1, 0x0) 22:51:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xa9, 0x0) 22:51:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:06 executing program 6: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f00000009c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000140)}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000001180)="b1", 0x1}], 0x1, &(0x7f0000000e00)}, 0x0) [ 334.888208] hfs: type requires a 4 character value [ 334.893296] hfs: unable to parse mount options [ 334.918401] hfs: type requires a 4 character value [ 334.923432] hfs: unable to parse mount options 22:51:07 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700319575aed00c") openat$audio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/audio\x00', 0x450005, 0x0) r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x800, 0x0) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x1, 0x9}, {0x2, 0x9}, {0x7, 0x400}, {0xb2e3, 0x1}, {0x9b, 0x401}, {0x1ff}, {0xffffffffffffff7f, 0x10000000000}, {0x2}]}) socketpair(0x6a5a2f649139898c, 0x7, 0x10000, &(0x7f0000000240)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) setpriority(0x2, r3, 0x3) 22:51:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hf-\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:51:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x100000000000000}], 0x1, 0x0) 22:51:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000000180)={0x2, 0xb80b, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) 22:51:07 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xd7, 0x0) 22:51:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:07 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x20}, 0x0, 0x0, 0x10000}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000080)) 22:51:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x400300}], 0x1, 0x0) 22:51:07 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x60, 0x0) 22:51:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8804090}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x50, r5, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7f}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}]}, 0x50}, 0x1, 0x0, 0x0, 0x4040850}, 0x4000) 22:51:07 executing program 6: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000000)) 22:51:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfi\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:07 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x111, 0x0) 22:51:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x2}], 0x1, 0x0) 22:51:08 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x5, 0x101100) ioctl$TIOCCBRK(r2, 0x5428) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:08 executing program 6: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x9}, 0x4) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000280)) getsockopt$inet6_tcp_buf(r0, 0x6, 0x3f, &(0x7f0000000400)=""/4096, &(0x7f00000002c0)=0x1000) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0xeffffffffffffffd, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) pipe2(&(0x7f0000000140), 0x0) clock_gettime(0x8000000000, &(0x7f0000000340)) socket$packet(0x11, 0x2, 0x300) r2 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100}) 22:51:08 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f00000000c0)="660f3a220b002e6565f30fae634866b9d00200000f32f08167008dd364640f35d3f066b8010000000f23d80f21f86635400000700f23f8f2abd09902000f011f"}], 0x1, 0x0, &(0x7f0000000140)=[@dstype3={0x7, 0xa}], 0x1015) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup2(r2, r4) dup2(r4, r3) read$FUSE(r5, &(0x7f0000000340), 0x1000) 22:51:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfo\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:08 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x4e, 0x0) 22:51:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x34000}], 0x1, 0x0) 22:51:08 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb36) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x2, 0x7ffffffffffffb}, 0xfffffffffffffffe, 0x0, 0x0, {0x3}, 0x941}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x200000000000000}], 0x1, 0x0) [ 336.591575] IPVS: ftp: loaded support on port[0] = 21 22:51:08 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xc6, 0x0) 22:51:08 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x6, 0x41) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000240)=0x8) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = dup(r1) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) write$FUSE_IOCTL(r2, &(0x7f00000000c0)={0x20, 0xffffffffffffffda, 0x1, {0x0, 0x0, 0x1000, 0x9}}, 0x20) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) dup2(r4, r6) r7 = getpgrp(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)=0x0) r9 = fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) geteuid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r9, &(0x7f0000000140)={r3, r1, 0x1}) dup2(r6, r5) 22:51:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hf0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x40030000000000}], 0x1, 0x0) 22:51:08 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x16e, 0x0) [ 337.129685] IPVS: ftp: loaded support on port[0] = 21 [ 337.208692] hfs: type requires a 4 character value [ 337.213806] hfs: unable to parse mount options 22:51:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x1000000}], 0x1, 0x0) [ 337.284011] hfs: type requires a 4 character value [ 337.289145] hfs: unable to parse mount options 22:51:09 executing program 5: r0 = socket$inet6(0xa, 0x5, 0xffff) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000240)=""/243) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) ioperm(0x8, 0x3f8, 0x8) 22:51:11 executing program 6: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000680)) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/ip_tables_names\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000004c0)=0x0) sched_setaffinity(r1, 0xffffff51, &(0x7f00000000c0)=0x9) creat(&(0x7f0000000700)='./bus\x00', 0xc1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x0, 0x0, &(0x7f0000000000)={0x0, 0x6, 0x4, 0xdc}) mq_unlink(&(0x7f0000000a80)='bdev\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000e00)) r2 = socket(0x40000000002, 0x3, 0x2) ioctl$sock_proto_private(r2, 0x89e1, &(0x7f0000000000)) mq_timedsend(0xffffffffffffffff, &(0x7f00000e6000), 0x0, 0x3, &(0x7f0000000540)) 22:51:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfc\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:11 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x98, 0x0) 22:51:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000000c0)) dup2(r2, r4) dup2(r4, r3) 22:51:11 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="188824000000000000000000000000000000011800000000000000000000000000001500000000002a5fed4880ffdbb3cd00566a5eb0d68afbc9ed6c106d7f08f85b1033ce18d89a4ed95bb6f30e7d75bab10623ab160454a2a790b1d2c7322e410908f97bce7bea5dfa"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) r3 = dup(r2) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000080)=0x2, 0x4) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f00000013c0)={@ipv4={[], [], @broadcast}, 0x0}, &(0x7f0000001400)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000001440)={0x7, 0x9, &(0x7f0000000340)=ANY=[@ANYBLOB="180020000700000000003d2d0104000077d40000ffffffff00000000000000009500000000950000000000000000000000000000009500000000000000"], &(0x7f0000000240)='syzkaller\x00', 0x8001, 0x1000, &(0x7f00000003c0)=""/4096, 0x41100, 0x1, [], r4, 0x7}, 0x48) 22:51:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:11 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x2000000}], 0x1, 0x0) 22:51:11 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3b, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:12 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x40000}], 0x1, 0x0) 22:51:12 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x41, 0x0) [ 340.249519] hfs: type requires a 4 character value [ 340.254569] hfs: unable to parse mount options [ 340.293280] hfs: type requires a 4 character value [ 340.298621] hfs: unable to parse mount options 22:51:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfu\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\a', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85515070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = dup2(r1, r3) dup2(r4, r1) 22:51:12 executing program 6: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="e00000027f0044e6f5f09637638610b93a63bd00dacd60f69aa3fbd0d1e597eed18ded9bc63c59000000"], 0x1) 22:51:12 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x4}], 0x1, 0x0) 22:51:12 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x103, 0x0) 22:51:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r0, r3) 22:51:12 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x0}], 0x1, 0x0) 22:51:12 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x14c, 0x0) 22:51:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hf%\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:12 executing program 4: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) fcntl$getflags(r0, 0x40b) syz_open_dev$sndmidi(&(0x7f00000001c0)='/dev/snd/midiC#D#\x00', 0x0, 0x8000) r1 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x10000) read(r1, &(0x7f0000000200)=""/28, 0x1c) r2 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000040)={0x9, 0xe6e2, 0x80000000}) 22:51:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:12 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 22:51:12 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x4, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='\x00', 0xffffffffffffff9c}, 0x10) ioctl$BLKRAGET(r2, 0x1263, &(0x7f0000000140)) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f00000002c0)={0x66, 0xcc70, 0x101, 0x80000000, 0x10000, 0x3, 0x6}) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000240)={0x3, 0xa000}) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000180)={0x800, 0x0, 0x3, 0xff, 0x1, 0x5, 0x7, 0x72c00, 0x401, 0x3, 0x5, 0xe2}) sysfs$2(0x2, 0x7, &(0x7f0000000380)=""/108) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x700000000000000, &(0x7f00000001c0)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) dup2(r2, r4) dup2(r4, r3) 22:51:13 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x0}], 0x1, 0x0) 22:51:13 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x45, 0x0) 22:51:13 executing program 6: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup2(r2, r1) [ 341.275637] hfs: type requires a 4 character value [ 341.280691] hfs: unable to parse mount options [ 341.318440] hfs: type requires a 4 character value [ 341.323569] hfs: unable to parse mount options 22:51:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfX\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:13 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) modify_ldt$read(0x0, &(0x7f0000000340)=""/140, 0x8c) fcntl$getownex(r1, 0x10, &(0x7f0000000240)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:51:13 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x0}], 0x1, 0x0) 22:51:13 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x11d, 0x0) 22:51:13 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x0, 0x5c2, 0x47, &(0x7f0000000280)="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", &(0x7f0000000140)=""/71}, 0x28) setgroups(0x4000000000000653, &(0x7f0000000000)=[0x0, 0x0]) [ 341.763661] hfs: type requires a 4 character value [ 341.768813] hfs: unable to parse mount options 22:51:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfx\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:13 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x0}], 0x1, 0x0) 22:51:13 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x93, 0x0) [ 341.844406] hfs: type requires a 4 character value [ 341.849512] hfs: unable to parse mount options 22:51:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x1f00000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:13 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400000, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f00000000c0)={{0xabb6, 0xffff}, 0x40}, 0x10) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:13 executing program 6: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x271b, &(0x7f0000000100)=""/13, &(0x7f000033bffc)=0x7df) 22:51:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x46c0d70039121c16, 0x0) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000340)={0x3f, 0x7fffffff, 0x1}) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e24, 0x9, @local, 0x20}, {0xa, 0x4e21, 0xe1, @dev={0xfe, 0x80, [], 0x18}, 0x3f}, 0x2, [0x2, 0x3ff, 0x8, 0x1, 0x4, 0x3, 0xb6, 0x20a]}, 0x5c) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) open_by_handle_at(r3, &(0x7f0000000240)={0x8b, 0x3, "0aa08fc2f2e34ad74ce2b244820ed1fd6cf3868993a0c935fa2efaef0fa419ffd7ceaf230134847aaa0c78b5cde7743868e096d1a8edc9e87ef5f7fdc45282a234aa703d0062b87168dc58b303e172b2d878909844cc701a4385422b8d3bc9a91dcb38ece3bdddc7a12ced13670a4b10f99aec04c335d535147b73597c8e065544fbc5"}, 0x100) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f00000001c0)=""/86) dup2(r3, r5) dup2(r0, r4) 22:51:13 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x0}], 0x1, 0x0) 22:51:13 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x147, 0x0) 22:51:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x4, 0x250, [0x20000240, 0x0, 0x0, 0x200004a0, 0x200005e8], 0x0, &(0x7f0000000000), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x20, 0x88f7, 'syzkaller0\x00', 'rose0\x00', 'bcsf0\x00', 'bridge_slave_1\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xe0, 0x118}, [@common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xffffffffffffffff}}}, @snat={'snat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 0xffffffffffffffff}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x921c, 'bpq0\x00', 'gre0\x00', 'eql\x00', 'erspan0\x00', @remote, [0x0, 0x0, 0x0, 0x0, 0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="40cd860fbcf7"}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff}]}, 0x2c8) [ 342.244971] Unknown ioctl 1074819274 [ 342.276878] hfs: type requires a 4 character value [ 342.282044] hfs: unable to parse mount options [ 342.345050] hfs: type requires a 4 character value [ 342.350092] hfs: unable to parse mount options [ 342.365725] Unknown ioctl 1074819274 [ 342.476843] hfs: type requires a 4 character value [ 342.482096] hfs: unable to parse mount options [ 342.497807] hfs: type requires a 4 character value [ 342.503024] hfs: unable to parse mount options 22:51:14 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000e0ffffff21a9584d33d0414f48d7d4000000000000000000000000000000000000000000000000000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x3f000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:14 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x0}], 0x1, 0x0) 22:51:14 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xad, 0x0) 22:51:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:51:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:14 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e) [ 342.538147] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 342.556323] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:51:14 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x0}], 0x1, 0x0) 22:51:14 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x26, 0x0) [ 342.982350] hfs: type requires a 4 character value [ 342.987382] hfs: unable to parse mount options [ 343.026221] hfs: type requires a 4 character value [ 343.031303] hfs: unable to parse mount options [ 343.047643] hfs: type requires a 4 character value [ 343.052860] hfs: unable to parse mount options [ 343.091504] hfs: type requires a 4 character value [ 343.096626] hfs: unable to parse mount options 22:51:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) r2 = shmget(0x3, 0x4000, 0x54000221, &(0x7f0000ffb000/0x4000)=nil) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x1, 0x501042) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) connect$packet(r3, &(0x7f0000000280)={0x11, 0x7, r4, 0x1, 0xfffffffffffffff7, 0x6, @local}, 0x14) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000040)=""/40) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:15 executing program 6: exit(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000380)) 22:51:15 executing program 2: r0 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x6}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r1, 0x7d5e}, 0x8) r2 = socket$inet6(0xa, 0x7, 0xffffffffffffffff) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$BLKSECTGET(r3, 0x1267, &(0x7f00000000c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r4, r6) dup2(r6, r5) 22:51:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x7a00000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x0}], 0x1, 0x0) 22:51:15 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x114, 0x0) [ 343.583362] hfs: type requires a 4 character value [ 343.588489] hfs: unable to parse mount options [ 343.605281] hfs: type requires a 4 character value [ 343.610486] hfs: unable to parse mount options [ 343.620280] hfs: type requires a 4 character value [ 343.625298] hfs: unable to parse mount options [ 343.640096] hfs: type requires a 4 character value [ 343.645114] hfs: unable to parse mount options 22:51:15 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x2, 0x40001) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000080000000001c011800000000000000000000000000009500200000000400"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0)=[@flags={0x3, 0x400}, @cstype0={0x4, 0x2}], 0x2) ioctl$KVM_RUN(r4, 0xae80, 0x0) preadv(r2, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/35, 0x23}, {&(0x7f0000000240)=""/60, 0x3c}, {&(0x7f0000000340)=""/246, 0xf6}, {&(0x7f0000000280)=""/7, 0x7}], 0x4, 0x0) dup2(r2, r4) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f00000001c0)=0x78) r5 = dup2(r4, r2) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r1) 22:51:15 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x18a, 0x0) 22:51:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x0}], 0x1, 0x0) 22:51:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="68667302", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x0}], 0x1, 0x0) 22:51:15 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x161, 0x0) [ 344.083562] hfs: type requires a 4 character value [ 344.088637] hfs: unable to parse mount options [ 344.118163] hfs: type requires a 4 character value [ 344.123235] hfs: unable to parse mount options 22:51:16 executing program 2: r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x3f, 0x200000) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100)=0x3, 0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0xfff, 0x880) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x0) dup2(r3, r5) dup2(r5, r4) 22:51:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfsL', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x7400, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:16 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x105082) fallocate(r0, 0x3, 0x0, 0x100000001) 22:51:16 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x0}], 0x1, 0x0) 22:51:16 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x119, 0x0) 22:51:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000100)=0xb2) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup2(r2, r4) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x2) dup2(r4, r3) [ 344.645682] hfs: type requires a 4 character value [ 344.650787] hfs: unable to parse mount options [ 344.670321] hfs: type requires a 4 character value [ 344.675523] hfs: unable to parse mount options 22:51:16 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xfdffffff, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:16 executing program 6: 22:51:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfst', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:16 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x2, 0x0) 22:51:16 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x159, 0x0) 22:51:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, r2) dup2(r2, r1) 22:51:17 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x300, 0x0) 22:51:17 executing program 6: exit(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) write$cgroup_pid(r0, &(0x7f0000000140), 0x12) [ 345.240143] hfs: type requires a 4 character value [ 345.245173] hfs: unable to parse mount options [ 345.296886] hfs: type requires