hfs: unable to parse mount options 20:48:54 executing program 2: mkdir(&(0x7f0000001e80)='./file0\x00', 0x0) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000880)='./file1/file0\x00', 0x0) creat(&(0x7f0000000040)='./file1/file0\x00', 0x8) mount$overlay(0x0, &(0x7f00000002c0)='./file0/file0\x00', 0x0, 0x0, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') chdir(&(0x7f0000000280)='./file0\x00') unlink(&(0x7f0000000080)='./file0\x00') 20:48:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x0e', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:48:54 executing program 1: stat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000000c0)) r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x70, 0x3, 0x1, 0x5, 0xfffffffffffffffb, 0x0, 0x8, 0x40000, 0x0, 0x435, 0x312a, 0x3, 0xffffffffffffff00, 0x100000000, 0x6, 0x1, 0x80, 0x5, 0x4, 0x9, 0x10, 0x1, 0x4, 0x9c, 0x8, 0x8, 0x979, 0x2, 0xff, 0x2, 0x80, 0x1c2a8434, 0x2, 0x0, 0x59, 0x5, 0x100000001, 0x0, 0x8, 0x7, @perf_config_ext={0x5, 0x5}, 0x4060, 0x80000001, 0x9ba4, 0x7, 0x100000001, 0x1000, 0xfff}, 0xffffffffffffff9c, 0x10, 0xffffffffffffffff, 0x3) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x20) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f00000001c0)={[{@nfs_export_on='nfs_export=on'}]}) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000880)='./file1/file0\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') 20:48:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x5a6af000, 0x1000000}], 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:48:54 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x5a6af000, 0x1000000}], 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) [ 412.930510] overlayfs: failed to resolve './file1': -2 20:48:54 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:48:54 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00006dbffc)=0x1, 0x4) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200, 0x0) ioctl$VT_ACTIVATE(r1, 0x5606, 0x101) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000040)={0x14, 0x2, 0x5}) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) recvmsg(r0, &(0x7f00000004c0)={&(0x7f00000000c0)=@can, 0x80, 0x0, 0x0, &(0x7f0000000000)=""/2, 0xfffffffffffffc82}, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000140)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0xd, 0xc16, 0x8, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null]}) 20:48:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x5a6af000, 0x1000000}], 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:48:54 executing program 1: stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x90000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000380)={0x0, 0xbff, &(0x7f00000000c0)="1d3dbffa1de9df04cec5d5b090e9e2dbafa3b20c428513bfb4d0ff50bb5d8e0561611871f9c408f9ba8236dea5f194a16102e10979bbec64c0f1485e9b7340098dd01ada0b553e9bd12d4e029c4e01a5b1126d918d9203d8f66b3be9dcf5c9bfe09345a922eb2f66a9eeec473c4d92e5c9db9578530be649bcbfa214d9efad717cd7dce3e0", &(0x7f0000000240)="0a9dde99646d26790587977cdc4816ed32f27bd59ddb97a40998e92b70f5c10007d3482eae505a7f8db6dd607f72164cb9150595f1dd861e3fe9f74ff83ed6be55ac49bd086a99dc13ca5e51a7f0659ac97054ca411517c9c70fd44f1c8119fac364e79085b8ffd32c515f82310a8a397c6c33ef5e3f699b6bcee968a674bc79c9c8a0a07e17c1e48f663f3f5622d011309a88bd45d24833fe52363c96a11bd2f8faccb9f0a1a00124f3c0bbdbf2bb5cbe6555", 0x85, 0xb3}) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000880)='./file1/file0\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) accept4(r1, &(0x7f0000000400)=@nl=@unspec, &(0x7f0000000480)=0x80, 0x800) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') getpeername$netlink(r1, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 413.363358] hfs: unable to parse mount options 20:48:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\xe0', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:48:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x5a6af000, 0x1000000}], 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:48:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000000c0)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000400)={"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"}) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f00000001c0)={0x0, 0x585, 0xbb, [], &(0x7f0000000180)=0x9}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000040)={0x7, 0x200}) 20:48:55 executing program 1: stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f00000001c0)=ANY=[@ANYBLOB='nfs_e~pkrt=on,\x00']) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000880)='./file1/file0\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') 20:48:55 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:48:55 executing program 5 (fault-call:7 fault-nth:0): kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:48:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 414.137203] FAULT_INJECTION: forcing a failure. [ 414.137203] name failslab, interval 1, probability 0, space 0, times 0 [ 414.183116] CPU: 1 PID: 18857 Comm: syz-executor5 Not tainted 4.20.0+ #1 [ 414.189988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.199389] Call Trace: [ 414.202001] dump_stack+0x1db/0x2d0 [ 414.205656] ? dump_stack_print_info.cold+0x20/0x20 [ 414.210717] should_fail.cold+0xa/0x15 [ 414.214627] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 414.219752] ? ___might_sleep+0x1e7/0x310 [ 414.223914] ? arch_local_save_flags+0x50/0x50 [ 414.228512] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.234064] __should_failslab+0x121/0x190 [ 414.238309] should_failslab+0x9/0x14 [ 414.242122] kmem_cache_alloc_trace+0x2d1/0x760 [ 414.246812] alloc_pipe_info+0x152/0x580 [ 414.250889] ? pipe_read+0x940/0x940 [ 414.254672] ? aa_path_link+0x5d0/0x5d0 [ 414.258666] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 414.263601] ? common_file_perm+0x231/0x800 [ 414.267973] splice_direct_to_actor+0x795/0x9d0 [ 414.272652] ? iterate_fd+0x4b0/0x4b0 [ 414.276457] ? generic_pipe_buf_nosteal+0x10/0x10 [ 414.281314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.286874] ? do_splice_to+0x190/0x190 [ 414.290895] ? rw_verify_area+0x118/0x360 [ 414.295060] do_splice_direct+0x2c7/0x420 [ 414.299220] ? splice_direct_to_actor+0x9d0/0x9d0 [ 414.304087] ? rw_verify_area+0x118/0x360 [ 414.308248] do_sendfile+0x61a/0xe60 [ 414.311988] ? do_compat_pwritev64+0x1c0/0x1c0 [ 414.316608] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 414.322165] ? _copy_from_user+0xdd/0x150 [ 414.326425] __x64_sys_sendfile64+0x15a/0x240 [ 414.330931] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 414.335526] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 414.340298] do_syscall_64+0x1a3/0x800 [ 414.344206] ? syscall_return_slowpath+0x5f0/0x5f0 [ 414.349141] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 414.354162] ? __switch_to_asm+0x34/0x70 [ 414.358239] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 414.363096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.368292] RIP: 0033:0x457ec9 [ 414.371492] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 414.390573] RSP: 002b:00007ff05a4d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 414.398283] RAX: ffffffffffffffda RBX: 00007ff05a4d2c90 RCX: 0000000000457ec9 [ 414.405553] RDX: 00000000200000c0 RSI: 0000000000000004 RDI: 0000000000000003 [ 414.412826] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 414.420098] R10: 00000000effffdef R11: 0000000000000246 R12: 00007ff05a4d36d4 [ 414.427373] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 0000000000000005 20:48:56 executing program 2 (fault-call:0 fault-nth:0): kexec_load(0x0, 0x0, 0x0, 0x0) 20:48:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x5a6af000, 0x1000000}], 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:48:56 executing program 5 (fault-call:7 fault-nth:1): kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:48:56 executing program 1: stat(&(0x7f0000000180)='./file2\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f00000001c0)={[{@nfs_export_on='nfs_export=on'}]}) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000880)='./file1/file0\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file1/file0\x00', 0x4, 0x3, &(0x7f00000000c0)=[{&(0x7f0000000080)="ad0127c5188228dd8e5f6c64053b0c67ee3a47dcedd405993a59367d0ad3e71f6518b4959b3b45", 0x27, 0xe100000000000}, {&(0x7f0000000400)="5eb371011f0c2d9bbc27d2e9a25111ae723c8da6cf4713b8b879357887ca887e5c3fd1a100225df31540dac38cf942d813708ab9bc220b09d72493c23724d4dec0fecf83593745eb3cc33f0d29e4ee23d1971dcb3f6dac7e2e2491ff517e2c76a7a3eb922b12fbd08e101e8757d22fb371f7707e794e3048e27b9c32775fc83f4dea06ae11157e12a3eb8d9a3ddd8feab84bce3bd143836a453b7c01604477fa0ea56103c2899bb31c81ce6fc62dcc843ec9007cbcb71567c82e4c78ec733e9dd0baeb68ddea47d20532a174b372506566d37a69", 0xd4, 0xc}, {&(0x7f0000000500)="0f288da47e3e7cdc221ec1be08ce72907f310625dbd5cdb529a1549d09d4bc8768252215258cc7a52ca4cc81f8a955052a1d3111e87c18c3fb82fb6edf304100d2c732f2c45bc658f2ed10892b0410e86f55ce62fc3e428ae3d526b1e59678cb6d3fc0913f5b9f9b34ed3fbef0267eaaac00564537e45f44c1040e7dbcc92650eeee843dbbee9b165785a69ce5c7cd21909c14257993dd55966af6d909691976f9a9099b0fe1998fb66c643a03b19c139565ea1c14e77e8ea789224e5371e1d1b0495db4922eecf74084ee46408b9d3f45040bf8ac2cf1b41a", 0xd9, 0xfff1}], 0x8000, &(0x7f0000000240)={[{@noflush_merge='noflush_merge'}, {@inline_dentry='inline_dentry'}, {@whint_mode_user='whint_mode=user-based'}, {@grpjquota={'grpjquota'}}, {@noextent_cache='noextent_cache'}, {@prjjquota={'prjjquota'}}, {@whint_mode_user='whint_mode=user-based'}], [{@audit='audit'}, {@euid_eq={'euid', 0x3d, r0}}, {@permit_directio='permit_directio'}]}) [ 414.616045] hfs: unable to parse mount options 20:48:56 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) [ 414.740477] hfs: unable to parse mount options [ 414.750129] FAULT_INJECTION: forcing a failure. [ 414.750129] name failslab, interval 1, probability 0, space 0, times 0 [ 414.804839] CPU: 1 PID: 18886 Comm: syz-executor5 Not tainted 4.20.0+ #1 [ 414.811718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.821083] Call Trace: [ 414.823711] dump_stack+0x1db/0x2d0 [ 414.827405] ? dump_stack_print_info.cold+0x20/0x20 [ 414.832444] ? percpu_ref_put_many+0x129/0x270 [ 414.837066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.842628] should_fail.cold+0xa/0x15 [ 414.846536] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 414.851683] ? ___might_sleep+0x1e7/0x310 [ 414.855849] ? arch_local_save_flags+0x50/0x50 [ 414.860475] __should_failslab+0x121/0x190 [ 414.864725] should_failslab+0x9/0x14 [ 414.868539] __kmalloc+0x2dc/0x740 [ 414.872089] ? kmem_cache_alloc_trace+0x354/0x760 [ 414.876952] ? alloc_pipe_info+0x286/0x580 [ 414.881210] alloc_pipe_info+0x286/0x580 [ 414.885290] ? pipe_read+0x940/0x940 [ 414.889017] ? aa_path_link+0x5d0/0x5d0 [ 414.893014] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 414.897964] ? common_file_perm+0x231/0x800 [ 414.902315] splice_direct_to_actor+0x795/0x9d0 [ 414.907009] ? iterate_fd+0x4b0/0x4b0 [ 414.910823] ? generic_pipe_buf_nosteal+0x10/0x10 [ 414.915696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.921248] ? do_splice_to+0x190/0x190 [ 414.925243] ? rw_verify_area+0x118/0x360 [ 414.929415] do_splice_direct+0x2c7/0x420 [ 414.933587] ? splice_direct_to_actor+0x9d0/0x9d0 [ 414.938459] ? rw_verify_area+0x118/0x360 [ 414.942625] do_sendfile+0x61a/0xe60 [ 414.946375] ? do_compat_pwritev64+0x1c0/0x1c0 [ 414.950980] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 414.956533] ? _copy_from_user+0xdd/0x150 [ 414.960700] __x64_sys_sendfile64+0x15a/0x240 [ 414.965213] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 414.969809] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 414.974592] do_syscall_64+0x1a3/0x800 [ 414.978501] ? syscall_return_slowpath+0x5f0/0x5f0 [ 414.983450] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 414.988481] ? __switch_to_asm+0x34/0x70 [ 414.992564] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 414.997431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.002632] RIP: 0033:0x457ec9 20:48:56 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(0x0, 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) [ 415.005835] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 415.024761] RSP: 002b:00007ff05a4d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 415.024778] RAX: ffffffffffffffda RBX: 00007ff05a4d2c90 RCX: 0000000000457ec9 [ 415.024789] RDX: 00000000200000c0 RSI: 0000000000000004 RDI: 0000000000000003 [ 415.024799] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 20:48:56 executing program 2: kexec_load(0x3e0000, 0x0, 0x0, 0x0) [ 415.024809] R10: 00000000effffdef R11: 0000000000000246 R12: 00007ff05a4d36d4 [ 415.024819] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 0000000000000005 20:48:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:48:56 executing program 2: kexec_load(0x10, 0x0, 0x0, 0x0) 20:48:56 executing program 5 (fault-call:7 fault-nth:2): kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 415.270528] hfs: unable to parse mount options 20:48:56 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:48:56 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x1f, 0xfffffffffffffff8, 0x3, 0x0, 0x2}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r1, 0x6}, 0x8) stat(&(0x7f0000000180)='./file2\x00', &(0x7f0000000240)) mount$overlay(0x0, 0x0, 0x0, 0x800001, &(0x7f00000001c0)=ANY=[@ANYBLOB="7a696ef953f61a9400b38980370f3e20d16f1e"]) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x2c6, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000880)='./file1/file0\x00', 0xfffffffffffffffc) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000000)={0x6, 0x8001}) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') [ 415.403090] hfs: unable to parse mount options 20:48:57 executing program 2: kexec_load(0x1000000000000000, 0x0, 0x0, 0x0) 20:48:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x5a6af000, 0x1000000}], 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:48:57 