a 4 character value [ 345.301925] hfs: unable to parse mount options 22:51:17 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1aa, 0x0) 22:51:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x2000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x7) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) write$UHID_DESTROY(r2, &(0x7f00000000c0), 0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) fcntl$dupfd(r3, 0x0, r2) r4 = dup2(r1, r3) dup2(r3, r2) setsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f0000000100)={0x80000000, 0x0, 0x6, 0x1000}, 0x6) 22:51:17 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000180)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2601, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r3}}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x100000000, 0x200000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mime_type[]\x00', r4}, 0x10) 22:51:17 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x100000000000000) 22:51:17 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x200000000000000) [ 345.941239] hfs: type requires a 4 character value [ 345.946285] hfs: unable to parse mount options [ 345.988589] hfs: type requires a 4 character value [ 345.993596] hfs: unable to parse mount options [ 346.003426] hfs: type requires a 4 character value [ 346.008569] hfs: unable to parse mount options [ 346.051521] hfs: type requires a 4 character value [ 346.056568] hfs: unable to parse mount options 22:51:18 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0xfffffffffffffffe, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800d2000000000107c73b0000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:18 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xeb, 0x0) 22:51:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x6c00, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0xfff, &(0x7f0000000280)="0a5c9ee3ed3c1d737340c8c80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x400000, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup2(r2, r4) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e24, 0x6, @empty, 0x8f}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000200)={r6, 0x3, 0x30}, 0xc) ioctl$KVM_GET_PIT2(r2, 0x8070ae9f, &(0x7f0000000340)) dup2(r4, r3) 22:51:18 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x40030000000000) 22:51:18 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000000c0)={0x5, 0x0, 0xfffffffffffffffc, 0xfffffffffffffc76, 0x7}) dup2(r4, r6) dup2(r6, r5) 22:51:18 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x3b, 0x0) [ 346.499163] hfs: type requires a 4 character value [ 346.504200] hfs: unable to parse mount options [ 346.541367] hfs: type requires a 4 character value [ 346.546426] hfs: unable to parse mount options 22:51:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x200000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f00000000c0)) connect$bt_sco(r1, &(0x7f0000000140)={0x1f, {0x10000, 0x2, 0x3f, 0x1c00000, 0x100000001, 0x3f}}, 0x8) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) r5 = getpgid(0x0) mq_notify(r1, &(0x7f00000001c0)={0x0, 0x5, 0x2, @tid=r5}) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) r6 = dup2(r4, r3) ioctl$KDDELIO(r6, 0x4b35, 0xff) 22:51:18 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x4000000000000) [ 346.589835] hfs: type requires a 4 character value [ 346.594838] hfs: unable to parse mount options [ 346.623134] hfs: type requires a 4 character value [ 346.628173] hfs: unable to parse mount options 22:51:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:18 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x2d, 0x0) [ 346.985231] hfs: type requires a 4 character value [ 346.990253] hfs: unable to parse mount options 22:51:18 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000140)={0x5, 0x70, 0x20, 0x9, 0x6, 0x8, 0x0, 0xffffffffffffffff, 0x200, 0x1, 0x4, 0x6, 0x2, 0x2, 0x0, 0x8, 0x7f, 0x457d, 0x1c3, 0x7f, 0x80000001, 0x5, 0x9, 0xffffffffffffffc0, 0x6, 0x3800000, 0x6, 0x9, 0x7ff, 0xce6, 0x8, 0xfffffffffffffff7, 0x5, 0x6, 0xffffffffffffff36, 0x6, 0x7, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x8001, 0x7}, 0x1, 0x0, 0xdd, 0x6, 0x19, 0x3, 0x9}) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f00000002c0)=[{0x7, 0xd4, 0x1000}, {0x5, 0x2a44, 0x800}, {0x4, 0x10001, 0x800}, {0x2, 0x8, 0x800}], 0x4, &(0x7f0000000100)) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) gettid() write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) syz_open_pts(r3, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000300)={0x7, 0x8, 0xfa00, {r4, 0x2000003}}, 0x10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) 22:51:18 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000000c0)={0x5, 0x0, 0xfffffffffffffffc, 0xfffffffffffffc76, 0x7}) dup2(r4, r6) dup2(r6, r5) 22:51:18 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x400300) [ 347.031687] hfs: type requires a 4 character value [ 347.036841] hfs: unable to parse mount options 22:51:19 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000340)={0x0, 0x8001}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000003c0)={r2, @in={{0x2, 0x4e24}}, 0x3, 0xfffffffffffffbff, 0x800, 0x0, 0x12}, &(0x7f0000000480)=0x98) read(r0, &(0x7f0000000040)=""/28, 0x2) r3 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb429701a400", 0xa9824f69d1376637, 0x10800e, 0x0, 0xfffffffffffffffc, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffff8}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000dfff0000000000000000000000011800000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x1008912, &(0x7f0000000100)="0a5cc8071b5610a80d00315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:51:19 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x9e, 0x0) 22:51:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="68667305", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x4c00000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x4) 22:51:19 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000000c0)={0x5, 0x0, 0xfffffffffffffffc, 0xfffffffffffffc76, 0x7}) dup2(r4, r6) dup2(r6, r5) 22:51:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x34000) [ 347.594280] hfs: type requires a 4 character value [ 347.599359] hfs: unable to parse mount options 22:51:19 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xbd, 0x0) 22:51:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 347.634601] hfs: type requires a 4 character value [ 347.639837] hfs: unable to parse mount options 22:51:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x4000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:19 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) sync_file_range(r0, 0x8, 0x1, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000010d9060300000000011800000400f12a4eda94647e3f2900000000001000008276e309dedb6b11e814cb2a106db6fa8423d14a357a1b03c627f5a7c2d4c2265dca50daa416acf90b800b54373e23f3a8242dc1e4096a55f2f7c18ef8683e5d8b6c47e2174ada0ea7700cc09fb22e498b8604"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) select(0x40, &(0x7f0000000080)={0xff, 0xf2, 0x1, 0x4, 0x3, 0x0, 0x81, 0x5}, &(0x7f0000000240)={0x8, 0x6e00b161, 0x6, 0x3, 0x4, 0x3, 0x1, 0xdb83}, &(0x7f0000000340)={0x100000000, 0x9d, 0x6, 0x5, 0x1, 0x10001, 0x3, 0x4}, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 22:51:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x412440, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000100)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) [ 347.891272] hfs: type requires a 4 character value [ 347.896298] hfs: unable to parse mount options [ 347.914317] hfs: type requires a 4 character value [ 347.919437] hfs: unable to parse mount options [ 348.011710] hfs: type requires a 4 character value [ 348.016865] hfs: unable to parse mount options [ 348.051266] hfs: type requires a 4 character value [ 348.056292] hfs: unable to parse mount options 22:51:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000040)={0x77359400}) 22:51:20 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x1000000) 22:51:20 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x61, 0x0) 22:51:20 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000000c0)={0x5, 0x0, 0xfffffffffffffffc, 0xfffffffffffffc76, 0x7}) dup2(r4, r6) dup2(r6, r5) 22:51:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x60000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:20 executing program 2: r0 = socket$inet6(0xa, 0x5, 0xffffffffffffffff) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f00000000c0)=0x5, r5, 0x0, 0x0, 0x1}}, 0x20) ioctl$KVM_RUN(r4, 0xae80, 0x0) r6 = dup2(r2, r4) getsockopt$inet_sctp_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x6, 0x800, 0x0, 0x101, 0x7ff, 0x400, 0x86, {0x0, @in6={{0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x17}, 0x7fffffff}}, 0x0, 0xf0, 0x10000, 0x8, 0x7ef9}}, &(0x7f00000002c0)=0xb0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000340)=r7, 0x4) dup2(r4, r3) 22:51:20 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x2000000) 22:51:20 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x69, 0x0) [ 348.274980] hfs: type requires a 4 character value [ 348.280065] hfs: unable to parse mount options [ 348.285820] hfs: type requires a 4 character value [ 348.290855] hfs: unable to parse mount options 22:51:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673c0", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 348.320675] hfs: type requires a 4 character value [ 348.325924] hfs: unable to parse mount options [ 348.339000] hfs: type requires a 4 character value [ 348.344050] hfs: unable to parse mount options 22:51:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xa00, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") faccessat(r1, &(0x7f00000000c0)='./file0\x00', 0x60, 0x1000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) r5 = dup2(r4, r3) getsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100), 0x10) 22:51:20 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000000c0)={0x5, 0x0, 0xfffffffffffffffc, 0xfffffffffffffc76, 0x7}) dup2(r4, r6) 22:51:20 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x40000) [ 348.650901] hfs: type requires a 4 character value [ 348.656020] hfs: unable to parse mount options [ 348.679423] hfs: type requires a 4 character value [ 348.684645] hfs: unable to parse mount options 22:51:20 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000240)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r2}}, 0x18) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:20 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x174, 0x0) 22:51:21 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) r2 = dup(r0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x95, 0x2, 0x1, 0x5, 0x80}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000380)=ANY=[@ANYRES32=r3, @ANYBLOB="8f0000000513d9bfd88021cd137d957e74713855f1f4f84b542a77b8b34ff0f7218f08f19f95da67f2d27f7f855d73611cb67615ed2614aa54420aebf0d037496633dc1e048de4f667ee05000000af492b732d20bf4504d8b010a8ed9a710045b398a7c36970dd1dc6ae6ef6d1ef46e6a260ec17443d5349a44546aa3ca28a5c688b8b5fb57d08bcefc84b14e0209043000000"], &(0x7f0000000180)=0x97) 22:51:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673f5", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:21 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x2) 22:51:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x5) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000200)) r5 = dup2(r2, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x200803, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', r5}, 0x10) dup2(r2, r3) mincore(&(0x7f000000e000/0x3000)=nil, 0x3000, &(0x7f0000000340)=""/4096) 22:51:21 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000000c0)={0x5, 0x0, 0xfffffffffffffffc, 0xfffffffffffffc76, 0x7}) 22:51:21 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x8c, 0x0) [ 349.363265] hfs: type requires a 4 character value [ 349.368276] hfs: unable to parse mount options [ 349.396403] hfs: type requires a 4 character value [ 349.401670] hfs: unable to parse mount options 22:51:21 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x193, 0x0) 22:51:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:21 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:51:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:21 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000000c0)={0x5, 0x0, 0xfffffffffffffffc, 0xfffffffffffffc76, 0x7}) 22:51:21 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x10f, 0x0) [ 349.744899] hfs: type requires a 4 character value [ 349.749931] hfs: unable to parse mount options [ 349.788626] hfs: type requires a 4 character value [ 349.793866] hfs: unable to parse mount options [ 349.938635] hfs: type requires a 4 character value [ 349.943664] hfs: unable to parse mount options 22:51:21 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x121040) openat$cgroup_ro(r2, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) 22:51:21 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) [ 349.989048] hfs: type requires a 4 character value [ 349.994110] hfs: unable to parse mount options 22:51:22 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x9, 0x301240) r3 = mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xb, 0x682c46bd6817b059, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f00000000c0)={r3}) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x500, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x4003c) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000100)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup2(r3, r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r5, 0x400448c9, &(0x7f00000000c0)={{0x4, 0x56, 0x6, 0x0, 0x7fff, 0x1ff}, 0x7fff}) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000000)={0x8, 0x7ff, 0x101, 0x3ff}) dup2(r1, r3) 22:51:22 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xab, 0x0) 22:51:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:22 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000000c0)={0x5, 0x0, 0xfffffffffffffffc, 0xfffffffffffffc76, 0x7}) 22:51:22 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="30000000000000008400000001e70003000000000080000000000000000000000000000000000000000000007880", @ANYRES16], 0x30}], 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a80)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001b80)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@dev={0xac, 0x14, 0x14, 0x20}, @in, 0x4e22, 0x0, 0x4e22, 0x7d, 0x2, 0x0, 0xa0, 0x7f, r1, r2}, {0x2, 0x94b5, 0xb03f, 0x1, 0x6, 0x7, 0x800, 0x5}, {0x8, 0x9, 0x80000000}, 0x4, 0x6e6bb3, 0x1, 0x1, 0x1, 0x3}, {{@in6=@loopback, 0x4d5, 0xff}, 0xa, @in6, 0x3506, 0x2, 0x0, 0xc0000000, 0x400, 0x432, 0x37c}}, 0xe8) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000040)={0x4}, 0x1) 22:51:22 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 350.558699] hfs: type requires a 4 character value [ 350.563845] hfs: unable to parse mount options [ 350.569308] hfs: type requires a 4 character value [ 350.574559] hfs: unable to parse mount options 22:51:22 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x5c, 0x0) 22:51:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:51:22 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) dup2(r4, r6) [ 350.635145] hfs: type requires a 4 character value [ 350.640243] hfs: unable to parse mount options [ 350.645810] hfs: type requires a 4 character value [ 350.650868] hfs: unable to parse mount options 22:51:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x8f5, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:22 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1c8, 0x0) 22:51:22 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x2, 0x20000) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) sysfs$3(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:22 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x10900, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000040)={{0x9, 0x3, 0x2, 0x351c}, 'syz1\x00', 0x10}) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x9d, 0x0) [ 351.081380] hfs: type requires a 4 character value [ 351.086594] hfs: unable to parse mount options [ 351.099691] hfs: type requires a 4 character value [ 351.104833] hfs: unable to parse mount options [ 351.134341] hfs: type requires a 4 character value [ 351.139426] hfs: unable to parse mount options [ 351.139580] hfs: type requires a 4 character value [ 351.149043] hfs: unable to parse mount options 22:51:23 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) dup2(r4, r6) 22:51:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000000c0)={0x5, 0x0, 0xfffffffffffffffc, 0xfffffffffffffc76, 0x7}) dup2(r4, r6) 22:51:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="6866737f", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:23 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x42, 0x0) 22:51:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x8, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2}}}, 0x3f) r3 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r2, r3) getsockopt$inet_buf(r3, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) r4 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x2) semctl$GETNCNT(r1, 0x3, 0xe, &(0x7f0000000240)=""/175) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r4, 0x111, 0x4, 0x0, 0x4) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x9bed0360b61344a2, 0x0) openat$cgroup_subtree(r5, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000180)) 22:51:23 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0xffffffffffffff18}], 0x1, 0x0) 22:51:23 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x15f, 0x0) [ 351.725572] hfs: type requires a 4 character value [ 351.730686] hfs: unable to parse mount options 22:51:23 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in={0x2, 0x4e23}, 0x10, &(0x7f0000000e00), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRESHEX=r0], 0xffffffffffffffdb}], 0x1, 0x0) 22:51:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfsz', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:23 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) dup2(r4, r6) [ 351.813225] hfs: type requires a 4 character value [ 351.818294] hfs: unable to parse mount options 22:51:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x6000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:23 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x64, 0x0) 22:51:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000000c0)={0x5, 0x0, 0xfffffffffffffffc, 0xfffffffffffffc76, 0x7}) dup2(r4, r6) 22:51:24 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, {}, 0x1000, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000010000000000000000002fc24bb1ccf9e12b64004b5027280addb77e7c273cf80000011800"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x3f, 0x400001) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f00000001c0)=0x1) 22:51:24 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000000)={0x1, 0xbc}) 22:51:24 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x63, 0x0) 22:51:24 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) dup2(r4, r6) [ 352.204691] hfs: type requires a 4 character value [ 352.209789] hfs: unable to parse mount options 22:51:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 352.250691] hfs: type requires a 4 character value [ 352.255863] hfs: unable to parse mount options [ 352.580381] hfs: type requires a 4 character value [ 352.585524] hfs: unable to parse mount options 22:51:24 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:24 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x50, 0x0) 22:51:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x3000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:24 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21}}, 0x4, 0x5, 0x2000000000000000, 0x4}, &(0x7f0000000300)=0x22) r3 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r3, &(0x7f0000000fc0)=[{&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)="5191c2768aa3b4be6886d8c4e3e45eb0f6b58fa82a33ebdf956ca75c6705c9e573983e", 0x23}], 0x1, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000ff0000000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000280)=0x80006, &(0x7f00000000c0)=0xfffffd2b) getsockname$unix(r0, &(0x7f0000000340)=@abs, &(0x7f00000002c0)=0x6e) 22:51:24 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) io_setup(0x0, &(0x7f0000000380)=0x0) io_pgetevents(r6, 0x7c6, 0x3, &(0x7f00000003c0)=[{}, {}, {}], &(0x7f0000000440)={0x0, 