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\xf4', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:48:57 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(0x0, 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:48:57 executing program 1: stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f00000001c0)={[{@nfs_export_on='nfs_export=on'}]}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x0, 0x0) getdents(r0, &(0x7f00000007c0)=""/8, 0x8) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000880)='./file1/file0\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') write(r1, &(0x7f0000000000)="f5d25d6d5aa4beb213d73fdc1b6bbcacaee33e5704b0eb1645d0", 0x1a) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file1\x00', 0x5, 0x7, &(0x7f00000006c0)=[{&(0x7f00000000c0)="1e2a07c8d9a16a732e3b63", 0xb, 0x9}, {&(0x7f0000000100)="e1f80963a137e1479355ce26dbe32b5bcad9a21ae163ca57ec993d7c1f6cb9b0c8ae610dbefc0c385819b6ed5d6bcb88d4536aa2acc0d0a368a28a1b0ec356242b94c2f1001e37", 0x47, 0x946f}, {&(0x7f0000000400)="5c73791e59e338c8eb302adc0d9104b7011f39b75c0442551f030537fae8942a6e1caf1542a2810d25b315924786cffcffed6dcca06791a53e3f948f251d91bbb1d039986924e147bded7872f59239a577d5d93b66ce2c9762527a64fdd5c464d2a9da7e34af4c7096c13db95dce4bdc03b9e21082afb4b289b34412d6e46e74c4e04b5a98daa4606db880e12542c194ed6fa7c41fafe9612df8092306c5946e07ec5e51bc1542c1f68441a52005a9957062c3b9c79f1d35ec192cea591e34d9388d52e7776ce5d39bd2", 0xca, 0x8}, {&(0x7f00000008c0)="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", 0x1000, 0x81}, {&(0x7f0000000240)="cef5585dcd96bde4a6c583076ea0995e9349f5f30471a397f7c2dc826d1f60b0668fd42db10f49", 0x27, 0x5}, {&(0x7f0000000500)="62bf1234ee522f9efa5489b3ebb8f7c5c44a5dee1503a8067a3f30e583b54db3a82c3020ad9e91cc1529f24faa28077f35e799c85747bc213aa22d0a74f091bf46ee00b2f56327a40b4397757011c409003a2ff395dd5624d1caa1f480f408f4b57a9674629c4a0f6cc0a913d82ef291e034cfaedf01372b99b52a6ec6b1c9c73dfcc9d47bbcee975889ceb877ca13dc6229189159eb573482309ff370cada42cc775b6aadeb154ac45a839bb3df98de7a49aeff7d64716b0a6a6d4a1d1be5714a101fbd1f537c86189886f426941524dcb54764d0744a9340eb0b67e17e00dac5d9b1870c6ef4c58f3a5eb14a1629df", 0xf0, 0x10001}, {&(0x7f0000000600)="f23e49f85beb8fd29de0f2fb9f846dca6118bbd73f82c375e6adf1f613a3df9b53da88a5d9396ee351b6d1bca0d54a1ef05d7c3963d4857ed3db9c815fa5d79bafac2c8ea9c0d4c09a34e35446950d7c3dc4b6e5435572cde317888cdc6fe5f3bf4cac3e002f03f6b4a060060ea83ba06645206f7b4656571a900106e38a0f90b69dc16e64d734c1610fe7ffb9aa69e05db4daf04b4cf17998d14dd298325210af", 0xa1, 0x3}], 0x0, &(0x7f0000000280)={[{@user_xattr='user_xattr'}, {@discard='discard'}, {@inline_xattr='inline_xattr'}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@appraise_type='appraise_type=imasig'}, {@dont_hash='dont_hash'}]}) 20:48:57 executing program 2: kexec_load(0x3e0000000000, 0x0, 0x0, 0x0) [ 415.725030] FAULT_INJECTION: forcing a failure. [ 415.725030] name failslab, interval 1, probability 0, space 0, times 0 [ 415.842757] CPU: 0 PID: 18950 Comm: syz-executor5 Not tainted 4.20.0+ #1 [ 415.849645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.859010] Call Trace: [ 415.861617] dump_stack+0x1db/0x2d0 [ 415.865267] ? dump_stack_print_info.cold+0x20/0x20 [ 415.870300] ? print_usage_bug+0xd0/0xd0 [ 415.874392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.879949] ? check_preemption_disabled+0x48/0x290 [ 415.884972] should_fail.cold+0xa/0x15 [ 415.888852] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 415.893985] ? ___might_sleep+0x1e7/0x310 [ 415.898148] ? arch_local_save_flags+0x50/0x50 [ 415.902757] ? mark_held_locks+0x100/0x100 [ 415.907020] __should_failslab+0x121/0x190 [ 415.911400] should_failslab+0x9/0x14 [ 415.915231] kmem_cache_alloc_node_trace+0x270/0x720 [ 415.920368] ? debug_smp_processor_id+0x1c/0x20 [ 415.925056] ? perf_trace_lock+0x12f/0x750 [ 415.929317] ? perf_trace_lock_acquire+0x138/0x7d0 [ 415.934272] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 415.939568] __kmalloc_node+0x3d/0x70 20:48:57 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:48:57 executing program 2: kexec_load(0x10000000, 0x0, 0x0, 0x0) [ 415.943396] kvmalloc_node+0x68/0x100 [ 415.947218] iov_iter_get_pages_alloc+0x87f/0x15a0 [ 415.952167] ? aa_file_perm+0x42e/0x1090 [ 415.956245] ? find_held_lock+0x35/0x120 [ 415.960329] ? iov_iter_revert+0xaa0/0xaa0 [ 415.964606] ? lock_downgrade+0x910/0x910 [ 415.968760] ? kasan_check_read+0x11/0x20 [ 415.972910] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 415.978217] ? rcu_read_unlock_special+0x380/0x380 [ 415.983157] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 415.988164] ? iov_iter_pipe+0xba/0x2f0 [ 415.992153] default_file_splice_read+0x1b1/0xac0 [ 415.997037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.002609] ? aa_path_link+0x5d0/0x5d0 [ 416.006589] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 416.011892] ? iter_file_splice_write+0xfc0/0xfc0 [ 416.016745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.022296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.027834] ? check_preemption_disabled+0x48/0x290 [ 416.032885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.038431] ? fsnotify+0x4f5/0xed0 [ 416.042070] ? debug_mutex_init+0x2d/0x60 [ 416.046244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.051785] ? __fsnotify_parent+0xe2/0x450 [ 416.056126] ? fsnotify_first_mark+0x350/0x350 [ 416.060711] ? apparmor_path_rmdir+0x30/0x30 [ 416.065125] ? alloc_pipe_info+0x286/0x580 [ 416.069382] ? security_file_permission+0x94/0x320 [ 416.074318] ? rw_verify_area+0x118/0x360 [ 416.078488] ? iter_file_splice_write+0xfc0/0xfc0 [ 416.083365] do_splice_to+0x12a/0x190 [ 416.087174] splice_direct_to_actor+0x31b/0x9d0 [ 416.091833] ? generic_pipe_buf_nosteal+0x10/0x10 [ 416.096672] ? do_splice_to+0x190/0x190 [ 416.100650] ? rw_verify_area+0x118/0x360 [ 416.104805] do_splice_direct+0x2c7/0x420 [ 416.108963] ? splice_direct_to_actor+0x9d0/0x9d0 [ 416.113811] ? rw_verify_area+0x118/0x360 [ 416.117962] do_sendfile+0x61a/0xe60 [ 416.121686] ? do_compat_pwritev64+0x1c0/0x1c0 [ 416.126271] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 416.131812] ? _copy_from_user+0xdd/0x150 [ 416.135965] __x64_sys_sendfile64+0x15a/0x240 [ 416.140516] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 416.145117] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 416.149916] do_syscall_64+0x1a3/0x800 [ 416.153815] ? syscall_return_slowpath+0x5f0/0x5f0 [ 416.158756] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 416.163778] ? __switch_to_asm+0x34/0x70 [ 416.167852] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 416.172702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 416.177883] RIP: 0033:0x457ec9 [ 416.181069] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 416.199963] RSP: 002b:00007ff05a4b1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 416.207669] RAX: ffffffffffffffda RBX: 00007ff05a4b1c90 RCX: 0000000000457ec9 [ 416.214925] RDX: 00000000200000c0 RSI: 0000000000000004 RDI: 0000000000000003 [ 416.222195] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 416.229466] R10: 00000000effffdef R11: 0000000000000246 R12: 00007ff05a4b26d4 [ 416.236724] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 0000000000000005 20:48:57 executing program 5 (fault-call:7 fault-nth:3): kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:48:58 executing program 2: kexec_load(0x3e00, 0x0, 0x0, 0x0) 20:48:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x5a6af000, 0x1000000}], 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:48:58 executing program 1: stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f00000001c0)={[{@nfs_export_on='nfs_export=on'}]}) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x2c, "0c2d33d561d660e1dcb4c7fb6e06e6fd0c6600afbf2b7ef528e1887ad32b0d871e53f82cb3463901af724240"}, &(0x7f0000000080)=0x34) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000000c0)={r1, 0x4, 0x18, "635395b1470e2f8936932fc5b6e184a7036ee4121dd09085"}, 0x20) creat(&(0x7f0000000880)='./file1/file0\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x1, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') 20:48:58 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 416.568312] FAULT_INJECTION: forcing a failure. [ 416.568312] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 416.590363] CPU: 0 PID: 18995 Comm: syz-executor5 Not tainted 4.20.0+ #1 [ 416.597226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.606591] Call Trace: [ 416.609203] dump_stack+0x1db/0x2d0 [ 416.612887] ? dump_stack_print_info.cold+0x20/0x20 [ 416.617924] ? is_bpf_text_address+0xd3/0x170 [ 416.622449] should_fail.cold+0xa/0x15 [ 416.626369] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 416.631501] ? arch_local_save_flags+0x50/0x50 [ 416.636098] ? lock_release+0xc40/0xc40 [ 416.640109] should_fail_alloc_page+0x50/0x60 [ 416.644619] __alloc_pages_nodemask+0x323/0xdc0 [ 416.649316] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 416.654393] ? __kmalloc_node+0x3d/0x70 [ 416.658400] ? rcu_read_lock_sched_held+0x110/0x130 [ 416.663439] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 416.669060] alloc_pages_current+0x107/0x210 [ 416.673497] push_pipe+0x3fc/0x7a0 [ 416.677065] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 416.682013] ? aa_file_perm+0x42e/0x1090 [ 416.686092] ? find_held_lock+0x35/0x120 [ 416.690173] ? iov_iter_revert+0xaa0/0xaa0 [ 416.694427] ? lock_downgrade+0x910/0x910 [ 416.698586] ? kasan_check_read+0x11/0x20 [ 416.702747] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 416.708044] ? rcu_read_unlock_special+0x380/0x380 [ 416.713000] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 416.718034] ? iov_iter_pipe+0xba/0x2f0 [ 416.722032] default_file_splice_read+0x1b1/0xac0 [ 416.726890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.732450] ? aa_path_link+0x5d0/0x5d0 [ 416.736442] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 416.741736] ? iter_file_splice_write+0xfc0/0xfc0 [ 416.746595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.752149] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.757700] ? check_preemption_disabled+0x48/0x290 [ 416.762748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.768296] ? fsnotify+0x4f5/0xed0 [ 416.771962] ? debug_mutex_init+0x2d/0x60 [ 416.776143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.781693] ? __fsnotify_parent+0xe2/0x450 [ 416.786030] ? fsnotify_first_mark+0x350/0x350 [ 416.790646] ? apparmor_path_rmdir+0x30/0x30 [ 416.795073] ? alloc_pipe_info+0x286/0x580 [ 416.799349] ? security_file_permission+0x94/0x320 [ 416.804321] ? rw_verify_area+0x118/0x360 [ 416.808498] ? iter_file_splice_write+0xfc0/0xfc0 [ 416.813344] do_splice_to+0x12a/0x190 [ 416.817145] splice_direct_to_actor+0x31b/0x9d0 [ 416.821805] ? generic_pipe_buf_nosteal+0x10/0x10 [ 416.826659] ? do_splice_to+0x190/0x190 [ 416.830639] ? rw_verify_area+0x118/0x360 [ 416.834797] do_splice_direct+0x2c7/0x420 [ 416.838943] ? splice_direct_to_actor+0x9d0/0x9d0 [ 416.843792] ? rw_verify_area+0x118/0x360 [ 416.847932] do_sendfile+0x61a/0xe60 [ 416.851646] ? do_compat_pwritev64+0x1c0/0x1c0 [ 416.856225] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 416.861752] ? _copy_from_user+0xdd/0x150 [ 416.865908] __x64_sys_sendfile64+0x15a/0x240 [ 416.870423] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 416.875026] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 416.879789] do_syscall_64+0x1a3/0x800 [ 416.883667] ? syscall_return_slowpath+0x5f0/0x5f0 [ 416.888598] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 416.893601] ? __switch_to_asm+0x34/0x70 [ 416.897656] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 416.902507] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 416.907699] RIP: 0033:0x457ec9 [ 416.910883] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 416.929773] RSP: 002b:00007ff05a4d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 416.937475] RAX: ffffffffffffffda RBX: 00007ff05a4d2c90 RCX: 0000000000457ec9 [ 416.944736] RDX: 00000000200000c0 RSI: 0000000000000004 RDI: 0000000000000003 [ 416.951993] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 416.959250] R10: 00000000effffdef R11: 0000000000000246 R12: 00007ff05a4d36d4 20:48:58 executing program 2: kexec_load(0x0, 0x3e0000, 0x0, 0x0) [ 416.966512] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 0000000000000005 20:48:58 executing program 5 (fault-call:7 fault-nth:4): kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 417.099738] hfs: unable to parse mount options 20:48:58 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:48:58 executing program 2: kexec_load(0x0, 0x1000000000000000, 0x0, 0x0) [ 417.266129] FAULT_INJECTION: forcing a failure. [ 417.266129] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 417.301762] CPU: 0 PID: 19024 Comm: syz-executor5 Not tainted 4.20.0+ #1 [ 417.308670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.318478] Call Trace: [ 417.321090] dump_stack+0x1db/0x2d0 [ 417.324746] ? dump_stack_print_info.cold+0x20/0x20 [ 417.329775] ? is_bpf_text_address+0xd3/0x170 [ 417.334300] should_fail.cold+0xa/0x15 [ 417.338211] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 417.343365] ? arch_local_save_flags+0x50/0x50 [ 417.347958] ? lock_release+0xc40/0xc40 [ 417.351950] ? rcu_pm_notify+0xd0/0xd0 [ 417.355873] should_fail_alloc_page+0x50/0x60 [ 417.360392] __alloc_pages_nodemask+0x323/0xdc0 [ 417.365087] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 417.370290] ? __kmalloc_node+0x3d/0x70 [ 417.374278] ? rcu_read_lock_sched_held+0x110/0x130 [ 417.379306] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 417.384872] alloc_pages_current+0x107/0x210 [ 417.389301] push_pipe+0x3fc/0x7a0 [ 417.392881] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 417.397828] ? aa_file_perm+0x42e/0x1090 [ 417.401914] ? find_held_lock+0x35/0x120 [ 417.406001] ? iov_iter_revert+0xaa0/0xaa0 [ 417.410354] ? lock_downgrade+0x910/0x910 [ 417.414522] ? kasan_check_read+0x11/0x20 [ 417.418679] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 417.423969] ? rcu_read_unlock_special+0x380/0x380 [ 