0x1c9c380}, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0)=0xb0, 0x4) dup2(r2, r5) dup2(r5, r4) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000100)={0x6, 0x0, [{0xaba, 0x0, 0x4}, {0x0, 0x0, 0x1}, {0x9af, 0x0, 0x6}, {0x146c0113fa09862f}, {0x8cd, 0x0, 0x4}, {0x189, 0x0, 0xfffffffffffffff9}]}) 22:51:24 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) dup2(r4, r6) [ 352.635242] hfs: type requires a 4 character value [ 352.640281] hfs: unable to parse mount options 22:51:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:24 executing program 1: r0 = socket$inet_sctp(0x2, 0x6, 0x84) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000040)={0x8, 0x1, 0xad, 0x7, 0x81}, 0xc) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:24 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1be, 0x0) [ 352.750304] hfs: type requires a 4 character value [ 352.755324] hfs: unable to parse mount options [ 352.796704] hfs: type requires a 4 character value [ 352.801802] hfs: unable to parse mount options 22:51:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:24 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) io_setup(0x0, &(0x7f0000000380)=0x0) io_pgetevents(r6, 0x7c6, 0x3, &(0x7f00000003c0)=[{}, {}, {}], &(0x7f0000000440)={0x0, 0x1c9c380}, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0)=0xb0, 0x4) dup2(r2, r5) dup2(r5, r4) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000100)={0x6, 0x0, [{0xaba, 0x0, 0x4}, {0x0, 0x0, 0x1}, {0x9af, 0x0, 0x6}, {0x146c0113fa09862f}, {0x8cd, 0x0, 0x4}, {0x189, 0x0, 0xfffffffffffffff9}]}) [ 352.985384] hfs: type requires a 4 character value [ 352.990559] hfs: unable to parse mount options [ 353.052042] hfs: type requires a 4 character value [ 353.057376] hfs: unable to parse mount options [ 353.161001] hfs: type requires a 4 character value [ 353.166059] hfs: unable to parse mount options [ 353.193668] hfs: type requires a 4 character value [ 353.198880] hfs: unable to parse mount options 22:51:25 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x6, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f00000001c0)={0x2, 0x8, 0x5, 0x81}, 0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800e8504364cf877dd7f67002190000000000000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:25 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) dup2(r4, r6) 22:51:25 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1c0, 0x0) 22:51:25 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x8000, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x24, "d32dcff5cdbbe8fa1a21cbcf6392a353596d6583ac8d87952a0cf881e28af15bee6ab2d2"}, &(0x7f0000000100)=0x2c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000001000)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x1008) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x2) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000040)=0x6) r3 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r3, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000140), 0x2) 22:51:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x3, 0x590) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000000c0), 0x4) 22:51:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x48, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:25 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) io_setup(0x0, &(0x7f0000000380)=0x0) io_pgetevents(r6, 0x7c6, 0x3, &(0x7f00000003c0)=[{}, {}, {}], &(0x7f0000000440)={0x0, 0x1c9c380}, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0)=0xb0, 0x4) dup2(r2, r5) dup2(r5, r4) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000100)={0x6, 0x0, [{0xaba, 0x0, 0x4}, {0x0, 0x0, 0x1}, {0x9af, 0x0, 0x6}, {0x146c0113fa09862f}, {0x8cd, 0x0, 0x4}, {0x189, 0x0, 0xfffffffffffffff9}]}) 22:51:25 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1b}}, @in6={0xa, 0x4e24, 0x4, @mcast2, 0x7}, @in6={0xa, 0x4e23, 0xcd, @ipv4={[], [], @local}, 0x8}, @in6={0xa, 0x4e21, 0x8001, @mcast1, 0x80000000}, @in6={0xa, 0x4e23, 0xc00000, @remote, 0x4}], 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:25 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) dup2(r4, r6) 22:51:25 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x135, 0x0) 22:51:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:25 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x1) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) getsockname$netlink(r2, &(0x7f00000001c0), &(0x7f0000000200)=0xc) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="000000000000011800000000000000000200000000009700000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:25 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="cd0000005a0dcd97c58b507bfe8ec96022223f95b82c2e65d07d49e597dbe3d4d254389ae70c7ab95a44ad878ca2d2485c72af318c2a48b6666e2f42f8636743b033189fab7951f3de41d9e5ba21380280b00e3b1990d623473caab1bde6b90d032a6dd33bb9428571b695e4c1fea7521846adfce0f9d7bba825906cda4e5f84def894ff9df7c0056d2df957e849abff31ed4c1d0fcf0c8cd00b0e91b884974b85bd76368a939b7c04effabf9fd958cbc3563f1dbec5308d3576722ddd702378f3b1640f9f2120a7d5cf04901b6375a86e"], &(0x7f0000000100)=0xd5) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0xdc, 0x0, 0x401, 0x1, r1}, 0x10) r2 = getpgrp(0xffffffffffffffff) fcntl$setown(r0, 0x8, r2) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 353.918836] hfs: type requires a 4 character value [ 353.923975] hfs: unable to parse mount options 22:51:25 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xc2, 0x0) [ 353.975238] hfs: type requires a 4 character value [ 353.980273] hfs: unable to parse mount options 22:51:25 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(r4, 0xffffffffffffffff) 22:51:25 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) io_setup(0x0, &(0x7f0000000380)=0x0) io_pgetevents(r6, 0x7c6, 0x3, &(0x7f00000003c0)=[{}, {}, {}], &(0x7f0000000440)={0x0, 0x1c9c380}, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0)=0xb0, 0x4) dup2(r2, r5) dup2(r5, r4) 22:51:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 354.070513] hfs: type requires a 4 character value [ 354.075634] hfs: unable to parse mount options [ 354.109243] hfs: type requires a 4 character value [ 354.114438] hfs: unable to parse mount options 22:51:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:26 executing program 4: read(0xffffffffffffffff, &(0x7f0000000040)=""/28, 0x1c) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x6, 0x10200) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0xaa18, 0x1f701c49, 0x0, 0x100000000, 0x7ec, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x7}, r0, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000000000000000000000118000000000000000000000000000095000000000000a007a52a3ffc2408fcca23d3aa6bead78742300ac526f494c122c2ec54130c483247fdd8099aceb5419aaa44b65f0d58b0a9f1bc5c7798839fe84a9d799c59583c05a2cb178ad41a773289dfa822c44717c86ecb2e976e32aefd3bf634da84b01db7516b282019f9a84cad0dc5366141da0830682d402dc390a873db945cc9d5b23a2ec776ef070722"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:26 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000800)=[{&(0x7f0000000080)=@in={0x2, 0x4e24, @multicast1}, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="665357129402e431141f3fa3245278e781dcc39720df6f9351700dee0595c0237fc388b7e1f94b921888767d0e9056d80efd478d15ec2ff771b11fc3f509f747989d"}, {&(0x7f00000001c0)="ba20b159770a3217f8710b4b32ee"}, {&(0x7f0000001a80)="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"}, {&(0x7f0000000200)="698fcfe90fa645de2a0e3b373395ddd02d2954866f35700c31bc5662811f03eea8f8ea95c3927f9c23e153168f9857b86435203777abfb5206d04df1b84f9f4925b4caaf743bc2a46752ddcb7c8175caab3e5e71b566f9f653a375152d41cf7066d0dd49b3ef0f9a1b64dd4abfa6d8b5c8f8f700825eff9ff3087da8b68cc173846bb54a55df6763827235c303f5fbd628a7c37a6a2e0fa86fe5d632b56ce325e8f150ccb5821be568ec6a14507ce0931cde60d3037848043a3fde83"}, {&(0x7f00000002c0)="d68e50ebe28ff4cee33e5aefcb4f10f3b6c63fa701232457be2ac7af465e7896e3417951d2673f4ce28ef21582f5a5fcef52be914c3083c2e2824f393d2fc6d8758e4be248d8ab27586cba21867f2c7cc162e5b427060af29d47434aa8c8c633db75521cc88d4017cff64644fbc523d0b943fdfd41a364c0717b0fef4fea07723e667862e937056a471540148620f4bf367fc6ecc0c9548b4dfe9f53932583c72a435622532e4ff1cca83aba0ebbc92d28631263329b4ff73a024f6d58bde78add9c49d00700a24ea41c"}], 0x0, &(0x7f0000000440)=[@prinfo={0x0, 0x84, 0x5, {0x20, 0x7}}, @dstaddrv6={0x0, 0x84, 0x8, @remote}, @dstaddrv6={0x0, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x15}}], 0x0, 0x4040010}, {&(0x7f00000004c0)=@in={0x2, 0x4e21, @multicast2}, 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)="20bba6a1653a4112d1283cb9636844be96b57aba87f4"}, {&(0x7f0000000540)="9e2ba506175c8ab8430d9446ec2e859784ffa6ac421501f99f20a53653eccaa30b9b63ca1ddf2828ecf706e372d7084d373294d2b2b24f83ccf9983609322321"}], 0x0, &(0x7f00000005c0)=[@dstaddrv4={0x0, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x1a}}, @authinfo={0x0, 0x84, 0x6, {0xffff}}, @authinfo={0x0, 0x84, 0x6, {0x4a296407}}]}, {&(0x7f0000000640)=@in6={0xa, 0x4e24, 0xccfe, @mcast1, 0x150}, 0x0, &(0x7f0000000740)=[{&(0x7f0000000680)="5301ded8f039e0c9c2b7398096d0401d0e5b5c3e818bb0655df16a7ca00e95d5d0709a6a770cda8bc7ba6197576daaa9c364c0fdfe65901d90dbcc1bd15bfdf8f52ecf935ee4a284e7563f4241d26a077fac9da0abedd9aa0f53bdeffcefca927c45fbf793ccd9cba1c84c1ceeda1211148c8c4879e780ec42a0a6c8de281249ca10cb40bdc9178cd17800"}], 0x0, &(0x7f0000000780)=[@prinfo={0x0, 0x84, 0x5, {0x10, 0x6}}, @prinfo={0x0, 0x84, 0x5, {0x30, 0x100000000}}, @prinfo={0x0, 0x84, 0x5, {0x30, 0x800}}], 0x0, 0x4000000}], 0x4924b07, 0x8080) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x8800, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000000c0)) [ 354.387610] hfs: type requires a 4 character value [ 354.392911] hfs: unable to parse mount options [ 354.432130] hfs: type requires a 4 character value [ 354.437188] hfs: unable to parse mount options [ 354.497610] hfs: type requires a 4 character value [ 354.502903] hfs: unable to parse mount options [ 354.516615] hfs: type requires a 4 character value [ 354.521897] hfs: unable to parse mount options 22:51:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) r2 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x8, 0x400000) connect$nfc_llcp(r2, &(0x7f0000000280)={0x27, 0x1, 0x2, 0x5, 0x1, 0x2, "e933a6155cf63d3e722213d868b23180984d3f2def4ba863c852988fb83ed9beeaaaee3f1feb0da494217d1f0cea21914348a52a71f86d1cf94651fa9a5560", 0x28}, 0x60) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) nanosleep(&(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)) semtimedop(r1, &(0x7f0000000080)=[{0x1, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) semget$private(0x0, 0x3, 0x100) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000300), 0x4) 22:51:26 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xf3, 0x0) 22:51:26 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(r4, 0xffffffffffffffff) 22:51:26 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) io_setup(0x0, &(0x7f0000000380)=0x0) io_pgetevents(r6, 0x7c6, 0x3, &(0x7f00000003c0)=[{}, {}, {}], &(0x7f0000000440)={0x0, 0x1c9c380}, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0)=0xb0, 0x4) dup2(r5, r4) 22:51:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x200000, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) r2 = msgget$private(0x0, 0x14e) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000080)=""/31) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="0000000000000000000000000000000001180000000000000000000000000000954d2f8a7ff9d55a"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:26 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x9, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x2000) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000040)) 22:51:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x8cffffff, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:26 executing program 1: r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x0, 0x0, [], 0x3, &(0x7f0000000080)=[{}, {}, {}, {}], 0x0, [{}, {}, {}]}, 0xa8) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r1, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 355.106654] hfs: type requires a 4 character value [ 355.111687] hfs: unable to parse mount options 22:51:27 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(r4, 0xffffffffffffffff) 22:51:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x18d, 0x0) [ 355.158346] hfs: type requires a 4 character value [ 355.163379] hfs: unable to parse mount options 22:51:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x6800000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:27 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) io_setup(0x0, &(0x7f0000000380)=0x0) io_pgetevents(r6, 0x7c6, 0x3, &(0x7f00000003c0)=[{}, {}, {}], &(0x7f0000000440)={0x0, 0x1c9c380}, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0)=0xb0, 0x4) dup2(r5, r4) 22:51:27 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x400200) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xfffffffffffffd5f, &(0x7f0000000180)={&(0x7f0000000280)={0x78, r2, 0x8, 0x70b526, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x400}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}]}, @IPVS_CMD_ATTR_DEST={0x0, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x0, 0x5, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x0, 0x4, 0xfffffffffffffff7}, @IPVS_DEST_ATTR_PORT={0x0, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ADDR={0x0, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x0, 0x7, 0xeb3}, @IPVS_DEST_ATTR_PORT={0x0, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x0, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0x78}}, 0xc084) 22:51:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1a6, 0x0) [ 355.548352] hfs: type requires a 4 character value [ 355.553469] hfs: unable to parse mount options [ 355.578190] hfs: type requires a 4 character value [ 355.583356] hfs: unable to parse mount options [ 355.592589] hfs: type requires a 4 character value [ 355.597855] hfs: unable to parse mount options [ 355.628370] hfs: type requires a 4 character value [ 355.633398] hfs: unable to parse mount options 22:51:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) r2 = open(&(0x7f0000000040)='./file0\x00', 0xc0, 0x12) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f00000000c0)) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:27 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup2(r4, r5) 22:51:27 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0xfffffffffffffd98, &(0x7f0000000040), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30, 0x80}], 0x1, 0x0) 22:51:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x68000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:27 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) io_setup(0x0, &(0x7f0000000380)=0x0) io_pgetevents(r6, 0x7c6, 0x3, &(0x7f00000003c0)=[{}, {}, {}], &(0x7f0000000440)={0x0, 0x1c9c380}, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0)=0xb0, 0x4) dup2(r5, r4) 22:51:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:27 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000000000000000000000118000000000000000000000000000095000000000000004837f822c600000001a995c9819686597f6987baff010000000000000d59bb623b6a4f5bbdf9c16b469d9dcf4000a06dabe470b3137c1e95d456d8e8f59b63ccf21560b9d299658e401af73ba109018cc058be83c846343d86e208f9a3c52bf04aa49efd69a32473ce2b15d735264528c2b700000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x68, 0x0) 22:51:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) open$dir(&(0x7f0000000200)='./file0\x00', 0x10000, 0x80) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000001, 0xc4113, r0, 0x0) recvmsg(r0, &(0x7f0000000a00)={&(0x7f0000000000)=@sco, 0x80, &(0x7f0000000900)=[{&(0x7f0000000980)=""/124}, {&(0x7f0000001000)=""/4096}, {&(0x7f0000000a80)=""/230, 0xfffffffffffffeb9}, {&(0x7f0000002000)=""/4096}, {&(0x7f0000000700)=""/191, 0x9ee135804d5d95c6}, {&(0x7f00000007c0)=""/89}, {&(0x7f0000000840)=""/42}, {&(0x7f0000000880)=""/103}], 0x5, &(0x7f00000000c0)=""/158, 0x9e, 0x2}, 0x3ffffffc) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x96cf, 0x600081) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0x1000}}, 0x20) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000180)="6980000b613d4287938eaffa9b759029", 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000240)={0xb, 0xfffffffffffffe96, 0xfa00, {&(0x7f0000000340), r2}}, 0xb) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="1900000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:28 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 356.199032] hfs: type requires a 4 character value [ 356.204064] hfs: unable to parse mount options [ 356.233673] hfs: type requires a 4 character value [ 356.238715] hfs: unable to parse mount options [ 356.254897] hfs: type requires a 4 character value [ 356.260420] hfs: unable to parse mount options 22:51:28 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(0xffffffffffffffff, r4) 22:51:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x6800, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:28 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) io_setup(0x0, &(0x7f0000000380)=0x0) io_pgetevents(r6, 0x7c6, 0x3, &(0x7f00000003c0)=[{}, {}, {}], &(0x7f0000000440)={0x0, 0x1c9c380}, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup2(r2, r5) dup2(r5, r4) [ 356.296208] hfs: type requires a 4 character value [ 356.301278] hfs: unable to parse mount options 22:51:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3f, 0x100) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="7751ad9b195fe54e7f20412338436fabdbff3e8fd568a727647d49a5a58709947dfcec71cceba04935980145d4f5420524d367bd824817a56f862a3684fe", 0x3e}, {&(0x7f0000000080)="d99b37b6dc5d21acf9a3d950413086368390b9f058b711967f2baee63cd686ae19ce97f935708a330b5cdb3c79ba954fac0715fdc91a947a7f90695b2795fbd8163f9c87ae8f2b550facd6f6d203021bb2e3b214a0cc8d2ac07d6d5c3a66a0a34a529d8d6dd2d831be6b466b29b05a748dda273ea02afd2e52b2ec10c49961570749ca402ef8a36f4dc6310fb46d738ce58c606988f5f505138fc762e1b1058bbffb9175428b8fcca1cdc7790164d819796d2ef2185d03dfb2d5660185c1d930328feda6", 0xc4}, {&(0x7f0000000180)="d6b0ff4ce148e3d1fe9998b37bf402e6601d5e8454bbd2ff9633eec2c6b678e45eab163099168933ed0611399a705830d071cbd7eb1762d581c859332de55334f460fb68ea3dc424df21cc1ad28916fa98826d0ce453385f0d6f91115fc08e2638d31390aac383c6a81157043df7fe7f38c65be99f0f03051169e66d9afc99a9bbda679dd0dd551f7fc41f538b5a1b40db742b406d2bbcc86650eb13cf3852af04be6e2a1d30ee700a49d94ef53a50d27b", 0xb1}], 0x3, 0x0, 0x0, 0x40}, 0x8080) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000340)={'HL\x00'}, &(0x7f0000000300)=0xfee3) 22:51:28 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xaf, 0x0) [ 356.580280] hfs: type requires a 4 character value [ 356.585302] hfs: unable to parse mount options [ 356.623272] hfs: type requires a 4 character value [ 356.628287] hfs: unable to parse mount options [ 356.653193] hfs: type requires a 4 character value [ 356.658292] hfs: unable to parse mount options [ 356.730940] hfs: type requires a 4 character value [ 356.735999] hfs: unable to parse mount options 22:51:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:29 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) 22:51:29 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) io_setup(0x0, &(0x7f0000000380)=0x0) io_pgetevents(r6, 0x7c6, 0x3, &(0x7f00000003c0)=[{}, {}, {}], &(0x7f0000000440)={0x0, 0x1c9c380}, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) dup2(r2, r5) dup2(r5, r4) 22:51:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='projid_map\x00') setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000000c0), 0x4) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7008000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200, 0x0) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18, 0x71, 0x2, {{0x4, 0x2, 0x7}, 0xffff}}, 0x18) 22:51:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x18b, 0x0) 22:51:29 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x5}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000740)='/dev/usbmon#\x00', 0x0, 0x80) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000940)={0x0, @multicast1, @multicast1}, &(0x7f0000000980)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000000b00)={@remote, @multicast2, 0x0}, &(0x7f0000000b40)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000b80)={@ipv4={[], [], @loopback}, 0x0}, &(0x7f0000000bc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'vcan0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in6=@remote, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000d40)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000dc0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000e40)=0x14) accept(r0, &(0x7f0000000e80)=@can={0x1d, 