417.428926] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 417.433956] ? iov_iter_pipe+0xba/0x2f0 [ 417.437957] default_file_splice_read+0x1b1/0xac0 [ 417.442819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.448396] ? aa_path_link+0x5d0/0x5d0 [ 417.452488] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 417.457780] ? iter_file_splice_write+0xfc0/0xfc0 [ 417.462644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.468192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.468211] ? check_preemption_disabled+0x48/0x290 [ 417.468242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.468259] ? fsnotify+0x4f5/0xed0 [ 417.478821] ? debug_mutex_init+0x2d/0x60 [ 417.478849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.478864] ? __fsnotify_parent+0xe2/0x450 [ 417.478884] ? fsnotify_first_mark+0x350/0x350 [ 417.478902] ? apparmor_path_rmdir+0x30/0x30 [ 417.511040] ? alloc_pipe_info+0x286/0x580 [ 417.515308] ? security_file_permission+0x94/0x320 [ 417.520276] ? rw_verify_area+0x118/0x360 [ 417.521194] hfs: unable to parse mount options [ 417.524437] ? iter_file_splice_write+0xfc0/0xfc0 [ 417.524460] do_splice_to+0x12a/0x190 [ 417.524486] splice_direct_to_actor+0x31b/0x9d0 [ 417.524507] ? generic_pipe_buf_nosteal+0x10/0x10 [ 417.524533] ? do_splice_to+0x190/0x190 [ 417.551215] ? rw_verify_area+0x118/0x360 [ 417.555395] do_splice_direct+0x2c7/0x420 [ 417.559564] ? splice_direct_to_actor+0x9d0/0x9d0 [ 417.564438] ? rw_verify_area+0x118/0x360 [ 417.568603] do_sendfile+0x61a/0xe60 [ 417.572368] ? do_compat_pwritev64+0x1c0/0x1c0 [ 417.576984] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 417.582535] ? _copy_from_user+0xdd/0x150 [ 417.586732] __x64_sys_sendfile64+0x15a/0x240 [ 417.591265] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 417.595877] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 417.600661] do_syscall_64+0x1a3/0x800 [ 417.604570] ? syscall_return_slowpath+0x5f0/0x5f0 [ 417.609515] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 417.614546] ? __switch_to_asm+0x34/0x70 [ 417.618633] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 417.623502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.628699] RIP: 0033:0x457ec9 [ 417.631904] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 417.650815] RSP: 002b:00007ff05a4d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 417.658536] RAX: ffffffffffffffda RBX: 00007ff05a4d2c90 RCX: 0000000000457ec9 20:48:59 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:48:59 executing program 2: kexec_load(0x0, 0x3e0000000000, 0x0, 0x0) 20:48:59 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rfkill\x00', 0x101100, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000740)=@fragment={0x6, 0x0, 0x5c17b05c, 0x1000, 0x0, 0xfec2, 0x66}, 0x8) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x40100) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={0x0}, &(0x7f0000000240)=0x8) mount$9p_unix(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x10080, &(0x7f0000000500)={'trans=unix,', {[{@cache_loose='cache=loose'}, {@mmap='mmap'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '('}}, {@euid_eq={'euid', 0x3d, r1}}, {@appraise_type='appraise_type=imasig'}]}}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000640)={r3, 0xe5, "ba6104ece255bc6317fd02943b33e6628f238beacb39a7b9704e4e087020f1f94773c529c63f5a6aec7834a8330391aa55fe164187c70ff9b9f40dbdef2fcc17df8a9f7310ab4b2350cb93fb31f0fdd5acb65742303d06861ebc4c427dd0d93ac00dccb4dc1f0ee159193966717154472a81e5210a3b9db348350500ebc3947b44e80d508ffc80657fe78dd3ce8dbf2d466942f2282c4639537d234fc5cd8d7600f7ad8675a4e91b941996e114070ad9068dd4b989918b42e0562181dcc618333c6efc5370ec1e0539d9f4618ec68e5172d8658ea9ba759015ded0eea90000000000000000"}, &(0x7f0000000280)=0xed) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f0000000580)=ANY=[@ANYBLOB="6e04005f6578706f72743d2b292c00"]) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x3f3, 0x0, 0x0, 0xfffffffffffffffd, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000011"], 0x5, 0x1) r5 = creat(&(0x7f0000000880)='./file1/file0\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000600)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r5, 0x800448d2, &(0x7f0000000440)={0x3, &(0x7f00000008c0)=[{}, {}, {}]}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000400)={0x8}) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') llistxattr(&(0x7f0000000180)='./file1\x00', &(0x7f00000005c0)=""/48, 0x30) 20:48:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x5a6af000, 0x1000000}], 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:48:59 executing program 2: kexec_load(0x0, 0x10000000, 0x0, 0x0) 20:48:59 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) [ 417.665816] RDX: 00000000200000c0 RSI: 0000000000000004 RDI: 0000000000000003 [ 417.673095] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 417.681015] R10: 00000000effffdef R11: 0000000000000246 R12: 00007ff05a4d36d4 [ 417.681026] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 0000000000000005 20:48:59 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:48:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x5a6af000, 0x1000000}], 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:48:59 executing program 2: kexec_load(0x0, 0x3e00, 0x0, 0x0) [ 418.056147] hfs: unable to parse mount options 20:48:59 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:48:59 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:48:59 executing program 1: stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f00000001c0)={[{@nfs_export_on='nfs_export=on'}]}) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000880)='./file1/file0\x00', 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000000)={0x4, 0x9}) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') 20:48:59 executing program 2: kexec_load(0x0, 0x10, 0x0, 0x0) [ 418.182662] hfs: unable to parse mount options 20:48:59 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:48:59 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x1000000000000000) 20:49:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:00 executing program 1: stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6673a27ed68054d770066f6e2c00"]) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000880)='./file1/file0\x00', 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') 20:49:00 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10003, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:00 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x10000000) [ 418.760718] hfs: unable to parse mount options 20:49:00 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:49:00 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x3e00) 20:49:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) [ 418.857090] vivid-001: kernel_thread() failed 20:49:00 executing program 1: stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f00000001c0)={[{@nfs_export_on='nfs_export=on'}]}) symlink(&(0x7f0000000000)='./file2\x00', &(0x7f0000000040)='./file0/file0\x00') syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000880)='./file1/file0\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') 20:49:00 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(0xffffffffffffffff, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) [ 418.966617] hfs: unable to parse mount options 20:49:00 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x10) 20:49:00 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10010, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfsh', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:00 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x3e0000) 20:49:00 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:49:00 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x3e0000000000) 20:49:00 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:49:01 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10300, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:01 executing program 1: stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = creat(&(0x7f0000000880)='./file1/file0\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') mount$9p_fd(0x0, &(0x7f0000000080)='./file2\x00', &(0x7f00000000c0)='9p\x00', 0x2000000, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_fscache='cache=fscache'}], [{@euid_eq={'euid', 0x3d, r0}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@hash='hash'}, {@euid_gt={'euid>', r0}}, {@measure='measure'}, {@smackfsroot={'smackfsroot', 0x3d, '-self(em0wlan1'}}, {@euid_eq={'euid', 0x3d, r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x64, 0x0, 0x35, 0x67, 0x32, 0x7f, 0x32], 0x2d, [0x30, 0x0, 0x7f, 0x63], 0x2d, [0x62, 0x3f, 0x76, 0x37], 0x2d, [0x34, 0x38, 0x35, 0x63], 0x2d, [0x38, 0x77, 0x36, 0x7b, 0x36, 0x0, 0x77, 0x33]}}}, {@uid_gt={'uid>', r0}}]}}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000000)) 20:49:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:01 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x23c2, 0x400001) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0x40}, &(0x7f0000000200)=0x8) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000140)=@req={0x28, &(0x7f0000000100)={'ipddp0\x00', @ifru_data=&(0x7f00000000c0)="5eb39a56cd3c13932bcafe73623debd043056dfb472c47a75acf3beb25802f48"}}) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000080)={0x3, 0x1, [0x101, 0x2, 0x4, 0x8, 0x9, 0x9, 0x1, 0x40000000]}) 20:49:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:01 executing program 1: stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f00000001c0)={[{@nfs_export_on='nfs_export=on'}]}) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x481, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000040)={{0x3f, @empty, 0x4e21, 0x0, 'dh\x00', 0xc, 0x1ff, 0x8}, {@multicast2, 0x4e20, 0x0, 0x80, 0x5ea4, 0x9}}, 0x44) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000280)='./file0\x00') ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f00000000c0)={0x0, 0x0, 0x101, 0x6, {0x6337, 0x3fffffff800000, 0x7fff, 0x1}}) 20:49:01 executing program 2: listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31, 0x1f) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) 20:49:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) [ 419.904911] hfs: unable to parse mount options 20:49:01 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8000, 0x0) accept4$inet6(r0, 0x0, &(0x7f0000000140), 0x80000) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000002b80), &(0x7f0000002bc0)=0x4) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0xff}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000080)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000000c0)={r2, r3}) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000100)={{0x9, 0x80}, 0x10}, 0x10) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x7) 20:49:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(0x0, 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:01 executing program 1: stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f00000001c0)={[{@nfs_export_on='nfs_export=on'}]}) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000880)='./file1/file0\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') [ 420.131127] hfs: unable to parse mount options 20:49:01 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0), 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:49:02 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000001c0)=""/191) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000280), &(0x7f00000002c0)=0x4) socket$tipc(0x1e, 0x5, 0x0) kexec_load(0x20, 0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000300)={0x0, 0xb4, "a0eeac8e5dbc4bf78c68e622c617c85b61bf99c696d5ee0da794ce78c6947fb7f20121316ac815305a506bb0a2dbf14442450ae523e84b09ad523778be1c4ba53d48e087a6d0fe5ddf19308eeeb6a769c82e7667e9d25d2b21cf18f2e0918f25f118f0fbaff559b217a98cdbe7b99d13e3f16899e5cc325ee23c08e54d8a108757c5b1fa0e68e2565dbcbab125b4519166b885d2d827b99804018950bebe75093dfec69e3ac72a44fd0ac73f584305101e89d043"}, &(0x7f0000000040)=0xbc) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080)={r2, 0xffff}, &(0x7f0000000100)=0x8) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0xaeb5) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000140)={0x2a51, 0x81}) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x401, 0xf3}, 0xc) 20:49:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:02 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0x7fffffffffffffff, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:02 executing program 1: stat(&(0x7f0000000080)='./file2\x00', &(0x7f00000000c0)) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f00000001c0)={[{@nfs_export_on='nfs_export=on'}]}) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000880)='./file1/file0\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') 20:49:02 executing program 2: stat(&(0x7f0000001380)='./file0\x00', &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x2, &(0x7f0000001340)=[{&(0x7f0000000240)="9b05af9866b9fc328b27f61b65b5e0baa5279be8eea209638f889072bd25475bdc9947f8dc8d4a5547220648fdc49a0f447af0dc5a536c0232554d2bb40b9f7c7acebffeb0aabfdf2bc985cac2abe252d100fcd5f033d462eec10bfe288a9e4e4182eac1d5e2ff9b6054b6452e9a5b", 0x6f, 0x8}, {&(0x7f0000000340)="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", 0x1000, 0x3}], 0x2000000, &(0x7f0000001440)={[{@nodiscard='nodiscard'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@init_itable='init_itable'}], [{@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'V.cgroup:'}}, {@smackfshat={'smackfshat'}}, {@dont_appraise='dont_appraise'}, {@pcr={'pcr', 0x3d, 0x2b}}, {@smackfshat={'smackfshat', 0x3d, 'security.