0x0}, &(0x7f0000000f00)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001000)={{{@in6=@ipv4, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003740)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000003840)=0xe8) getsockname(r0, &(0x7f00000038c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000003940)=0x80) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000003980)={'team_slave_0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003a80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003b00)={0x11, 0x0, 0x0}, &(0x7f0000003b40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003b80)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000003c80)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000003d40)={@remote, 0x0}, &(0x7f0000003d80)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000003dc0)={'team0\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000003e00)={@mcast1, 0x0}, &(0x7f0000003e40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000003e80)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003ec0)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000003fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000004000)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004080)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004100)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000004200)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000004b00)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000004ac0)={&(0x7f0000004240)={0x844, r2, 0x400, 0x70bd28, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0x1dc, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffff8001}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x1a4, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}]}}, {{0x8, 0x1, r14}, {0x16c, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0x74, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}}]}}, {{0x8, 0x1, r19}, {0xb8, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r22}, {0x19c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x441}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3f}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r24}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}]}}, {{0x8, 0x1, r25}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}]}}]}, 0x844}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000010) r27 = semget$private(0x0, 0x7, 0x0) semtimedop(r27, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000700)) r28 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20000, 0x0) mq_timedsend(r28, &(0x7f0000000680)="4af9b8172f5e047e1b963b2d0aaf466e60dc641feb0c566f798b1b4978d3ca5f8aff70c657ae84ca9ab0ad60c1e3575e7d2e4b9bdc32058fa3c957d2f825109595b26dccbfed2001b2a07da997b051da4b3c29", 0x53, 0xff, &(0x7f0000000300)={0x77359400}) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000140)="1e99199722c60e7ce1ca264552deebaa969a72da6147be833af9f5e08a84cd336e781f9dab4f36f97290c482e203058bb1222d7a1435d3e9f721494e1c88cb9f6ec147b7ab830e5f8026a51918031d86b5eafd5a91c8024a45d3b6113a2d8ea43e1316", 0x63, 0x8}, {&(0x7f0000000240)="b339abf565716d93ba28ad862487b576721a4cb7a8c558e3227513d0a4de3b20c3bff7a4b96ed2f43f7557e6a87b365c754088fd6cd7d4ed47cdc899382d91fc91de7bf19011b1626b27913bc8f863c360833d8b335e0273db44ab8b3af78846dc0caa1b13c35caab69e41f0ff26847f46fb0bd93ee5d36cc5c2dfe0196b075dba84e880691e4a8c525147006ef8d5cd", 0x90, 0x4}, {&(0x7f0000000300), 0x0, 0x2}, {&(0x7f0000000380)="045c1544f9d8a882690ef728ce30d46f0848469e99a2ab2994753654b1181f8754fbe71fcc381ebf3db0cb6c01f7995ee67768665dc04d152412d39c533651bf2d223dfeae3c8dc9c7f316c80ec27ebd36c543ac5d86b086431559", 0x5b, 0x81}, {&(0x7f0000000400)="2b7b09f7d381aa378d9257334bc8f43ba01c2e4ea15d975febc4a4ea524e5c62f9ebde926f697c149f561a617a6cbba4031b1414a6339c6989692fdd6d19a91198240a28d1f66f476181ccc875fa1363c2eb987aa14a43ab48ccfdd5c08fb12c09d9bd797bcaa681154c44f6dd0cd345c774cc57527edc16f5396fdd1bafead172be66e6187ed207508cd2ac01725db4ac882c7c569c63659c87eda7a8b55ecb9bc844c118ab47f23c774ae9135dcd8f43c732ae10fc47f9cac7b65a78f4c1b95c0f9bb3a11f9f51c6362e0f73a2223351baea2b88", 0xd5, 0x9}, {&(0x7f0000000f40)="0619634309c4dddd33fa5d73546abff927fca0151d2d9f66fa3ece325eb0acfcbc2b12b0e1a6e545cbb3a60ed2a2d88f71eeabf3f80891d5628251ce205b937ca0b418b0ad30028382c167cb659f1051a7e94982193eb91f253754834339fa1a3b09ebd5e60dc6e588cc3bcaa8352d18c3b9525486c4c0a6060000004f354455609bae5b7771ba4eadbaa317fc968ddf13b8d666707983f94744279e", 0x9c, 0x6}], 0x20800, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"]) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r27, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x12a, 0x0) 22:51:29 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) 22:51:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000040)="c5440162a6b3867bd73f503b4b5c8411577c0463577279b6ece9fb4817a3ae301d96a80ae96ecfa13528354d9d515c364f4b8d5a260e437609e39ec86d5f5c2f7304460a353d4e2a1c44b04f2a6191d455dc94e4595f570967b83dedd5170591af5b43fee9e0a50427ef634684e91d115906751f241870482babda06869dd644835496effbfe0a9e12cc9acf994fa052e19ab5bfbde47d5b159c179559c577489e6c89f329ae7a2f513ff0a13f55b931c98e3679bb352faef14a7a2ab54bf460fbe5eece649efeead3d7", 0xca, 0x40000, 0x0, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2000, 0x0) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x2, 0x80) ioctl$TIOCSTI(r1, 0x5412, 0x101) [ 357.314542] hfs: type requires a 4 character value [ 357.315647] hfs: type requires a 4 character value [ 357.319558] hfs: unable to parse mount options [ 357.329181] hfs: unable to parse mount options [ 357.348693] hfs: type requires a 4 character value [ 357.353720] hfs: unable to parse mount options 22:51:29 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) io_setup(0x0, &(0x7f0000000380)=0x0) io_pgetevents(r6, 0x7c6, 0x3, &(0x7f00000003c0)=[{}, {}, {}], &(0x7f0000000440)={0x0, 0x1c9c380}, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) dup2(r2, r5) dup2(r5, r4) 22:51:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\b', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffff8c, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 357.389383] hfs: type requires a 4 character value [ 357.394501] hfs: unable to parse mount options 22:51:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x156, 0x0) 22:51:29 executing program 1: r0 = dup(0xffffffffffffffff) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8001, 0x101000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x9b66, 0x4) sendmmsg$inet_sctp(r1, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00') 22:51:29 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) socket$inet6(0xa, 0x1000000000002, 0x0) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) 22:51:29 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) io_setup(0x0, &(0x7f0000000380)=0x0) io_pgetevents(r6, 0x7c6, 0x3, &(0x7f00000003c0)=[{}, {}, {}], &(0x7f0000000440)={0x0, 0x1c9c380}, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) dup2(r2, r5) dup2(r5, r4) 22:51:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 357.805710] hfs: type requires a 4 character value [ 357.810807] hfs: unable to parse mount options [ 357.840070] hfs: type requires a 4 character value [ 357.845166] hfs: unable to parse mount options 22:51:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x1fffff, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x18e, 0x0) 22:51:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="000000000080000000000000000000000000000000ae650000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) sched_setaffinity(r1, 0x8, &(0x7f00000000c0)=0x6) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x3, 0x10000) 22:51:30 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000001c0)={0x3, [0x1, 0xb7e, 0x5]}, &(0x7f0000000200)=0xa) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) [ 358.225201] hfs: type requires a 4 character value [ 358.230316] hfs: unable to parse mount options [ 358.273532] hfs: type requires a 4 character value [ 358.278591] hfs: unable to parse mount options [ 358.284728] hfs: type requires a 4 character value [ 358.290061] hfs: unable to parse mount options [ 358.323545] hfs: type requires a 4 character value [ 358.328875] hfs: unable to parse mount options 22:51:30 executing program 5: r0 = socket$inet6(0xa, 0x800, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:30 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) 22:51:30 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) io_setup(0x0, &(0x7f0000000380)=0x0) io_pgetevents(r6, 0x7c6, 0x3, &(0x7f00000003c0)=[{}, {}, {}], &(0x7f0000000440)={0x0, 0x1c9c380}, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup2(r2, r5) dup2(r5, r4) 22:51:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673f6", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:30 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)="e6b1ef28"}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r1, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="d80000000000f10037207ea80100008400800001e700000000000000800000000047ab", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x16b, 0x0) 22:51:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x6c00000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:30 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) io_setup(0x0, &(0x7f0000000380)=0x0) io_pgetevents(r6, 0x7c6, 0x3, &(0x7f00000003c0)=[{}, {}, {}], &(0x7f0000000440)={0x0, 0x1c9c380}, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup2(r2, r5) dup2(r5, r4) 22:51:30 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) dup2(0xffffffffffffffff, r1) 22:51:30 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 22:51:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x127, 0x0) 22:51:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="6866738c", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 358.796900] hfs: type requires a 4 character value [ 358.801988] hfs: unable to parse mount options [ 358.839515] hfs: type requires a 4 character value [ 358.844554] hfs: unable to parse mount options 22:51:30 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) io_setup(0x0, &(0x7f0000000380)=0x0) io_pgetevents(r6, 0x7c6, 0x3, &(0x7f00000003c0)=[{}, {}, {}], &(0x7f0000000440)={0x0, 0x1c9c380}, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup2(r2, r5) dup2(r5, r4) 22:51:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xf6ffffff00000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:30 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) 22:51:31 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x4) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000080)=0x9) r2 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x2) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000200)={0x4}, 0x1) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000240)={0x7ff}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xb33) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f00000001c0)={0x200}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="00b61526b8c3300a7b3965e3acda2b08285c1f5867266bf34800010b000000000080cf8fabe2ba5eb946fc6600000010000b000000000000000000000000ffffffff000000001000007a3b99d5bb0126fbfdc21eda1c7059"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) [ 359.443935] hfs: type requires a 4 character value [ 359.449041] hfs: unable to parse mount options [ 359.477720] hfs: type requires a 4 character value [ 359.482842] hfs: unable to parse mount options 22:51:31 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x5, 0x201) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'bpq0\x00', 0x1}, 0x18) r1 = semget$private(0x0, 0x7, 0x0) accept$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) flock(r0, 0xc) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000008008400000001e7000000000000000626c3f683f7677d0ba7f1944e94a39080000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) 22:51:31 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x49, 0x0) 22:51:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:31 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) 22:51:31 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) io_setup(0x0, &(0x7f0000000380)) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup2(r2, r5) dup2(r5, r4) 22:51:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x3f00000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:31 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x29, 0x0) 22:51:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) r1 = shmget$private(0x0, 0x1000, 0x298, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000000)) 22:51:31 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) 22:51:31 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup2(r2, r5) dup2(r5, r4) [ 359.822433] hfs: type requires a 4 character value [ 359.827532] hfs: unable to parse mount options 22:51:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 359.882414] hfs: type requires a 4 character value [ 359.887554] hfs: unable to parse mount options [ 359.966708] hfs: type requires a 4 character value [ 359.971849] hfs: unable to parse mount options [ 359.992501] hfs: type requires a 4 character value [ 359.997677] hfs: unable to parse mount options 22:51:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x4c000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000000)=@in={0x2, 0x4e22}, 0x10, &(0x7f0000000e00), 0x100000000000019b, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1db, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r1, 0x2}, 0xc) 22:51:32 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1b1, 0x0) [ 360.308707] hfs: type requires a 4 character value [ 360.313838] hfs: unable to parse mount options [ 360.344591] hfs: type requires a 4 character value [ 360.349605] hfs: unable to parse mount options [ 360.473620] hfs: type requires a 4 character value [ 360.478778] hfs: unable to parse mount options [ 360.518942] hfs: type requires a 4 character value [ 360.524007] hfs: unable to parse mount options 22:51:32 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = semget$private(0x0, 0x2, 0x90) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000340)=""/205) r2 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:32 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80002, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2f, 'cpu'}, {0x2f, 'pids'}]}, 0xb) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r2 = semget$private(0x0, 0x7, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180)=0x6, 0x4) accept4$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14, 0x800) semtimedop(r2, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f0000000140)=[{0xffffffffffffffff, 0x0, 0x1000}], 0x1) semtimedop(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:32 executing program 6: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r0, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) dup2(0xffffffffffffffff, r1) 22:51:32 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(r2, 0xffffffffffffffff) dup2(0xffffffffffffffff, r4) 22:51:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:32 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x6000, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xb, 0x1d, 0x7a4ee53697227d13, "444da4c62be1fe4865bcba8442a4a2e446c8982d7bcbf09659bd97c3525716d9ca4d58fd01d8e3f98a30e3cda3f87e8af88baa62417c05d7710b750acad63547", "362e13ed9adacc38b13f767da850255bdff5bf122de13841d69f86990fce45ed515cfa9974997ad70bd210b5d9af22ac1d0eb3f7db50b7867ddb0f59542865a3", "27d7472ed9d33ef4c5d6699a890808db5eb4a1fe51f567bcdd7caa861115ceaa", [0x9, 0x400]}) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r1, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:32 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xae, 0x0) 22:51:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffd, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:32 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x165, 0x0) 22:51:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000000)={0x0, 0xcef9, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r1, 0x1, 0x2, [0x1, 0x5]}, &(0x7f00000000c0)=0xc) [ 360.893306] hfs: type requires a 4 character value [ 360.898373] hfs: unable to parse mount options [ 360.907698] hfs: type requires a 4 character value [ 360.912711] hfs: unable to parse mount options 22:51:32 executing program 6: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r0, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) dup2(0xffffffffffffffff, r1) 22:51:32 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, 0xffffffffffffffff) 22:51:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 360.939256] hfs: type requires a 4 character value [ 360.944288] hfs: unable to parse mount options [ 360.966472] hfs: type requires a 4 character value [ 360.971714] hfs: unable to parse mount options 22:51:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x7400000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:32 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x7e8000000000000, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x800, 0x80000) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f00000000c0)={0x4, 0x20, 0xffffffff, 0xff, "8ca1b1f771e18d055fc6f66b086d527849405d1fbde63c20d49c192569295abf"}) 22:51:33 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x187, 0x0) [ 361.311272] hfs: type requires a 4 character value [ 361.316289] hfs: unable to parse mount options [ 361.330534] hfs: type requires a 4 character value [ 361.335614] hfs: unable to parse mount options [ 361.340978] hfs: type requires a 4 character value [ 361.346015] hfs: unable to parse mount options [ 361.382995] hfs: type requires a 4 character value [ 361.388042] hfs: unable to parse mount options 22:51:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000000)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:33 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:51:33 executing program 6: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r0, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) dup2(0xffffffffffffffff, r1) 22:51:33 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x2000000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:33 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x66, 0x0) 22:51:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x205, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0), 0x0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x7fffffff, 0x4) 22:51:33 executing program 6: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, r2) 22:51:33 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x137, 0x0) [ 361.814692] hfs: type requires a 4 character value [ 361.819864] hfs: unable to parse mount options [ 361.829267] hfs: type requires a 4 character value [ 361.834278] hfs: unable to parse mount options [ 361.851500] hfs: type requires a 4 character value [ 361.856529] hfs: unable to parse mount options 22:51:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 361.893622] hfs: type requires a 4 character value [ 361.898799] hfs: unable to parse mount options 22:51:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xfdffffff00000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:33 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:51:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="30000000426c419e4a5fcaf40242e0bf96ce000000008400000001e7000000000000008000000000000000000000000000000000000000000000bcc239a634711148883165456ddd2747160bd17cd2e74b188152e6ca627e3eff10f7a4abdc8f5e7f8b0042dbbf49efe643fc5f6e1e078210c953741dbe1f691ca3f5fa89b728c687824a05b203b6d7efe405479b82b77d0ea7b370052b43c0d97640719d35e2f94ead02a1645d6e86109b9fb20ffa41dacd3838e7ac3b4cfe4412bc9d6fbde4ffa55bebc4a59d5fe1e8ebc9e092086525e9c4e441cb291cc01129e157e64ad6aa42bb0d6808bb1c555470789d8b8fa35429103b336575b389", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:34 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x800, 0x200) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f00000000c0)) 22:51:34 executing program 6: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, r2) 22:51:34 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xa1, 0x0) 22:51:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:34 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x940, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000080)=0x1e) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 