\xb2%%wlan0@]'}}, {@uid_gt={'uid>', r0}}, {@obj_role={'obj_role', 0x3d, '*wlan0wlan0cgroup+GPL@\'userwlan0cpuset$\x00'}}, {@smackfshat={'smackfshat', 0x3d, ']ppp0!GPLproc\xbeem1/'}}, {@measure='measure'}]}) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000013c0)='/proc/capi/capi20\x00', 0x100, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000001600)) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x280, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f0000000200)={0x1, 0x0, 0x2, 0x5, {0x8000, 0x76, 0xe0ed, 0x3}}) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={0x0, 0x7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={r3}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000300)={r3, 0x8}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000000c0)={r4, 0x1, 0x1000}, 0x8) [ 420.624538] hfs: unable to parse mount options [ 420.733358] hfs: unable to parse mount options 20:49:02 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10002, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 420.810542] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 20:49:02 executing program 1: stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f00000001c0)={[{@nfs_export_on='nfs_export=on'}]}) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000880)='./file1/file0\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) 20:49:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:02 executing program 2: kexec_load(0x6, 0x1ad, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x20880, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x3, 0x80, 0x31c, 0x7, 0x0, 0x5, 0x100, 0xd, 0x4, 0x6, 0x4, 0x7, 0x3e, 0x1, 0x0, 0xff, 0x8, 0x3, 0x7f, 0x7, 0x7fff, 0x2, 0x0, 0x8, 0x6, 0x7fffffff, 0x41, 0x8, 0x2, 0xfffffffffffffff8, 0x9, 0x1, 0x200, 0x80000000, 0x78, 0x7f, 0x0, 0x80000001, 0x0, @perf_config_ext={0xfffffffffffff92f, 0x5}, 0x2080, 0x9, 0x900000000, 0x3, 0x8, 0x792, 0x9}, 0x0, 0x2, r0, 0x0) [ 421.177274] hfs: unable to parse mount options 20:49:02 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r0, 0x3) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:02 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0x0) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:49:02 executing program 2: kexec_load(0x0, 0xcf, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400100, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) bind$xdp(r0, &(0x7f00000002c0)={0x2c, 0x5, r1, 0x25, r2}, 0x10) keyctl$get_security(0x11, 0x0, &(0x7f0000000000)=""/39, 0x27) [ 421.285727] hfs: unable to parse mount options 20:49:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:02 executing program 1: stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f0000000080)=ANY=[@ANYBLOB="6e66735f6578706f72748dcd42283d6f6e2c00"]) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0) r0 = creat(&(0x7f0000000880)='./file1/file0\x00', 0x0) umount2(&(0x7f0000000040)='./file1\x00', 0x2) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f00000000c0)={0x1}) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) 20:49:03 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:03 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{0x20, '/dev/vbi#\x00'}, {0x20, '/dev/vbi#\x00'}, {0x20, '\xac\x00'}, {0x20, '-@'}, {0x20, ']#selinux'}, {0x20, '/dev/vbi#\x00'}, {0x20, '/dev/vbi#\x00'}, {0x20, '\xac\x00'}, {0x20, '\xac\x00'}], 0xa, "cf933e7b3b63a08ab107e295d931b9b0deb46ea829d56d45ec1702632ce3051535a9ebdf2ae0b4a5b973ebb7746ff4a3b595fc59cc109a182e9a8fc241d6"}, 0x8b) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0xfffffffffffffdc5, 0x0) 20:49:03 executing program 2: kexec_load(0x3, 0x0, 0x0, 0x42) 20:49:03 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0x0) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) [ 421.740734] hfs: unable to parse mount options 20:49:03 executing program 1: stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f00000001c0)={[{@nfs_export_on='nfs_export=on'}]}) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x40000) mkdirat(r0, &(0x7f0000000040)='./file2\x00', 0xd0) creat(&(0x7f0000000880)='./file1/file0\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') [ 421.850194] hfs: unable to parse mount options 20:49:03 executing program 2: kexec_load(0x5, 0x0, 0x0, 0x0) 20:49:03 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) r3 = msgget$private(0x0, 0x481) msgsnd(r3, &(0x7f0000000100)={0x3, "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"}, 0x107, 0x800) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, &(0x7f0000000100)={0x0, 0x14000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="9c7d250218d9864d99eef9002b73a341fd419bda1be4aa3dcc0384eda5a453acad7f4ec3c027bda8f5"]) ioctl$KVM_NMI(r6, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xd9) ioctl$KVM_RUN(r6, 0xae80, 0x0) getgroups(0x0, 0x0) 20:49:03 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0x0) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:49:03 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:03 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x4040, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000040)={0x10205, 0x3, 0x1000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) getpid() [ 422.253412] hfs: unable to parse mount options 20:49:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:03 executing program 1: stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e66735f3820706f72743d7f6e2c00"]) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') 20:49:03 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(0xffffffffffffffff) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:49:04 executing program 2: kexec_load(0x7fc, 0xffa0, 0x0, 0x170001) r0 = signalfd(0xffffffffffffff9c, &(0x7f0000000000)={0x7}, 0x8) fcntl$setflags(r0, 0x2, 0x1) [ 422.440972] hfs: unable to parse mount options 20:49:04 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:04 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000100)=""/179) kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20, 0xffffffffffffffda, 0x1, {0x0, 0x7}}, 0x20) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000200)={0x0, 0x20, 0x7, [0x6, 0x3f, 0x340f, 0x800, 0x200, 0x2, 0x0]}, &(0x7f0000000240)=0x16) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)={r2, 0x6}, &(0x7f00000002c0)=0x8) r3 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r4 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r5 = socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r4, 0x1000000) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4000, 0x0) sendfile(r6, r4, &(0x7f0000000040)=0xf10004, 0xeffffdef) close(r3) r7 = getpgrp(0xffffffffffffffff) waitid(0x1, r7, &(0x7f0000000340), 0x1, &(0x7f00000003c0)) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000300)={'team0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x4f, 0x0) 20:49:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:04 executing program 2: syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x58000) kexec_load(0x0, 0x849e, 0x0, 0x0) 20:49:04 executing program 1: stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f00000001c0)={[{@nfs_export_on='nfs_export=on'}]}) syz_mount_image$f2fs(0x0, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='0\x00'], &(0x7f0000000040)='./file2\x00', &(0x7f0000000080)='bdev\x00', 0x800, &(0x7f00000000c0)=')/!cgroup@\x00') creat(&(0x7f0000000880)='./file2\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000200)='./file2\x00') 