362.221568] hfs: type requires a 4 character value [ 362.226635] hfs: unable to parse mount options [ 362.260220] hfs: type requires a 4 character value [ 362.265301] hfs: unable to parse mount options [ 362.566314] hfs: type requires a 4 character value [ 362.571425] hfs: unable to parse mount options [ 362.667809] hfs: type requires a 4 character value [ 362.672894] hfs: unable to parse mount options 22:51:34 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x14, 0x0) 22:51:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x1f00, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:34 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) dup2(r3, r2) 22:51:34 executing program 6: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, r2) 22:51:34 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x100000000, 0x420000) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000088400000001e7000000000000008000000000000000000000000000000000000000001000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:34 executing program 4: socketpair(0xb, 0x8080e, 0x7fff, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x401b4008}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x94, r1, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x49}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0xffff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0x94}, 0x1, 0x0, 0x0, 0x40}, 0x44) r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/28, 0x1c) r3 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000418f50)={{0x80, 0x1}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0x11, 0x10800a, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:51:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:34 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="30080000000000008400000001e70000000000000080000000000000000000000000000000000000000000003a4c1131dfd352c48d08d750e3e7f21d4b5329f8151e722b6fecc0", @ANYRES32=0x0], 0x30}], 0x1, 0x0) clock_gettime(0x0, &(0x7f0000002280)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002100)=[{{0x0, 0x0, &(0x7f0000000080)}, 0xffffffffffffff69}, {{&(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)=""/90, 0x5a}, {&(0x7f00000001c0)}], 0x2, &(0x7f0000000240)=""/190, 0xbe, 0x2}, 0x7fff}, {{&(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000380)=""/41, 0x29}, {&(0x7f00000003c0)=""/182, 0xb6}, {&(0x7f0000000480)=""/98, 0x62}, {&(0x7f0000000500)=""/100, 0x64}, {&(0x7f0000000580)=""/204, 0xcc}], 0x5, &(0x7f0000000700)=""/92, 0x5c, 0xc62d}, 0x2}, {{&(0x7f0000000780)=@nl=@proc, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000800)=""/93, 0x5d}, {&(0x7f0000000880)=""/90, 0x5a}, {&(0x7f0000000900)=""/241, 0xf1}, {&(0x7f0000000a80)=""/136, 0x88}], 0x4, &(0x7f0000000b40)=""/193, 0xc1, 0x2}, 0x7}, {{0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)=""/171, 0xab}, {&(0x7f0000000d00)=""/163, 0xa3}, {&(0x7f0000000dc0)=""/52, 0x34}, {&(0x7f0000000e00)=""/244, 0xf4}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000000f00)=""/56, 0x38}], 0x6, &(0x7f0000002000)=""/30, 0x1e, 0x9}, 0x1}, {{0x0, 0x0, &(0x7f0000002080)=[{&(0x7f0000002040)=""/34, 0x22}], 0x1, &(0x7f00000020c0)=""/52, 0x34, 0x6}, 0x1}], 0x6, 0x20, &(0x7f00000022c0)={r1, r2+30000000}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000002300)=[@in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x3f, @empty, 0x6}], 0x3c) 22:51:34 executing program 6: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, r2) 22:51:34 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x85, 0x0) [ 362.955746] hfs: type requires a 4 character value [ 362.960855] hfs: unable to parse mount options [ 362.987407] hfs: type requires a 4 character value [ 362.992589] hfs: unable to parse mount options 22:51:34 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, r2) dup2(r2, r1) [ 363.011693] hfs: type requires a 4 character value [ 363.016830] hfs: unable to parse mount options [ 363.062279] hfs: type requires a 4 character value [ 363.067494] hfs: unable to parse mount options 22:51:35 executing program 5: r0 = socket$inet6(0xa, 0x1000000000000, 0xffffffffffffffff) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xa, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:35 executing program 6: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, r2) 22:51:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x14f, 0x0) 22:51:35 executing program 1: r0 = socket$inet_sctp(0x2, 0x9, 0x84) getsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000000)=""/242, &(0x7f0000000100)=0xf2) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='cgroup\x00') write$P9_RSYMLINK(r1, &(0x7f0000000180)={0x14, 0x11, 0x1, {0x14, 0x0, 0x6}}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:35 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, r2) dup2(r2, r1) [ 363.397104] hfs: type requires a 4 character value [ 363.402134] hfs: unable to parse mount options [ 363.415469] hfs: type requires a 4 character value [ 363.425535] hfs: unable to parse mount options [ 363.444864] hfs: type requires a 4 character value [ 363.445299] hfs: type requires a 4 character value [ 363.450036] hfs: unable to parse mount options [ 363.454882] hfs: unable to parse mount options 22:51:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xf508000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) [ 363.818672] hfs: type requires a 4 character value [ 363.823728] hfs: unable to parse mount options [ 363.836260] hfs: type requires a 4 character value [ 363.841273] hfs: unable to parse mount options [ 363.868274] hfs: type requires a 4 character value [ 363.873299] hfs: unable to parse mount options [ 363.889077] hfs: type requires a 4 character value [ 363.894119] hfs: unable to parse mount options 22:51:35 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000040000001850e70000000000000080000000ffffffffffffffe70000000000009800000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x2000, 0x0) mknodat(r1, &(0x7f0000000080)='./file0\x00', 0x8040, 0xadc4) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000000c0)=0x8, 0x4) 22:51:35 executing program 6: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, r2) 22:51:35 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, r2) dup2(r2, r1) 22:51:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x129, 0x0) 22:51:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x300000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 364.247045] hfs: type requires a 4 character value [ 364.252057] hfs: unable to parse mount options [ 364.264332] hfs: type requires a 4 character value [ 364.269389] hfs: unable to parse mount options 22:51:36 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0xfffffffffffffff8, 0x1800}], 0x1, &(0x7f0000000040)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) r2 = memfd_create(&(0x7f00000000c0)='\x00', 0x2) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:36 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f0000000340), 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}, 0x0, 0x0, 0x3, {0x0, 0x1000000000000000}}) r3 = syz_open_dev$dmmidi(&(0x7f0000000380)='/dev/dmmidi#\x00', 0x80000000, 0x2200) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000400)=0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f00000004c0)=r4, 0x4) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000440)=@sack_info={r4, 0xf8, 0x3}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) accept4(0xffffffffffffff9c, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000080)=0x80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r5, 0x10e, 0x3, &(0x7f0000000240)=0x7fff, 0x4) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000480)={0xfffffffffffff000, 0xffff, 0x4, 0x7, 0x7, 0x9, 0x400, 0x4, r4}, 0x20) 22:51:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xcc, "a61dcaaa213ae6ba73b3fb7b37b98b5e80cbdfa23ebb6dd40ba050fb95298898a0bed76063b1912cd750ebce7eacd57e9aad3c9c6e2dc6ffa22470f2ea07c3eb1cc02af92057c2ebee62a63f83b0a5874028bcf59f2151e2d12b84ac8db8ecab9ae1a9dae7e46d9ff1168cb42050ea31b8a5cde8f913ba69fd56c22f5d943b0a224b9631e2ef0f715c0e7710761a83ee9511fab34176c66aa8fdb52f8965ee79b59766ba2ad9e97e142f8ffb78ace00285f5599b45bcf62882c4fbf51344d5630f79bfa5c37b2c1f12cb610d"}, &(0x7f0000000100)=0xd4) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r1, 0x9, 0x30}, 0xc) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0xffffffffffffffff, 0x480c1) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000280)=@req={0x28, &(0x7f0000000240)={'bond_slave_0\x00', @ifru_ivalue=0x9}}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x210101, 0x0) ioctl$sock_bt(r2, 0x541b, &(0x7f00000002c0)) write$P9_RWSTAT(r2, &(0x7f0000000200)={0x7, 0x7f, 0x1}, 0x7) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:36 executing program 2: socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) 22:51:36 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x86, 0x0) 22:51:36 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) [ 364.305981] hfs: type requires a 4 character value [ 364.311009] hfs: unable to parse mount options [ 364.312393] hfs: type requires a 4 character value [ 364.320841] hfs: unable to parse mount options 22:51:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x500000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:36 executing program 1: r0 = socket$inet_sctp(0x2, 0xffffffffffffffff, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:36 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x58, 0x0) 22:51:36 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) 22:51:36 executing program 2: socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) 22:51:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000008000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 364.618875] hfs: type requires a 4 character value [ 364.618878] hfs: type requires a 4 character value [ 364.618903] hfs: unable to parse mount options [ 364.623958] hfs: unable to parse mount options [ 364.653009] hfs: type requires a 4 character value [ 364.658084] hfs: unable to parse mount options 22:51:36 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xfd, 0x0) 22:51:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xfcfdffff00000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 364.682281] hfs: type requires a 4 character value [ 364.687539] hfs: unable to parse mount options 22:51:36 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) [ 364.983855] hfs: type requires a 4 character value [ 364.988865] hfs: unable to parse mount options [ 365.032882] hfs: type requires a 4 character value [ 365.037884] hfs: unable to parse mount options 22:51:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f00000000c0)={0xffffffffffffffc1}) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:37 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="30000700000000000000000001e70000000000000080000000000000a03a59a53700000000000000000000000000000000b3e807e50a0844c6179239756397f6258ca24bb408689f7e40e5b7388e383dc3cc6e7510d85d2fd0daf82b65058ebc1c301153b75f0be651e50d0ebac1cb7b5194f694cab3e5660d662cd4c90f7cdb62704a32bfd25f949e1fbb2c", @ANYRES32=0x0], 0x30}], 0x1, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) 22:51:37 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) 22:51:37 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x14e, 0x0) 22:51:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) 22:51:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:37 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0xffffffffffffffff) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffad1d6367, 0x80000001, 0x0, 0x8, 0x3, 0x8d, 0x1, 0x0, 0x0, 0x0, 0x1f701c49, 0x0, 0x100000000, 0x7ee, 0x8, 0xf98, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800011800000000000000b21596880511c18ae0e64a910000f7"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/userio\x00', 0x181000, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) getsockname$packet(r3, &(0x7f00000001c0), &(0x7f0000000200)=0x14) [ 365.480022] hfs: type requires a 4 character value [ 365.485048] hfs: unable to parse mount options [ 365.495535] hfs: type requires a 4 character value [ 365.500576] hfs: unable to parse mount options 22:51:37 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) 22:51:37 executing program 4: r0 = socket$inet6(0xa, 0x80000, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0xe80a}, &(0x7f0000000200)=0xfffffffffffffe79) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x8000000000000000, 0x721, 0x9, 0xfffffffffffffffc, 0xffffffffffffff86}, &(0x7f0000000340)=0x98) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) io_setup(0x0, &(0x7f0000000380)=0x0) io_pgetevents(r6, 0x7c6, 0x3, &(0x7f00000003c0)=[{}, {}, {}], &(0x7f0000000440)={0x0, 0x1c9c380}, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup2(r2, r5) dup2(r5, r4) 22:51:37 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1c3, 0x0) 22:51:37 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f00000001c0)=[{&(0x7f0000000080)="70307cbcb1ff0a54eaf230eb2c00aa1f6ebad23d75077c99b78e1985cf3cc466d6cf35f902ea6f59e1f6f102e316abe731a1c8498f4efbbf1bbb7e0b7d18404fa9b58ec672c7e4e3c954727f67765758bb427e37045653a824be6d2aae97891fec6a9d7adcd05ae816bab55a4416d0e45f3acf898e8d2a2a7b0e3983694f81cccecc05b7d43058db1019605cdad10ec733a6053d19b38a2c56fcf24b8a02aff99f5cb74ee87890ae5b48eb4f23c725dff483d75e14af3fa09585ebe8bd85930d"}], 0x155, &(0x7f0000000180)=ANY=[], 0x30}], 0x1, 0x0) [ 365.561132] hfs: type requires a 4 character value [ 365.566177] hfs: unable to parse mount options [ 365.575559] hfs: type requires a 4 character value [ 365.580566] hfs: unable to parse mount options 22:51:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) 22:51:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x700, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:37 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0x5000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) [ 365.901604] hfs: type requires a 4 character value [ 365.906621] hfs: unable to parse mount options [ 365.911907] hfs: type requires a 4 character value [ 365.916884] hfs: unable to parse mount options [ 365.947176] hfs: type requires a 4 character value [ 365.952309] hfs: unable to parse mount options [ 365.959068] hfs: type requires a 4 character value [ 365.964120] hfs: unable to parse mount options 22:51:38 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) getsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000300), &(0x7f00000003c0)=0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8dbb, 0x105000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10020108}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="84fdff18b1c444d97e71dea600", @ANYRES16=r3, @ANYBLOB="000328bd7000fcdbdf250f0000001c000100080001000a00000008000b007369700008000b00736970005c0001000c0006006c626c637200000014000300ffffffff00000000000000000000000008000200ff000000080004004e2300000c0007000000000010000000080004004e21000014000300fe8000000000090000000000000000aa"], 0x8c}, 0x1, 0x0, 0x0, 0x7c}, 0x8c0) 22:51:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) 22:51:38 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) 22:51:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r1, r3) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x116000}) dup2(r3, r2) 22:51:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x6c, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:38 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x10c, 0x0) 22:51:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:38 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x16}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000)=0x9, 0x4) 22:51:38 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x2c, 0x0) 22:51:38 executing program 1: r0 = socket$inet_sctp(0x2, 0x4000000000000002, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000000)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0xcc, &(0x7f0000000f40)=ANY=[], 0x30}], 0x1, 0x0) [ 366.525381] hfs: type requires a 4 character value [ 366.530401] hfs: unable to parse mount options [ 366.533047] hfs: type requires a 4 character value [ 366.540185] hfs: unable to parse mount options 22:51:38 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, r2) 22:51:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) 22:51:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x8) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x800) ioctl$KVM_RUN(r1, 0xae80, 0x0) pipe(&(0x7f0000000100)) dup2(r2, r4) dup2(r4, r3) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f00000000c0)=0x595b, 0x4) 22:51:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x40000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 366.577011] hfs: type requires a 4 character value [ 366.582057] hfs: unable to parse mount options [ 366.597964] hfs: type requires a 4 character value [ 366.602962] hfs: unable to parse mount options 22:51:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:38 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x16d, 0x0) [ 366.904605] hfs: type requires a 4 character value [ 366.909819] hfs: unable to parse mount options [ 366.963216] hfs: type requires a 4 character value [ 366.968430] hfs: unable to parse mount options [ 367.012101] hfs: type requires a 4 character value [ 367.017137] hfs: unable to parse mount options [ 367.049860] hfs: type requires a 4 character value [ 367.054872] hfs: unable to parse mount options 22:51:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) socket$inet6(0xa, 0x8080f, 0x1) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x4002000000000000, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:39 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, r2) 22:51:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) 22:51:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0xa4, @remote, 0x1000}, @in6={0xa, 0x4e20, 0x9, @mcast1}, @in={0x2, 0x4e22, @broadcast}], 0x48) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r2, r4) dup2(r4, r3) 22:51:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xfdfdffff00000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xbf, 0x0) 22:51:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 367.586646] hfs: type requires a 4 character value [ 367.591849] hfs: unable to parse mount options [ 367.615059] hfs: type requires a 4 character value [ 367.620378] hfs: unable to parse mount options 22:51:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x17c, 0x0) 22:51:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) 22:51:39 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, r2) 22:51:39 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x40000003f}, 0x8) listen(r0, 0x8) sendto$inet(r0, &(0x7f0000000000)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote}, 0x10) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @multicast1}}, [0x8000, 0x8, 0x10000, 0x8000, 0x100, 0x7, 0x0, 0x382, 0x0, 0x101, 0x6, 0x10001, 0x7, 0x4, 0xcf3d]}, &(0x7f0000000080)=0x100) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r2, 0x6, 0x5, 0xaff, 0x80, 0x9}, 0x14) [ 367.655457] hfs: type requires a 4 character value [ 367.660540] hfs: unable to parse mount options [ 367.694946] hfs: type requires a 4 character value [ 367.700019] hfs: unable to parse mount options 22:51:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000000), 0xfe, &(0x7f0000000040)=ANY=[], 0xfffffffffffffdb5}], 0x0, 0x0) 22:51:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffff7f00000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x172, 0x0) [ 368.009053] hfs: type requires a 4 character value [ 368.014080] hfs: unable to parse mount options [ 368.025213] hfs: type requires a 4 character value [ 368.030235] hfs: unable to parse mount options [ 368.043649] hfs: type requires a 4 character value [ 368.048850] hfs: unable to parse mount options [ 368.068207] hfs: type requires a 4 character value [ 368.073241] hfs: unable to parse mount options 22:51:40 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) sigaltstack(&(0x7f0000ff7000/0x7000)=nil, 0x0) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) 22:51:40 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, r2) 22:51:40 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="300000000000000084002a6cdf7e8343d86a000000800000000000000000b00611db3e224769000000000000c409893ad2304f7ee69bd5d0164792d1", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:40 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)=""/193, &(0x7f0000000280)=""/97, &(0x7f0000000300)=""/127}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000780)={0x1, 0x0, &(0x7f0000000380)=""/115, &(0x7f0000000580)=""/156, &(0x7f0000000940)=""/185}) r1 = socket(0x1f, 0x5, 0x5) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x7fff, 0x80081) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x7fff, @dev={0xfe, 0x80, [], 0x21}, 0x45}, {0xa, 0x4e23, 0x6, @mcast2, 0xfffffffffffffffe}, r3, 0x7fffffff}}, 0x48) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000400)={{0x0, @multicast1, 0x4e22, 0x2, 'wrr\x00', 0x20, 0x75b66080, 0x58}, {@multicast1, 0x4e24, 0x2000, 0x3, 0x0, 0x9912}}, 0x44) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000700)=0x100000000) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0xfffffffffffffffc) 22:51:40 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1bd, 0x0) 22:51:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xa000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 368.631871] hfs: type requires a 4 character value [ 368.631927] hfs: type requires a 4 character value [ 368.636932] hfs: unable to parse mount options [ 368.646587] hfs: unable to parse mount options [ 368.664278] hfs: type requires a 4 character value [ 368.669333] hfs: unable to parse mount options 22:51:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$setopts(0x4205, r2, 0x2, 0xa07000) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) 22:51:40 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000300)={0x8, 0x8, 0x7ff, 0xffff}, 0x8) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400bf0a01e70000850000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) sendmmsg$inet_sctp(r0, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x7cc, @dev={0xfe, 0x80, [], 0xa}, 0x7}, 0x1c, &(0x7f0000000280)=[{&(0x7f00000000c0)="13e2fef3d1aa5b8e82e6b3b75767ea6dbd96afa9d7611694d946e075f7169319dbb4db011c20513d55bdbb7f82a6fb96c35e436fa81fac84f8877a39955d0a3048a436b5b6ed6ca294591f9fba75ee989b55eda78e64fc47207ec0a178ca05b0347b915de1e5b0c8be31cefbd5a8b5f2b1890a22c7ddbc", 0x77}, {&(0x7f0000000140)="d31166e50afb6cdf2f3f4c2b0776bc2990596d", 0x13}, {&(0x7f0000000180)="47f58b2b21ab9d736c3fb40df25222093cbae59efc710ab7603717abc1e805c1ba8c5f146e1a02f2405a284c916460f7c246ca7e9e2489c6fa4858faf15f69252891db16162b33dd8755b8aa11d8135a309d8f04aa8be15645ba6f20a8f73f4c321da7c955607d72d0f149974bcab5cdf7aa79f00666ac4ff250b91d437651d5172b013f39fbe61d345d3d7c850f6ea54f63fe6cf1f7952784debab83b644d562b42597c4961ec05ddd7d063cd9bf52331cb992ea1579bdf5cc34bac0f25ff24680724333119f9b136ddf1b4b960fd84e7cf3fdc8cd07d3d860a985e3913", 0xde}], 0x3, 0x0, 0x0, 0x20000000}], 0x1, 0x40800) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200202, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x3912) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000380)={0x5, 0x4, 0x0, 0x110, 0x6}, 0x14) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000340)={0x203, 0x1}) 22:51:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) 22:51:40 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) 22:51:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x10000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:40 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x12, 0x0) 22:51:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 368.780543] hfs: type requires a 4 character value [ 368.785635] hfs: unable to parse mount options 22:51:40 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$getown(r1, 0x9) get_robust_list(r3, &(0x7f0000000240)=&(0x7f0000000200)={&(0x7f00000001c0)={&(0x7f0000000140)}}, &(0x7f0000000280)=0x18) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="0e00000005000000e4076e0005ecd4a34cc082acf266633bda6cf6ce98edf939c6c0267728fe08ddd3ca1cabc138c88ecda854cf12e3be6f4446c0e77a956f198ab2d31bf8a722779b73ea232602c4553fb9c3a46b11c8e8f1a565ee86633294d2605178d4302afa3c0d5e8ed88501266364c5382e7a00c2f1db"], 0x7a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f00000002c0)={0x401, 0x7, 0xfffffffffffff4c0, {0x0, 0x989680}, 0x8, 0x8}) getsockopt$packet_buf(r1, 0x107, 0xd, &(0x7f00000000c0)=""/67, &(0x7f0000000180)=0xffffffffffffff43) [ 369.034352] hfs: type requires a 4 character value [ 369.039417] hfs: unable to parse mount options [ 369.049262] hfs: type requires a 4 character value [ 369.054285] hfs: unable to parse mount options [ 369.082283] hfs: type requires a 4 character value [ 369.082940] hfs: type requires a 4 character value [ 369.087318] hfs: unable to parse mount options [ 369.097073] hfs: unable to parse mount options 22:51:41 executing program 5: semget(0x0, 0x3, 0xe4) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x131000) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f00000000c0)={0x8, 0xe1}) 22:51:41 executing program 4: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(&(0x7f0000000480)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) r0 = socket$inet6(0xa, 0x0, 0x9b7d) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000100)='.', &(0x7f00000001c0)='loefs\x00', 0x9004, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000140)={0x3, 0x1, 0x8ec}) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000002e80)='./file0\x00', &(0x7f0000753000)='msdos\x00', 0x5010, &(0x7f0000000380)) r2 = semget$private(0x0, 0x4, 0x20) semctl$IPC_INFO(r2, 0x7, 0x3, &(0x7f0000000280)=""/77) chroot(&(0x7f00000003c0)='./file0\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xe) 22:51:41 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x23, 0x0) 22:51:41 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) 22:51:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x700000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) 22:51:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:41 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x100001c2, &(0x7f0000000f40)=ANY=[]}], 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) 22:51:41 executing program 1: r0 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x7, 0x0) sendmsg$alg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="b3acb0327191ef6550934114c6759d554f07b87e36c9a9c79ca978c0239fc35445fc26956bf3671a737e127771f747d2d39867bd59addca58ed515ff156d54dc4fa9e8a43f04ab7cf33e614127780f34713f7d6f09a5b34453595ecec31193b4846b861d313f4902c7447f5f2cc68d25c9c90a0748499f187a7a", 0x7a}, {&(0x7f0000000580)="393b2613cda924f049ce1fda26c67e8a53ecafad7ecc14c4271e9786e604f1fbe06cb58f0927720fdc4bff465d77219dec1350cf7878a420877e074172ffd153fda84bc1c035dadaa1e667c3f2a2b03346cf4eee47c7cc3a692535d9a2d3f2f45088981265aa6e72313377284c3aa779bef19f36bc6e177e6b813937bfe48f90449d52f06c423db68b5ce9b08c010d73c0779e530b0dd439fec310179de5e1a3c7a1501ada7c6517beee3644403de885cc27ada2ea0e6d", 0xb7}, {&(0x7f0000002000)="c78c37500835f5acf41bde96f90dfa57dc15f1bca3e3bc6d2d1561fe498feef3fceda2f009769aebfeb1949bf7864d819e7b6807c2fa6649989a6cddf7f2627e6bbff7cbe2349c88a838b45d2298673bea179d9cbd6704d6e0e6d6fa8103de78f90a009c9ce07ffa0ad8f5fa11416456031f163eced4a0849f7116f7c1d592fd8e211188810fced4592ec7aa33f9b6af53ffcb218dca941e6ef038732179524d46b6247c7dfb6cf6a20f64cc39d86ddde72ae0e7623d2c5d3e05abdb35279e3f40ed9b31e73a2fae1038496e29f0731710386c131eed2a3d9f0f1a4f186b4738f5fc651f0289cb96fd7df3bb9fd9da1f6d5e4e1db5a615e4904d55d88cce7214ca7052095b06b5006d85ba62b81ab83bed3f862e3663f2d7826bb8dabc9e57a56b61e46057e076590fa7c90eaf7b0080e3623e36311e3c0f8854019b5375bd172b65181180831d060dece068038c5e55e5863275dd5aa694d07a0b4dc5e0f114188fa672b2bd7c722abc367fe32542e32476fe3efddd07f8093f4a3577804a0a094872709c9c97b11854f5817ede07d24791e85507e13c94617ff891b43b42ff4f6b7946134503cf4482bee19711c3216d20ddebfa074e59a5508d30e0fd008c756d11e5d85e1e9912ce0fd24e4504ea3f864b1352842643ffdfb0c2134a77f21f52ab6be572ebd28960cf5029f30d2e9fb8ee08d035d09ae4ebc5ba88da43ff5546012110a9f69d7da2b3ff47fe00a68bf3bc8db1d5c4a6a0a441297a3786397425ff6abec6a78f2a73d7fb18732ab48f1ceee56ecba1eef863b2d6e3e97ac490faff2317d4e6de60a32f7d016b34ab4d70a656f9064f44b4afd7eed6d8a526e21dd63aaad3079ab0af10045ac037ce29094b49556e2baa878cbb7f0ed1193fd0c66607b597c906a99eda41bbc501e986714f356a03e62f4c8531ec74e05c73913e5ccb8aa46ae4cc16dc1a291c762c17ec0837ad181be4b51b7d3fe5768abd2b6dbd79cb790159329b4a9e71455404ab8cabdfb979e3be0a28c5d0a7e042920b500fcc2220598071c689e4bbc9f9cbf1eb7338367a9059c3c2d4f1ca7b4053e5c4346b033c2b72a949b8ff92f5b82a2a362e645e3c0635a3287ee827e53e40942624a3c8e183d4dfe9136b19ee4e9771e1391e58e804479f45c2f06760ab1fb0f43bf06e39619e6beb1f52b0bd08e723de17b4c92db9762bb57cbb4c747fff1ba07a015caf07bdc96f1290098e149366684c0d9e9dab89056889cda3b266a3300e69a32accc83b51509a6bfa0f51fca20efc9826f1a7525baa3a2eb778dc2d4e9e82d0b8870af31c2cee3579d23542f9c3b4392530393a5fd863a1fa1b318fbcbd5fbbf42a8a45a0ec9a6065275aae332aabba56d3720b997cd0c21fbc4f5e4c1efc487c512afb12ffaa43aeafb28923f3a517ae5fb4baff6a583e1ffdc948376a31877d3a49d5db81a36c028d9dae74c2af2f735196d1c2377998fd93812d983b1b07c37dd61803b3facc2e2bcf7dc7df3a7728ef2482b390ab26b591e06eea1c4d1f9044bb8da76e95ebe4748e4ad89ffd0c263ed3468a30a6a72df3bd5e2e24ff275dc0cb3619deb5c3b94c1b0bf2d82d2bd62056a7610b998cc790c888b865d20ad3462dd5fddd64a241cd66f5bf1ef3d76fccbac19e04277e5474d4e2f7a232146d0cd007f58a283b9aeb232a9df4f47cd708cbbea3f31bc40e1ff91860d0fe5f0d2ccbe9e970dcbe6132e95b980707b52a1fd512d15c6ba9327f672b749a32605220d91caa73be8c8720a5d5d09c53664b6380768144ec1f230b2244c880be2fbb184381d1dc85815b962ae03540a1df9f981efff059c188e28c4ac91b313b7ba975abc86d0cd6ebde51972dba441bd581a63be041c983a2ac71bedacdd6ac5c98816f96483d7467efae5dd1595e55839a219d7e4f7c5f606725c7740f0d0b004852b17d8f4230399ce51ee7945d895e6463f56f5e97c7dda9f88daf32177cf60c5af535907477b27b1628396af2842bf2d78dcc1abfcecb02eced17eafb0f6211d16b26adbe57d83b5c5cf7c00f57fb422782fbbd724574af19ea3fca17f6502bdec5952db583255322b25f80acdd9cfcb8b6d052733e8070c7d51a6902ab3281f25a27636cc766b9847b093a71335852fa7234c7e4a27505644ef474536d0ced55579da36f7a66f2594e1b077cb9e460f553a259347d809c8c25e69e95fb960a2adebfec8bb927b03c3a7ef3c7eb924f1b8044443ecff5a72db0e34bb68c9726aba24ee0eb0c32515ffbe2ce72ed5abb4d3c6f01a07b9464b9f7943b8ae5d2bde4f67900f3e862ed04d33b36bf3c7e52de2473b509db2dcc1e13b723af644cdc3b7cf9225963f5097875548f6c8fa4e531dca8c53b9b2c445b841256b712146fad65353bb0abb23f9137c5b7e70736a1e517f557536584ccf9bb8a1bc037b5bc0d5d9cda7335ffc1ca24dd17f843cd71818527a1c6424bb51bab6bc553b6b1e22a8db3aeb7157f4ed7bd95395dd91afe3cb4f92b8aeb1bdb8d6673ab6c86a164220267bfef1f3c60288eebe969cf4414b914fa90bf338885eb71aeeb06dcc6112bdf3d1236f2dfb286e7beeea64a25b6df3cb01b5735eca61768af1925283eb328372bb802ca56164d0380809f1cd8fba7222393cd0b303e73a3c3628da2a973ffce0e4b8622d72b8f9a2cd5dd6a846bdbe4e7d2c27bcaee38cdef6c723ae5f3fda791808cf4b97e634bcdfb3e85e6f2181bbec2a6fb1067c753422b3bc8272655c825e63aa38bdba22cdd70ac3aac350d2bb4b19b1012d8070547d2c2e850885363a738878c026aeae14fe7a41e9c19b17dbc34a150dff74e7a57f593ee502766b7159c1879bd61dd55155d497ea8886ff6a7737c82186c3beea89048bfebeb696261b883622778378427820368c8c8e71ebfda0564cf564b675803dfbafb22da4f42b014e487ab384af25ac9a3d87fc8fc31b050b763a788a151c099d8cc1811069f1de3beee702221a2204d7d7b39255dfe0f5a78cfba644178d3edab0a2e5244c6920d34fd8a8c8eab401c71029fc6a12842c906bf63517538c2d07474af4a9ad0728ce92c0729b7c0b6580589017441ebcf4f819ce72f47978387d6ac919566fca9cfd84c6f62aa21b51895847563c5c9c662cf0744d2376868557ff8912c872ca899fdfe16ab433c060f403a2fadc618b014b458217da204ff4cf0fad795ab9f15979759586da209c38438d481030f7c513745be18e6efaccc705dee55eda531581e2fc2a9a400a58f977f61d0035fb9b51d072f2033c1a0e7b9b824d62584f8331004259a7b297f5046ad2b7ca702f109f36099a257a30f45107a85020c7caae8c6d0053a641edaae9ab3d608cc0a322a08ff997cd795cd0fa6eee29e3b8d1cee2f97d9f848502ae1a231c0c4424cd585c696bae8fc3a7ab11ce3832e7e03b45e35a8b9454b0f64de0cf52a54ebfbb627a879904470d8d0e6de97b8b2399ff9ee9aa698eaebafc836a060d153b4b8f9c9b50016bf13260caf58c209844371104fe839fb97deff0c46d2daebd375135aee2464ec36e49aafae40f43437d63e47a4a5cd33bc6c4a9d438432e313f3536d4510a8fe21abb0cd448cac5f2a4a29f6b7f4c3206045c46058071d93fb81a256cc683008c9afebd36878e808b433aa9740412071190183a9450656d1d653e1b89a84effc7315d21e133f96d49233bd9f0a82b1c277f86c0159c4b903f5f9b4ef276bde3c40290dae236e859f3f6b2ec2b58d2f78d000ff18d0776eb6cabcfa672152ffee2460a1530a9b9d549b1384fde9694d41f233ee954454f5624b2aafb40515995042e69ccffdb7d90e3b5b8b1899e596e9b36512f81e6459d0dd1037af54676961fc2b6382b5e2aa8e24987a4b07feb28aa24ebe6629205b61cf256cb4da56a79d4c0c17c1dcba4789356e4586e7d8506c15eea55008b3caf6a979c20e972642b5620404cd251a30c47879effd3d1e5c1761cbcd66e6da1021c2ef13ef5887fc07f398ad2cb5d7ffaec083ae4af0ca6647b30debf1e2a8b217b57b4c5bacf59a42efbb0682f535012d6782f3f75031dd476a161e95a34c1418d8a2b00fd64f41c9a867a43971b6b20ff09a2a0c0d572d87e041cf9d46a2cf55a29f25e4e0bdbc50ab92a1e7d2899c45dc4eb52e77267799694edff29ab7c71afb9e058ef04a03f098954333a6bedaf86fc7d5987ad51bd3b460c14a69b18de2da468db620987f13c14933219f0c47f70b6a2d26deeb4062a94c564525e7a36fd1716dff119db89b87ddc970830ca389dfd3dacaea830fede85b70f6ced2e49c7530246d2e606994dcedbf8b2f9f6c7d2f4873b1a83dbe2ca011cc3a6e85ec84783173b9b23d341c2a87d87cbea9e39565340063d8918293e6f2a4f3ff90c2d223d4dd9d6f55b69d2b4ebd9a32d7ddeaedf4c2f0007a2857ae3959490627191420baf03907f830fff31ae463214fab3e62019868039a70a20f6cc7fc408f4aae9193f1f7753e5ff737cc1537152eaa84884c366526012fd6512f3be6ed285a7398be074fb26623ebaf3c6cf332308c5a4eb93d0f10a10c7ae805969cf85fc1d0f123b6fc0358125bfdc10fe4b8ef50cd4d0908434350105014c06103990ec211b406d14f78ddda65c24ba061e1c33b3f83566e57695fdfaace75730dc4796eefb48f87dfe083d351d4842b6eada7e01ff70049be52c54a1cfaefe6ddef8970498d67f7c718129ebb580494811d1813101cf27d7ab765c8d76be9ee019d1a0ab3bbd1e8dab97f2ecea0feb481ad4719f841695ac475bfc1cc8bd09fc54dfccd8663b0025a17432f8b5bb3077e6337eb928e10b82d57641091cbc080ca3e32706e2e76f0f0ef00a1633abd997dd4403e0a313fdee1c1db85130422bef7e0c7465fffd4a7e25bc0431e9257b1311cef56c1f58bb5578090ae8d01cdd10f3f464964fcfec8145f526bb4e28c3e0853ab6fb26a1c30c45431e0f39dcc5f55868844f26c72ede90100a0bce2b5a7348c36539f6069344975f07743b3a23d3a18a8de37dd88e45fa16d4f783f11a919cc9f72ddb6892801b5fb5788b195cf951f3b89bb6584b66957d2d80b652d1186e937817bb4ba8dd6b358744807af49ba69c088e4818af28f186f004fb53559720e41a3ea87959cd25dc96d172a11f4825492e38e2965d68924df549eba4a5cce65b97afdcfd761ab97d570d09d28ee750350bb63c401c96b6b8c813b18a33d3f7322c7d5a32ed9c88271938856dfb1990d961362de0fdc4d367878b161c1bcf0cfbdb23454c2c5a85c8418f258eba1b8583504767ce5c4bd4fb18fa1a8e531f35feb85ac669467ccaecff57a21a9887f989d5a00465c14a502b32917bfb2047484300ccd3fa3d814eb30d6f2ec1e9b955de7a9ec5d67b8e6b099db267f1f95706aa4022cf01a98f500ade7377dd6ada1788e6f64016d862c5ac757544ac17a88847008d6c56ec8faba6822ecccc731ab95ac493582860906b38dbe3794a7102a7ea4ff0b3af0e25ceef71acfc528431eec7c3057790e757c56311a429c567fa22935b1da8f7224294f6efb4f8ea0274c58d5030764c69e79be3691c9d432aa0b8e1760d856417c81d13464ec2406a5da597ed582a78b099348b14034860a615ee0268f54cb39d3520df844038200870aed9d4416e4561cddec8c0f73a55f6a05ef44c8938635131c215f425a6229b06f26cf59b322568556cc50333038bb275dbfd6a88c40253dd68088c62d3a7daae43ccb900ca2e78633d42e4f69499d4fb7", 0x1000}], 0x4, &(0x7f0000000680)=[@iv={0x90, 0x117, 0x2, 0x78, "13bf39775e27ddf4512fd4b6b409ff2bb82ef7476c62cac4bcdf004de741da813132da5d3abaf520a9160010c8627549b358c9fb5a2505a273fcbee1e84ba99eb7cf7ff62bd171d9d2e129d35ddbdd931e4f83c93e6f59e06e410fbd5e5ae7e1a2102a78adb9ccd86beb9fddb3f1175f46dc7bfb287a617d"}, @op={0x18, 0x117, 0x3, 0x1}], 0xa8}, 0x20000080) r1 = socket$inet_sctp(0x2, 0x401, 0x84) sendmmsg$inet_sctp(r1, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000001000)="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"}, {&(0x7f0000000000)="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"}, {&(0x7f0000000100)="bb7e16d87f0d2e93a9ebd0e1a5d65c2385a30e1f05e745805e79171d020272915743b684c7f2838d3c"}, {&(0x7f0000000140)="551e4ab82252b50371dd5da149bfdde02ce6df15d12a402c24af9dcbcab02aa1288e6e9659ffe13744d9b7521b5f26afc606fea0f47a646380d6177902675a842785f534620b9f8e388b8c9fa7689ccdfe8d3cf27d168252f8f0f99732c6f4b5518297487fbc23fd21e31705e0"}, {&(0x7f0000000400)="4a5b80da1e57617130658b4fa803c0d790bc285a3536a4f901f0e44a22ccb85e9fcb0d779e7d85f930dc9455206852daa6e7f3620af67f0a1f6583205b51f1313e3b941956b7ae532e4bc838114cf9b6129d6f785ca285bc728f0556ac355608c5fefb31ed523eb637d1167df408e259e23b76324ca18c14aa3f5f1b3138a3531903ec8b1c7d30cf6cb306226f9cbbccf5f4f40d9e664f6d7b2e78dce55a522741bebe122cb2417264a59d204f6b0795eddc8f535749b9a4b0c0df267a1cca1ee25ef52324945e6156b15e36d36247ebb1d512412497ac366d1b76dbbb80118ecb80c4df1acac2ca7048ecb260447873a4cfbdb88b58bbc25b3f16ddf211a0a37d04ab0ec06a3a69ee7d12c8d07d2fcd0eb924089aff88345147a9386c815c98a4b732dc5e099aad5b71c85eac290981699f7b6e7587bd223c06546794cb05e66e9b3d0517c13441c8ac05bdb1520dfc0c821cc41bc8cd7ba15e0dc0cd0c4a65"}, {&(0x7f00000002c0)="e8e0701af5a4418fe5113e9d07329ed884e301b1905a2789cc517e2837944d61b3dbda7d852d5e5e40b76c9a79a03f0c0b040edf96c871ae825c99d03594b6e335822397c32574939982671416150da76d17a70d22f9e5054fbde8f773153838aad73885668546d01294d5b4c36fa0087bd489d8287387db61397fadc81bf01d287b72273758ce5d34a1cdfd8443ec131ea6abafe7b35aba88b03be0c175190170b7eb464c92745092dc", 0x27066360d3f6d081}], 0xf5, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 369.673036] QAT: Invalid ioctl [ 369.687526] hfs: type requires a 4 character value [ 369.692548] hfs: unable to parse mount options [ 369.708563] hfs: type requires a 4 character value [ 369.713699] hfs: unable to parse mount options 22:51:41 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x17, 0x0) 22:51:41 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) [ 369.728348] QAT: Invalid ioctl [ 369.736575] hfs: type requires a 4 character value [ 369.741641] hfs: unable to parse mount options 22:51:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000000400)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f0000000480)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x54b000, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400, 0x0) renameat(r1, &(0x7f0000000180)='./file0//ile0\x00', r2, &(0x7f0000000380)='./file0\x00') 22:51:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) [ 369.785234] hfs: type requires a 4 character value [ 369.790276] hfs: unable to parse mount options 22:51:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xf6ffffff, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:41 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 370.087588] hfs: type requires a 4 character value [ 370.092791] hfs: unable to parse mount options [ 370.113865] hfs: type requires a 4 character value [ 370.119014] hfs: unable to parse mount options [ 370.130162] hfs: type requires a 4 character value [ 370.135361] hfs: unable to parse mount options [ 370.188116] hfs: type requires a 4 character value [ 370.193102] hfs: unable to parse mount options 22:51:42 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x5, 0x101000) ioctl$KVM_S390_INTERRUPT_CPU(r2, 0x4010ae94, &(0x7f00000000c0)={0x7fffffff, 0x5, 0x467d1165}) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:42 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x56, 0x0) 22:51:42 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{}]}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) 22:51:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) 22:51:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x400}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000080)={r1, @in6={{0xa, 0x4e22, 0x3, @mcast2}}}, &(0x7f0000000140)=0x84) 22:51:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040)=0xa6, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0), 0x80008) 22:51:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x97ffffff, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x56) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e22, 0x2, @loopback, 0x800}, @in6={0xa, 0x4e20, 0xc5, @dev={0xfe, 0x80, [], 0xf}, 0xfff}], 0x48) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x49249249249261c, 0x0) 22:51:42 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x22, 0x0) [ 370.797828] hfs: type requires a 4 character value [ 370.802981] hfs: unable to parse mount options [ 370.814884] hfs: type requires a 4 character value [ 370.819982] hfs: unable to parse mount options 22:51:42 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{}]}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) 22:51:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) 22:51:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 370.858005] hfs: type requires a 4 character value [ 370.863103] hfs: unable to parse mount options [ 370.893995] hfs: type requires a 4 character value [ 370.899023] hfs: unable to parse mount options 22:51:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x4c00, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x57a22d2ad2a9c9a0, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0xe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) 22:51:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xd0, 0x0) [ 371.356202] hfs: type requires a 4 character value [ 371.361279] hfs: unable to parse mount options [ 371.385435] hfs: type requires a 4 character value [ 371.390465] hfs: unable to parse mount options 22:51:43 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{}]}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) 22:51:43 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfsl', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:43 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semget$private(0x0, 0x3, 0x480) clock_getres(0x2, &(0x7f0000000040)) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) modify_ldt$read(0x0, &(0x7f0000000240)=""/136, 0x88) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) 22:51:43 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f00000000c0)=""/133, &(0x7f0000000180)=0x85) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) read(r1, &(0x7f0000000080)=""/29, 0x1d) fcntl$setsig(r1, 0xa, 0x4) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f00000001c0)=""/234) 22:51:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffff7f, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x192, 0x0) 22:51:43 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) 22:51:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x117, 0x0) 22:51:43 executing program 4: socketpair(0x4, 0xe, 0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() write$FUSE_LK(r0, &(0x7f00000000c0)={0x28, 0x0, 0x3, {{0x7, 0xb4, 0xf02566495bb54bc3, r1}}}, 0x28) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x10001, 0x2000000001) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r2, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000ff7)='/dev/vcs\x00', 0x0, 0x0) mmap(&(0x7f00002e4000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x101042, 0x0) name_to_handle_at(r2, &(0x7f00002e4000)='./file0\x00', &(0x7f0000000000)={0xc, 0x0, "bee36b0c"}, &(0x7f0000001ffc), 0x1400) write$9p(r3, &(0x7f0000000140)="93be08ffc9a2", 0x6) 22:51:43 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000b15b9759f16e2c6062f973946c5e1aef82", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 371.876202] hfs: type requires a 4 character value [ 371.881281] hfs: unable to parse mount options 22:51:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, r2) dup2(r2, r1) 22:51:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 371.949406] hfs: type requires a 4 character value [ 371.954562] hfs: unable to parse mount options 22:51:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:43 executing program 4: r0 = socket$inet6(0xa, 0xa, 0x1ff) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x5, &(0x7f0000001040)="1b0407c69f64cc7becf2aa5e2f297943177503f720486aa1fabe5a3af5fd63de31c13ed8a4a452d96df0fa7b82b68f29f7213837b75e09ec0dd4c05a82c191014f944dc29a5b669884bac4334f2b90fdcd73dc04daeb26194f700510ff7ea788c791657d31adce35c3ea05ffad0822df26d9e9ebe7e0c881b5cfc8e867b3c6bfddf22632f649c86b9ccc24cc08") setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0xaaf) sendto$inet6(r0, &(0x7f0000000140), 0xfec0, 0x0, &(0x7f0000003f00)={0xa, 0x4e24, 0x0, @local}, 0x1c) mkdir(&(0x7f0000000080)='./file0\x00', 0x30) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, [], 0x1e}, 0x4}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = dup2(r1, r2) ioctl$UI_GET_VERSION(r3, 0x8004552d, &(0x7f0000000140)) ioctl$RTC_UIE_OFF(r3, 0x7004) ioctl$PIO_FONTX(r3, 0x4b6c, &(0x7f00000000c0)="ce7231f11f436322f7612323e802a59da19e897bafb8a0fe1cd16f1c94b25655bdfd89851fc1263a9bca5f0d431e262e336e22ed6cacaf946938c5019c95e5fb7bbbbeca230125e5c1371425c92cf4c934e4827e5e8d824ceb88c088f1a065312a21e8c3310bbedca22b734d781eecd0cbf09f3370daa6d1fc00e7b340eb944a") accept4$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x800) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x1, 0x10001, 0xffffffffffffffff) write$tun(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xee) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f0000000180)="9dbcab4abb00de84052627718d52a5f2", 0x10) 22:51:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1b0, 0x0) 22:51:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x10000000000) 22:51:44 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(0xffffffffffffffff, r3) [ 372.218206] hfs: type requires a 4 character value [ 372.223284] hfs: unable to parse mount options [ 372.245271] hfs: type requires a 4 character value [ 372.245275] hfs: type requires a 4 character value [ 372.245286] hfs: unable to parse mount options [ 372.250298] hfs: unable to parse mount options [ 372.324295] hfs: type requires a 4 character value [ 372.329338] hfs: unable to parse mount options 22:51:44 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x4) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) 22:51:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, r2) dup2(r2, r1) 22:51:44 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000004e0007131dfffd946fa2830020090a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='team0\x00', 0x10) 22:51:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x600000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000440)=""/121, &(0x7f0000000080)=0x79) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4000, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000040)={0x2a, 0x3, 0x0, {0x1, 0x9, 0x0, 'cpuset-%}'}}, 0x2a) sendmmsg$inet_sctp(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)=@in6={0xa, 0x4e21, 0x8, @loopback, 0x10001}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000100)="3cf10822b7ba256e2ca50776ad8b0c4cef7cb10143e522b21cc993a9b55522c96ffefb6581b784745ac38b3336847cb739625144d1d0ac64fa6adcbafd8b0659c63be18f2ec5c685ad00147f31f177df91f36adc9e50cb596b7a8199e748a0a6c3433627b13ddb5695bf0bc58990e752ec1f8273dada212639f7103be1a58467a2e204914b99f764c7c2b2f9f2283ea0f8dacc73fc5add2c47f19442b201fc16029409875f016197265a0417d17fe620b0b106837c0893cf9dcf86cece461fe9ba51f67ca48464ccab4866a6f8a01a820d8993f29082041be2183775ae8a8cdf7b1bde10726ae84e0434614668470804ea", 0xf1}, {&(0x7f0000000200)="19ef87e6862e058b673eda65bccfb2f8246e46c9408421ce1473f53222eb0e3e1a46f5c37e14b77ab08705298c65c1cd0392b2276f80f2535ea1e16973fa2074e89510c73f138786e7899d53e7a9096354d224c31b73e1f4934024cc9d3de45128b7de108342790fe9bdfeeac8bf225d7e1d27993710389cb76c2cee6032cee47f6916da4086e214ed3117509dea6418e7339ff8d811db955565bf7098cecf942930c0", 0xa3}, {&(0x7f00000002c0)="278f32b2d37ee8fe8c3cfffe5243fa41b1fd759311c4d36fc80f24c9e9027b", 0x1f}, {&(0x7f0000000300)="8ecb51a0bc0f4fd9b9456518ed50c72b20f6898f3eb69f564d4eb2a41b87c0e49298f1d4ea5afa4f734a079835e8d146e37d4ea8", 0x34}, {&(0x7f0000000340), 0xffffffffffffff75}], 0x5, 0x0, 0x0, 0x1}], 0x1, 0xfffffffffffffffc) 22:51:44 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 22:51:44 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x5a, 0x0) [ 372.888346] hfs: type requires a 4 character value [ 372.893369] hfs: unable to parse mount options [ 372.896859] hfs: type requires a 4 character value [ 372.903032] hfs: unable to parse mount options 22:51:44 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x3, 0x2) prctl$setname(0xf, &(0x7f0000000180)='selfeth0\x00') ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000140)) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="300000000000efc545d9581f3945000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x402400, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x17, 0x10, "c708e2c805c42f8f9cae91a5a025e2f28fca7610df7f8d54cf85007777c854e53cc7fd1f15088e460608e2dd4c3c284af0bd74ca4ad9447124a1633fd9b500a3", "8ff55d5f2d346637ee8b340412154b72adce89ff3ca8eab7e003f342ed9692e1", [0x6, 0x2]}) [ 372.933165] hfs: type requires a 4 character value [ 372.938181] hfs: unable to parse mount options 22:51:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x201, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0xc, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x7, @local}]}}}]}, 0x3c}}, 0x0) 22:51:44 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x142, 0x0) 22:51:44 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 22:51:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(0xffffffffffffffff, r2) dup2(r2, r1) 22:51:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 373.004396] hfs: type requires a 4 character value [ 373.009447] hfs: unable to parse mount options 22:51:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x1000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="300074b0000000008400000001e70000000000000080000000000000000000000000000000000000000000006b7d26afb135f463f3a1e10a3869", @ANYRES32=0x0], 0x30}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400, 0x120) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x8) [ 373.261183] hfs: type requires a 4 character value [ 373.266211] hfs: unable to parse mount options [ 373.303297] hfs: type requires a 4 character value [ 373.308316] hfs: unable to parse mount options [ 373.326063] hfs: type requires a 4 character value [ 373.331061] hfs: unable to parse mount options [ 373.357728] hfs: type requires a 4 character value [ 373.363032] hfs: unable to parse mount options 22:51:45 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) 22:51:45 executing program 4 (fault-call:4 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 22:51:45 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1b7, 0x0) 22:51:45 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x2000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x54e}, r1}}, 0x30) r2 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000002c0)=0x9, 0x4) read(r2, &(0x7f0000000040)=""/28, 0xfffffd46) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) ptrace$getregset(0x4204, r3, 0x3, &(0x7f0000000180)={&(0x7f0000000140)=""/52, 0x34}) r4 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f00000000c0)) 22:51:45 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23}, @in6={0xa, 0x4e22, 0x0, @empty, 0xf5}, @in={0x2, 0x4e24}], 0x3c) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, 0xffffffffffffffff) dup2(r2, r1) 22:51:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x74000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 373.900588] FAULT_INJECTION: forcing a failure. [ 373.900588] name failslab, interval 1, probability 0, space 0, times 0 [ 373.911989] CPU: 1 PID: 21103 Comm: syz-executor4 Not tainted 4.18.0+ #199 [ 373.919021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.927381] hfs: type requires a 4 character value [ 373.928378] Call Trace: [ 373.928446] dump_stack+0x1c9/0x2b4 [ 373.933385] hfs: unable to parse mount options [ 373.935972] ? dump_stack_print_info.cold.2+0x52/0x52 [ 373.936008] should_fail.cold.4+0xa/0x11 [ 373.936033] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 373.958694] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 373.963570] ? graph_lock+0x170/0x170 [ 373.967390] ? graph_lock+0x170/0x170 [ 373.971222] ? find_held_lock+0x36/0x1c0 [ 373.975350] ? __lock_is_held+0xb5/0x140 [ 373.979451] ? check_same_owner+0x340/0x340 [ 373.983798] ? lock_downgrade+0x8f0/0x8f0 [ 373.987981] ? rcu_note_context_switch+0x730/0x730 [ 373.992936] ? lock_release+0xa30/0xa30 [ 373.996946] __should_failslab+0x124/0x180 22:51:45 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x154, 0x0) [ 374.001216] should_failslab+0x9/0x14 [ 374.005037] __kmalloc_track_caller+0x2c4/0x760 [ 374.009725] ? msr_io+0x11c/0x380 [ 374.013199] memdup_user+0x2c/0xa0 [ 374.016756] msr_io+0x11c/0x380 [ 374.020065] ? lock_release+0xa30/0xa30 [ 374.024060] ? kvm_set_msr+0x370/0x370 [ 374.027977] ? copy_overflow+0x30/0x30 [ 374.031888] ? print_usage_bug+0xc0/0xc0 [ 374.035988] kvm_arch_vcpu_ioctl+0x1feb/0x3ac0 [ 374.040624] ? kvm_arch_vcpu_ioctl+0x1f96/0x3ac0 [ 374.045395] ? __lock_acquire+0x7fc/0x5020 [ 374.049643] ? kvm_arch_vcpu_put+0x420/0x420 [ 374.054054] ? print_usage_bug+0xc0/0xc0 [ 374.058139] ? trace_hardirqs_on+0x10/0x10 [ 374.062392] ? print_usage_bug+0xc0/0xc0 [ 374.066481] ? print_usage_bug+0xc0/0xc0 [ 374.070569] ? print_usage_bug+0xc0/0xc0 [ 374.074647] ? print_usage_bug+0xc0/0xc0 [ 374.078721] ? __wake_up_common_lock+0x1d0/0x330 [ 374.083515] ? __lock_acquire+0x7fc/0x5020 [ 374.087803] ? print_usage_bug+0xc0/0xc0 [ 374.091893] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 374.096761] ? trace_hardirqs_on+0x10/0x10 22:51:45 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x5e, 0x0) [ 374.101012] ? print_usage_bug+0xc0/0xc0 [ 374.105104] ? trace_hardirqs_on+0x10/0x10 [ 374.109366] ? print_usage_bug+0xc0/0xc0 [ 374.113459] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 374.118334] ? d_splice_alias+0x7c9/0x11e0 [ 374.122592] ? lock_acquire+0x1e4/0x540 [ 374.126585] ? kvm_vcpu_ioctl+0x1ea/0x1300 [ 374.130841] ? lock_release+0xa30/0xa30 [ 374.134823] ? __lock_acquire+0x7fc/0x5020 [ 374.139075] ? rcu_note_context_switch+0x730/0x730 [ 374.144034] ? kasan_check_write+0x14/0x20 [ 374.148300] ? __mutex_lock+0x6d0/0x1700 [ 374.152375] ? trace_hardirqs_on+0x10/0x10 [ 374.156633] ? kvm_vcpu_ioctl+0x1ea/0x1300 [ 374.160879] ? mutex_trylock+0x2b0/0x2b0 [ 374.164977] ? __lock_acquire+0x7fc/0x5020 [ 374.169265] ? perf_trace_lock+0x920/0x920 [ 374.173521] ? graph_lock+0x170/0x170 [ 374.177332] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 374.182193] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 374.187064] ? perf_trace_lock+0x920/0x920 [ 374.191361] ? graph_lock+0x170/0x170 [ 374.195190] kvm_vcpu_ioctl+0x286/0x1300 [ 374.199274] ? kvm_uevent_notify_change.part.32+0x440/0x440 [ 374.205025] ? find_held_lock+0x36/0x1c0 [ 374.209132] ? lock_downgrade+0x8f0/0x8f0 [ 374.213332] ? kasan_check_read+0x11/0x20 [ 374.217513] ? rcu_is_watching+0x8c/0x150 [ 374.221691] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 374.226390] ? __fget+0x4d5/0x740 [ 374.229870] ? ksys_dup3+0x690/0x690 [ 374.233607] ? find_held_lock+0x36/0x1c0 [ 374.237706] ? kasan_check_write+0x14/0x20 [ 374.241995] ? __mutex_unlock_slowpath+0x197/0x8c0 22:51:46 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x83, 0x0) [ 374.246946] ? kvm_uevent_notify_change.part.32+0x440/0x440 [ 374.252696] do_vfs_ioctl+0x1de/0x1720 [ 374.256645] ? __lock_is_held+0xb5/0x140 [ 374.261245] ? ioctl_preallocate+0x300/0x300 [ 374.265699] ? __fget_light+0x2f7/0x440 [ 374.269716] ? fget_raw+0x20/0x20 [ 374.273190] ? __sb_end_write+0xac/0xe0 [ 374.277193] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 374.282746] ? fput+0x130/0x1a0 [ 374.286035] ? ksys_write+0x1ae/0x260 [ 374.289839] ? security_file_ioctl+0x94/0xc0 [ 374.294280] ksys_ioctl+0xa9/0xd0 [ 374.297768] __x64_sys_ioctl+0x73/0xb0 [ 374.301668] do_syscall_64+0x1b9/0x820 [ 374.305559] ? finish_task_switch+0x1d3/0x870 [ 374.310091] ? syscall_return_slowpath+0x5e0/0x5e0 [ 374.315052] ? syscall_return_slowpath+0x31d/0x5e0 [ 374.320014] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 374.325412] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 374.330288] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 374.335486] RIP: 0033:0x457089 22:51:46 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x70, 0x0) [ 374.338681] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 374.357607] RSP: 002b:00007f9c19ae5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 374.365327] RAX: ffffffffffffffda RBX: 00007f9c19ae66d4 RCX: 0000000000457089 [ 374.372622] RDX: 0000000020000080 RSI: 00000000c008ae88 RDI: 0000000000000006 [ 374.379903] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 374.387198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 374.394477] R13: 00000000004cefa0 R14: 00000000004c5650 R15: 0000000000000000 22:51:46 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000000)) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, 0xffffffffffffffff) dup2(r2, r1) [ 374.424646] hfs: type requires a 4 character value [ 374.429870] hfs: unable to parse mount options [ 374.438072] hfs: type requires a 4 character value [ 374.443136] hfs: unable to parse mount options 22:51:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x20000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 374.467394] hfs: type requires a 4 character value [ 374.472438] hfs: unable to parse mount options [ 374.748972] hfs: type requires a 4 character value [ 374.749300] hfs: type requires a 4 character value [ 374.754022] hfs: unable to parse mount options [ 374.763674] hfs: unable to parse mount options [ 374.797577] hfs: type requires a 4 character value [ 374.802593] hfs: unable to parse mount options [ 374.813597] hfs: type requires a 4 character value [ 374.818594] hfs: unable to parse mount options 22:51:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x3, &(0x7f0000000140)="0a49c80700315f85715270") ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'erspan0\x00', 0x5}) r1 = semget$private(0x0, 0x7, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x42002) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000000c0)={0x8}) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000180)={0x28, 0x2, 0x0, {0x0, 0xfffffffffffffffd, 0x200}}, 0x28) 22:51:46 executing program 1: r0 = dup(0xffffffffffffffff) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000)=0x5, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r1, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:46 executing program 4 (fault-call:4 fault-nth:1): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 22:51:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x6000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:46 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x157, 0x0) 22:51:46 executing program 6: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = memfd_create(&(0x7f0000000000)='security\x00', 0x1) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000040)={{0x1, 0x1}, {0x3f, 0x7fffffff00000000}, 0xfe00000000000000, 0x4, 0x1}) sendmmsg(r0, &(0x7f0000002a40)=[{{0x0, 0x0, &(0x7f0000000380), 0x31}}], 0x1, 0x1) 22:51:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, 0xffffffffffffffff) dup2(r2, r1) 22:51:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:46 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0xa0, 0x0) 22:51:46 executing program 6: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x7a, &(0x7f0000000000), &(0x7f0000000040)=0xffffffffffffffd9) 22:51:46 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x80, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x5, @ipv4={[], [], @loopback}, 0x2}, @in6={0xa, 0x4e24, 0x0, @local, 0x8001}, @in6={0xa, 0x4e21, 0x5, @ipv4={[], [], @multicast1}, 0x3}, @in6={0xa, 0x4e24, 0xffff, @local, 0x5}, @in={0x2, 0x4e23}]}, &(0x7f0000000100)=0x10) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f00000001c0)={0x413, 0x9, 0x7}) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000140)={r1, 0xdc, 0x1010}, 0x8) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="30000000000000008400000001e7000000d816a1fe7a87ec2f25cc628e000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x492492492492524, 0x0) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) 22:51:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 22:51:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, r2) dup2(0xffffffffffffffff, r1) [ 375.115372] hfs: type requires a 4 character value [ 375.120458] hfs: unable to parse mount options [ 375.127480] hfs: type requires a 4 character value [ 375.132532] hfs: unable to parse mount options [ 375.167213] hfs: type requires a 4 character value [ 375.172368] hfs: unable to parse mount options [ 375.180327] hfs: type requires a 4 character value [ 375.185432] hfs: unable to parse mount options 22:51:47 executing program 6: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1000000b) close(r1) 22:51:47 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x143, 0x0) 22:51:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffdfc, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 375.513632] hfs: type requires a 4 character value [ 375.518855] hfs: unable to parse mount options [ 375.533370] hfs: type requires a 4 character value [ 375.538529] hfs: unable to parse mount options 22:51:47 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) semop(r1, &(0x7f0000000040)=[{0x7, 0x6, 0x1000}, {0x3, 0x6, 0x1800}, {0x2, 0x2, 0x1000}], 0x3) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x180, 0x0) r3 = geteuid() syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x1, 0x84700) ioctl$TUNSETOWNER(r2, 0x400454cc, r3) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000000c0)=0x5, 0x4) 22:51:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="68667303", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="30000000000000008400000001e7000000c308ffd53c5fa12906e8f7000000008000000000000000000000000c253a0a4aab1fb0705ce54c393b327f1a83a76f17240f914b556fafc84523cc63e891f18743505d10fe7ff5ccb6989d212dbbf3ed3ba2d2dced9a96ad67588ec0f0aaf8917e2772c999feb68e781609f10943a5323bbb", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x8090ae81, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 22:51:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, r2) dup2(r2, 0xffffffffffffffff) 22:51:47 executing program 6: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000002c0)=0xffffffff80000000, 0x4) move_pages(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x3000)=nil], &(0x7f0000000180)=[0x3, 0x1ff, 0x80, 0x200, 0x3, 0x7ff, 0x6, 0x1ae], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x4) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000240)=0x1000) 22:51:47 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x27, 0x0) 22:51:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xffff1f0000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:47 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) [ 375.965854] hfs: type requires a 4 character value [ 375.970945] hfs: unable to parse mount options 22:51:47 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200802) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x101, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r1, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:47 executing program 6: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, r0) r3 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x9, 0x200000) ioctl$KVM_PPC_ALLOCATE_HTAB(r3, 0xc004aea7, &(0x7f0000000180)=0xffff) keyctl$search(0xa, r1, &(0x7f0000000080)='keyring\x00', &(0x7f00000001c0), r2) 22:51:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x5421, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 376.059070] hfs: type requires a 4 character value [ 376.064153] hfs: unable to parse mount options 22:51:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)="68667304", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x4000000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:48 executing program 2 (fault-call:6 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) 22:51:48 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1a7, 0x0) [ 376.365841] FAULT_INJECTION: forcing a failure. [ 376.365841] name failslab, interval 1, probability 0, space 0, times 0 [ 376.377220] CPU: 1 PID: 21256 Comm: syz-executor2 Not tainted 4.18.0+ #199 [ 376.384244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.393600] Call Trace: [ 376.396206] dump_stack+0x1c9/0x2b4 [ 376.399856] ? dump_stack_print_info.cold.2+0x52/0x52 [ 376.405068] ? __lockdep_init_map+0x105/0x590 [ 376.409587] should_fail.cold.4+0xa/0x11 [ 376.413664] ? init_wait_entry+0x1c0/0x1c0 [ 376.417916] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 376.423063] ? print_usage_bug+0xc0/0xc0 [ 376.427141] ? find_held_lock+0x36/0x1c0 [ 376.431243] ? check_same_owner+0x340/0x340 [ 376.435586] ? rcu_note_context_switch+0x730/0x730 [ 376.440552] __should_failslab+0x124/0x180 [ 376.444809] should_failslab+0x9/0x14 [ 376.448623] kmem_cache_alloc_trace+0x2cb/0x780 [ 376.453311] ? kasan_check_write+0x14/0x20 [ 376.457560] ? do_raw_spin_lock+0xc1/0x200 [ 376.461848] kvm_uevent_notify_change.part.32+0x11f/0x440 [ 376.467418] kvm_put_kvm+0x1ae/0x1060 [ 376.471233] ? cpumask_weight.constprop.5+0x3f/0x3f [ 376.476266] ? find_held_lock+0x36/0x1c0 [ 376.480350] ? kvm_write_guest_cached+0x40/0x40 [ 376.485052] ? lock_downgrade+0x8f0/0x8f0 [ 376.489236] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 376.494275] ? kvm_irqfd_release+0xdd/0x120 [ 376.498614] ? kvm_put_kvm+0x1060/0x1060 [ 376.502691] kvm_vm_release+0x42/0x50 [ 376.506514] __fput+0x39b/0x860 [ 376.509813] ? file_free_rcu+0x90/0x90 [ 376.513724] ? _raw_spin_unlock_irq+0x27/0x70 [ 376.518235] ____fput+0x15/0x20 [ 376.521534] task_work_run+0x1e8/0x2a0 [ 376.525452] ? task_work_cancel+0x240/0x240 [ 376.529818] ? exit_to_usermode_loop+0x8c/0x380 [ 376.534543] exit_to_usermode_loop+0x318/0x380 [ 376.539145] ? syscall_slow_exit_work+0x500/0x500 [ 376.544011] ? ksys_ioctl+0x81/0xd0 [ 376.547659] ? do_syscall_64+0x9a/0x820 [ 376.551674] do_syscall_64+0x6be/0x820 [ 376.555584] ? syscall_return_slowpath+0x5e0/0x5e0 [ 376.560535] ? syscall_return_slowpath+0x31d/0x5e0 [ 376.565498] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 376.570882] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 376.575749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.580962] RIP: 0033:0x457089 [ 376.584170] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 376.603080] RSP: 002b:00007ff0fd313c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 376.610802] RAX: 0000000000000004 RBX: 00007ff0fd3146d4 RCX: 0000000000457089 [ 376.618078] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 376.625361] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 376.632639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 376.639923] R13: 00000000004cb6d0 R14: 00000000004c31f3 R15: 0000000000000000 [ 376.729261] hfs: type requires a 4 character value [ 376.734470] hfs: unable to parse mount options [ 376.758625] hfs: type requires a 4 character value [ 376.763674] hfs: unable to parse mount options 22:51:48 executing program 5: r0 = socket$inet6(0xa, 0x6, 0xd9e) ioctl(r0, 0x8912, &(0x7f0000000000)="f3f4c282cb0b805cc83714") munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) pipe2(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x1) setitimer(0x3, &(0x7f0000000140)={{0x0, 0x7530}}, &(0x7f0000000180)) r2 = semget$private(0x0, 0x7, 0x21) semtimedop(r2, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000340)) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x8, 0x8080) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r3, 0xc4c85512, &(0x7f0000000380)={{0x6, 0x5, 0x6, 0x8, 'syz0\x00', 0x400}, 0xa7, [0x8, 0x7fff, 0x5, 0x3, 0x1af8, 0xffff, 0x80000000, 0x81, 0xd84, 0x3, 0x7, 0x4, 0x8000, 0x200, 0x20, 0x600, 0xc990, 0x8, 0x3, 0x0, 0x1819, 0x600000000, 0x7, 0x100, 0x10001, 0x401, 0x6, 0x8, 0x4, 0x9, 0x496, 0x2, 0xfffffffffffffbff, 0x10001, 0x20, 0xffffffffffffffff, 0x66e0, 0xddb1, 0x0, 0x2, 0x8, 0x0, 0x3, 0x7fffffff, 0x81, 0x1, 0x9, 0x6, 0x100000000, 0x3, 0x6, 0xf83, 0x7, 0x6, 0x6, 0x200, 0x5, 0x20, 0x4, 0x800, 0x8001, 0x68, 0x2, 0x1, 0x126, 0x1f, 0x3, 0x6, 0x5, 0x4, 0x3982, 0xc04, 0xc615, 0xffff, 0x3, 0x2, 0x9, 0x5, 0x3, 0xfff, 0x403, 0x100, 0x81, 0x800, 0x200, 0x7, 0x7fff, 0x400, 0x40, 0x1, 0x9, 0x1f, 0x800, 0x6, 0xc26d, 0x4, 0x2, 0x400, 0x7, 0x6d, 0x81, 0x4, 0x5, 0x6, 0x7, 0x40, 0x3f, 0x80000000, 0x20, 0x100000001, 0x6, 0x100, 0x3, 0x40, 0x100, 0x554, 0x1f, 0x2, 0x81, 0x7, 0x1d, 0xffffffff, 0x822e, 0x5, 0xfffffffffffff802, 0x7, 0x0, 0x5], {0x0, 0x989680}}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000008c0), &(0x7f0000000900)=0x4) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000300)={0x7, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}]}) semtimedop(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000100)) sendto$inet6(r0, &(0x7f0000000240)="8d0eb9a28eb931849ae233f4f99412ceb946f1a8c0fc10", 0x17, 0x20040010, &(0x7f0000000280)={0xa, 0x4e23, 0x4, @empty, 0x10}, 0x1c) r4 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3228, 0x400) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r4, 0x111, 0x3, 0x0, 0x4) 22:51:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4080aebf, &(0x7f0000000080)={0x1, 0x0, [{0x40000105}]}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 22:51:48 executing program 1: r0 = memfd_create(&(0x7f0000000000)='[\x00', 0x2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000040)={{0x100, 0xc0, 0x8, 0x4, 0x8, 0x5}, 0x396, 0x0, 0xbdd, 0x1, 0x0, "0cf0a4aaac45fff14ea0acd0192a990528a6b91f9be64f7deb1afa4a7c7677a845a1b55ba9832c7357c1bcaf37cdcd64fd6e2c604f4d3045cc54af39ed5d036a0277436424f745aa5303de6f936ea546de6375b6bc16d394eba82c6bc8b34e87c68381763c3bff8a94d29e213708f2a5fe9e7a7181276e0b07b87b7bbe387060"}) r1 = socket$inet_sctp(0x2, 0x1, 0x84) fadvise64(r1, 0x0, 0x200, 0x7) sendmmsg$inet_sctp(r1, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="30000000000000008400000001e7000000000000008000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 22:51:48 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x420, 0x0) ioctl$RTC_UIE_OFF(r2, 0x7004) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000080)={0x1, 0x4}) getsockname$packet(r2, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000380)=0x14) r4 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x101080) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f00000001c0)=0x10) r5 = open(&(0x7f0000000040)='./file0\x00', 0x1, 0x8) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000200)={0x7ec0926338ca58ca, r2, 0x1}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000140)=@sack_info={0x0, 0x73b, 0xff}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000100)={r6, 0x4, 0x1, 0xa6c, 0x4, 0x2}, 0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000240)={r6, 0x7, 0x9}, &(0x7f0000000300)=0x8) 22:51:48 executing program 2 (fault-call:6 fault-nth:1): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) 22:51:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) 22:51:48 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x198, 0x0) 22:51:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x21000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='type=d']) [ 377.039173] hfs: type requires a 4 character value [ 377.044257] hfs: unable to parse mount options 22:51:48 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000fc0)=[{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000e00), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="30000000000000008400000001e70000000000000080000000000000000000000000000000000000000000002e8e3c1683b9cf391a273017cca909c7550d18b49460326cd23d4f809c4bbd795279b42410bf8435011056e716d13d06a82f3355a0d5c0547ca0f826b43f5ab0cc74113a03dab7cba557ffa710c4ffa05ea4de8e9c808361c30fb71c0158493ef3d791260f98cbbb228efb5e78a8fa522c1618fffc9b29bd20799e589be5e3c34810b3dba0d24908c6619ef084c4ae0c052d0626741458371206b034250916afb30f901d818e0f44a8b606384f18abc6eec0c986d28d", @ANYRES32=0x0], 0x30}], 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f00000001c0)=""/3) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000040)=""/202) [ 377.086871] hfs: type requires a 4 character value [ 377.092091] hfs: unable to parse mount options [ 377.099448] list_del corruption. prev->next should be ffff8801a82de820, but was ffff8801909ad9e0 [ 377.108569] ------------[ cut here ]------------ [ 377.113326] kernel BUG at lib/list_debug.c:53! [ 377.117912] invalid opcode: 0000 [#1] SMP KASAN [ 377.122580] CPU: 1 PID: 21286 Comm: syz-executor0 Not tainted 4.18.0+ #199 [ 377.129587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.138951] RIP: 0010:__list_del_entry_valid.cold.1+0x48/0x58 [ 377.144846] Code: 9c 3a 87 e8 46 28 01 fe 0f 0b 48 89 de 48 c7 c7 20 9d 3a 87 e8 35 28 01 fe 0f 0b 48 89 de 48 c7 c7 c0 9c 3a 87 e8 24 28 01 fe <0f> 0b 90 90 90 90 90 90 90 90 90 90 90 90 90 90 55 48 89 e5 41 57 [ 377.163904] RSP: 0018:ffff8801db107c68 EFLAGS: 00010086 [ 377.169268] RAX: 0000000000000054 RBX: ffff8801a82de820 RCX: 0000000000000000 [ 377.176534] RDX: 0000000000000000 RSI: ffffffff816422b1 RDI: 0000000000000001 [ 377.183800] RBP: ffff8801db107c80 R08: ffff8801b482a100 R09: ffffed003b624fd0 [ 377.191071] R10: ffffed003b624fd0 R11: ffff8801db127e87 R12: ffff88019bacde60 [ 377.198336] R13: ffff8801db11d130 R14: ffff8801a82de820 R15: 0000000000000001 [ 377.205635] FS: 00007fa2f3f9d700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 377.213863] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 377.219757] CR2: 0000000001c6f978 CR3: 00000001c55b2000 CR4: 00000000001426e0 [ 377.227030] Call Trace: [ 377.229605] [ 377.231759] __loaded_vmcs_clear+0x14f/0x630 [ 377.236177] ? copy_shadow_to_vmcs12+0x6e0/0x6e0 [ 377.240937] ? copy_shadow_to_vmcs12+0x6e0/0x6e0 [ 377.245709] flush_smp_call_function_queue+0x1a8/0x5e0 [ 377.251000] ? cpumask_weight+0x40/0x40 [ 377.254987] ? rcu_idle_exit+0x430/0x430 [ 377.259567] ? __lock_is_held+0xb5/0x140 [ 377.263639] generic_smp_call_function_single_interrupt+0x13/0x2b [ 377.269878] smp_call_function_single_interrupt+0x11a/0x670 [ 377.275590] ? smp_call_function_interrupt+0x670/0x670 [ 377.280871] ? _raw_spin_unlock+0x22/0x30 [ 377.285031] ? handle_edge_irq+0x330/0x870 [ 377.289279] ? task_prio+0x50/0x50 [ 377.292828] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 377.297677] call_function_single_interrupt+0xf/0x20 [ 377.302774] [ 377.305025] RIP: 0010:lock_acquire+0x25f/0x540 [ 377.309607] Code: 00 00 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 6a 02 00 00 48 83 3d 08 9f 91 06 00 0f 84 d4 01 00 00 48 8b bd 20 ff ff ff 57 9d <0f> 1f 44 00 00 48 b8 00 00 00 00 00 fc ff df 48 01 c3 48 c7 03 00 [ 377.328511] RSP: 0018:ffff880196e16798 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff04 [ 377.336222] RAX: dffffc0000000000 RBX: 1ffff10032dc2cf8 RCX: 0000000000000000 [ 377.343491] RDX: 1ffffffff0fe3795 RSI: 0000000000000000 RDI: 0000000000000286 [ 377.350778] RBP: ffff880196e16888 R08: 0000000000000008 R09: 0000000000000001 [ 377.358051] R10: ffff8801b482a960 R11: 96c168e39ced084b R12: ffff8801b482a100 [ 377.365323] R13: 0000000000000002 R14: 0000000000000000 R15: 0000000000000000 [ 377.372614] ? lock_release+0xa30/0xa30 [ 377.376604] ? lock_downgrade+0x8f0/0x8f0 [ 377.380757] rcu_read_lock+0x2b/0x70 [ 377.384484] ? mem_cgroup_id_get_many+0x160/0x160 [ 377.389327] lock_page_memcg+0x75/0x300 [ 377.393316] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 377.397995] ? rcu_read_lock+0x70/0x70 [ 377.401895] ? __switch_to_asm+0x34/0x70 [ 377.405970] page_remove_rmap+0x6b9/0x1260 [ 377.410211] ? __switch_to_asm+0x34/0x70 [ 377.414288] ? page_add_file_rmap+0xe40/0xe40 [ 377.418784] ? __schedule+0x884/0x1ec0 [ 377.422678] ? __sched_text_start+0x8/0x8 [ 377.426829] ? lock_acquire+0x1e4/0x540 [ 377.430816] ? unmap_page_range+0x99e/0x2180 [ 377.435223] ? lock_downgrade+0x8f0/0x8f0 [ 377.439370] ? lock_release+0xa30/0xa30 [ 377.443348] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 377.448387] ? _vm_normal_page+0x161/0x3c0 [ 377.452641] ? __pte_alloc_kernel+0x2e0/0x2e0 [ 377.457135] ? kasan_check_write+0x14/0x20 [ 377.461373] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 377.466392] ? __tlb_remove_page_size+0x187/0x500 [ 377.471239] unmap_page_range+0xecd/0x2180 [ 377.475494] ? vm_normal_page_pmd+0x510/0x510 [ 377.479993] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 377.484664] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 377.489346] ? is_bpf_text_address+0xd7/0x170 [ 377.493944] ? kernel_text_address+0x79/0xf0 [ 377.498359] ? __kernel_text_address+0xd/0x40 [ 377.502867] ? graph_lock+0x170/0x170 [ 377.506678] ? find_held_lock+0x36/0x1c0 [ 377.510764] ? lock_downgrade+0x8f0/0x8f0 [ 377.514929] ? kasan_check_read+0x11/0x20 [ 377.519092] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 377.524660] ? uprobe_munmap+0x14c/0x440 [ 377.528735] ? uprobe_mmap+0xd20/0xd20 [ 377.532640] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 377.537226] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 377.542331] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 377.547363] unmap_single_vma+0x1a0/0x310 [ 377.551513] unmap_vmas+0x120/0x1f0 [ 377.555144] exit_mmap+0x2c2/0x5b0 [ 377.558687] ? __ia32_sys_munmap+0x80/0x80 [ 377.562938] ? __khugepaged_exit+0x455/0x6a0 [ 377.567371] mmput+0x265/0x620 [ 377.570567] ? lock_downgrade+0x8d1/0x8f0 [ 377.574716] ? set_mm_exe_file+0x200/0x200 [ 377.578965] ? kasan_check_read+0x11/0x20 [ 377.583116] ? do_raw_spin_unlock+0xa7/0x2f0 [ 377.587523] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 377.592106] ? kasan_check_write+0x14/0x20 [ 377.596341] ? do_raw_spin_lock+0xc1/0x200 [ 377.600580] do_exit+0xec6/0x2760 [ 377.604036] ? plist_add+0x790/0x790 [ 377.607758] ? mm_update_next_owner+0x9a0/0x9a0 [ 377.612444] ? print_usage_bug+0xc0/0xc0 [ 377.616520] ? graph_lock+0x170/0x170 [ 377.620372] ? do_raw_spin_unlock+0xa7/0x2f0 [ 377.624804] ? rcu_note_context_switch+0x730/0x730 [ 377.629732] ? lock_acquire+0x1e4/0x540 [ 377.633720] ? __lock_acquire+0x7fc/0x5020 [ 377.637977] ? trace_hardirqs_on+0x10/0x10 [ 377.642214] ? kasan_check_read+0x11/0x20 [ 377.646376] ? do_raw_spin_unlock+0xa7/0x2f0 [ 377.650783] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 377.655369] ? kasan_check_write+0x14/0x20 [ 377.659617] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 377.664811] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 377.670354] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 377.675460] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 377.681004] ? futex_wait+0x5d2/0xa20 [ 377.684812] ? futex_wait_setup+0x410/0x410 [ 377.689136] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 377.694333] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 377.699885] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 377.705002] ? graph_lock+0x170/0x170 [ 377.708805] ? memset+0x31/0x40 [ 377.712100] ? find_held_lock+0x36/0x1c0 [ 377.716166] ? lock_downgrade+0x8f0/0x8f0 [ 377.720319] do_group_exit+0x177/0x440 [ 377.724213] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 377.728797] ? __ia32_sys_exit+0x50/0x50 [ 377.732859] ? _raw_spin_unlock_irq+0x27/0x70 [ 377.737382] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 377.742406] get_signal+0x88e/0x1970 [ 377.746148] ? ptrace_notify+0x130/0x130 [ 377.750215] ? debug_check_no_obj_freed+0x30b/0x595 [ 377.755236] ? rw_copy_check_uvector+0x30d/0x3e0 [ 377.760001] ? trace_hardirqs_off+0xd/0x10 [ 377.764240] ? quarantine_put+0x10d/0x1b0 [ 377.768387] ? kfree+0x111/0x260 [ 377.771804] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 377.776834] do_signal+0x9c/0x21c0 [ 377.780373] ? vfs_readv+0x10c/0x1c0 [ 377.784090] ? compat_rw_copy_check_uvector+0x440/0x440 [ 377.789455] ? trace_hardirqs_off+0xd/0x10 [ 377.793698] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 377.798799] ? setup_sigcontext+0x7d0/0x7d0 [ 377.803129] ? fget_raw+0x20/0x20 [ 377.806589] ? putname+0xf2/0x130 [ 377.810053] ? exit_to_usermode_loop+0x8c/0x380 [ 377.814724] exit_to_usermode_loop+0x2e5/0x380 [ 377.819314] ? syscall_slow_exit_work+0x500/0x500 [ 377.824161] ? do_syscall_64+0x9a/0x820 [ 377.828230] do_syscall_64+0x6be/0x820 [ 377.832118] ? finish_task_switch+0x1d3/0x870 [ 377.836616] ? syscall_return_slowpath+0x5e0/0x5e0 [ 377.841551] ? syscall_return_slowpath+0x31d/0x5e0 [ 377.846497] ? __switch_to_asm+0x34/0x70 [ 377.850571] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 377.855936] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 377.860806] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.866012] RIP: 0033:0x457089 [ 377.869233] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 377.888153] RSP: 002b:00007fa2f3f9ccf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 377.895864] RAX: fffffffffffffe00 RBX: 00000000009300a8 RCX: 0000000000457089 [ 377.903168] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000009300a8 [ 377.910450] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 377.917720] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000009300ac [ 377.924993] R13: 00007fffe4f483df R14: 00007fa2f3f9d9c0 R15: 0000000000000000 [ 377.932269] Modules linked in: [ 377.935461] Dumping ftrace buffer: [ 377.939009] (ftrace buffer empty) [ 377.942730] ---[ end trace 4d2dfa4bbce8a17d ]--- [ 377.947500] RIP: 0010:__list_del_entry_valid.cold.1+0x48/0x58 [ 377.953381] Code: 9c 3a 87 e8 46 28 01 fe 0f 0b 48 89 de 48 c7 c7 20 9d 3a 87 e8 35 28 01 fe 0f 0b 48 89 de 48 c7 c7 c0 9c 3a 87 e8 24 28 01 fe <0f> 0b 90 90 90 90 90 90 90 90 90 90 90 90 90 90 55 48 89 e5 41 57 [ 377.972284] RSP: 0018:ffff8801db107c68 EFLAGS: 00010086 [ 377.977660] RAX: 0000000000000054 RBX: ffff8801a82de820 RCX: 0000000000000000 [ 377.984942] RDX: 0000000000000000 RSI: ffffffff816422b1 RDI: 0000000000000001 [ 377.992232] RBP: ffff8801db107c80 R08: ffff8801b482a100 R09: ffffed003b624fd0 [ 377.999515] R10: ffffed003b624fd0 R11: ffff8801db127e87 R12: ffff88019bacde60 [ 378.006783] R13: ffff8801db11d130 R14: ffff8801a82de820 R15: 0000000000000001 [ 378.014057] FS: 00007fa2f3f9d700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 378.022303] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 378.028205] CR2: 0000000001c6f978 CR3: 00000001c55b2000 CR4: 00000000001426e0 [ 378.035486] Kernel panic - not syncing: Fatal exception in interrupt [ 378.042281] Dumping ftrace buffer: [ 378.045830] (ftrace buffer empty) [ 378.049522] Kernel Offset: disabled [ 378.053130] Rebooting in 86400 seconds..