20:49:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:04 executing program 2: kexec_load(0x0, 0xca, 0x0, 0x0) [ 422.874374] hfs: unable to parse mount options 20:49:04 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000300)={0x5, 0x10, 0xfa00, {&(0x7f0000000100), r3}}, 0x18) 20:49:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) [ 423.003371] hfs: unable to parse mount options 20:49:04 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:04 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(0xffffffffffffffff) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:49:04 executing program 2: lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64MMAP\x00', &(0x7f0000000080)='trustedposix_acl_access{security/\\}eth1em0(,mime_type\x00', 0x36, 0x3) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/16, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0xbf001b7e20332db7) 20:49:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:04 executing program 2: kexec_load(0xfffffffffffffffe, 0x0, 0x0, 0x14bffd) [ 423.482830] hfs: unable to parse mount options 20:49:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) [ 423.580930] hfs: unable to parse mount options 20:49:05 executing program 2: kexec_load(0x1f, 0x0, 0x0, 0x0) 20:49:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:05 executing program 2: kexec_load(0x8000000000000, 0x0, 0x0, 0x0) [ 423.868397] hfs: unable to parse mount options 20:49:05 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) fsetxattr$security_smack_transmute(r2, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x2) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:05 executing program 2: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000780)='/dev/video2\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f00000007c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000800)={0x0, 0xf, 0x4, 0x4200000, {r1, r2/1000+30000}, {0x4, 0x1, 0x1, 0x9, 0x8000, 0x5, "fce68af9"}, 0x4, 0x3, @userptr, 0x4}) getsockname(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f00000001c0)=0x80) setsockopt$inet_udp_int(r3, 0x11, 0x6f, &(0x7f0000000200)=0x8, 0x4) ioctl$SIOCX25SENDCALLACCPT(0xffffffffffffffff, 0x89e9) r4 = open(&(0x7f0000000240)='./file0\x00', 0x902, 0x100) ioctl$TCSETA(r4, 0x5406, &(0x7f00000000c0)={0x5, 0x8, 0x1, 0x64, 0x15, 0x7f, 0x0, 0x30b, 0x7, 0xdfe2}) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x470, 0x0, 0x130, 0x248, 0x388, 0x388, 0x388, 0x4, &(0x7f0000000280), {[{{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, 0xffffff00, 0xffffffff, @mac=@remote, {[0x0, 0xff, 0xff, 0x0, 0xff]}, @mac, {[0x0, 0xff, 0x0, 0x0, 0xff, 0xff]}, 0x8, 0x8, 0x1, 0x9, 0x8001, 0x8, 'bond_slave_0\x00', 'veth0_to_hsr\x00', {}, {0xff}, 0x0, 0x260}, 0xf0, 0x130}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "460be5157b3b8d29fa46505b295835741abd9af1886d47ffffeb36e406fd"}}, {{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x211f}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @rand_addr=0xfe, @multicast1, 0x2, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4c0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000100)) lsetxattr$trusted_overlay_opaque(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000900)='y\x00', 0x2, 0x1) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x101, &(0x7f0000000080)=0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) kexec_load(0xffffffff, 0xfffffffffffffec0, 0x0, 0x0) [ 423.959055] hfs: unable to parse mount options 20:49:05 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(0xffffffffffffffff) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:49:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x05', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x5a6af000, 0x1000000}], 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:05 executing program 2: kexec_load(0x5, 0x0, 0x0, 0x0) 20:49:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(0xffffffffffffffff, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:06 executing program 2: kexec_load(0x100000000000, 0xffffffffffffffe5, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x41c0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) 20:49:06 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = fanotify_init(0x20, 0x2) r1 = accept4$bt_l2cap(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x142, 0x803) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$BLKIOMIN(r2, 0x1278, &(0x7f0000000000)) 20:49:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 424.709487] hfs: unable to parse mount options [ 424.807282] hfs: unable to parse mount options 20:49:06 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x810, &(0x7f00000001c0)={[{@mode={'mode', 0x3d, 0x40}}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}]}) 20:49:06 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) getpeername$unix(r0, &(0x7f0000000040), &(0x7f0000000100)=0x6e) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000180)={0x5, &(0x7f0000000140)=[{0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f00000001c0)={r1, 0x1}) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000380)=""/160) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10001400}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r4, 0xc03, 0x70bd2d, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x1, @media='ib\x00'}}}, [""]}, 0x68}}, 0x4004001) close(r2) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1318b5416ddef844, 0x0) 20:49:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeffffdef) close(r0) 20:49:06 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:49:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 425.189179] hfs: unable to parse mount options [ 425.289893] hfs: unable to parse mount options 20:49:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x5a6af000, 0x1000000}], 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:06 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = inotify_init1(0x80000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x22000, 0x0) r1 = accept(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x10080, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000300)={r1, r1, 0x7fffffff, 0xd4, &(0x7f0000000140)="ad63c6a5a1dd9c2494398649a9e8c3438100fbeeeb7443c31b325fbf5beafad9540ef0f733d7f7074374cc254125be959fad784b43d6097194d202caa41f0894b89361142c3385918a14962b6899d277852263175fdef475832a1eafbf4fd43ce203063efc072ae9a9ffb59b016f1b2c46258e1c9733cb2768f2e8292e52bbfb27e94e0d39ba2921d1aba2df3fa78a73ef2f1c939d49194374131bea7d840e9c88855dad93f41dbea6d33367ce5d6736c92b9ec9e6c632141b13b06e9f279093d8cea9cc10eefe99173ed80e87ed1b899f266660", 0x3, 0x923c, 0x3, 0x10000, 0x0, 0x1, 0x400000081, 'syz1\x00'}) open_by_handle_at(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="8a000000000000807c261393c505d866cb20797f4c859b47206c25ae5662d32cf56103fa11f035039d4d699dd207bdfa253f80f0134d067d114f35ec0c63d5f3e82fc770097e1cf051148fc52e9354c0f523e4740c357bba0b290cc5eba3d24bf3c77999dcbc1f7936775e41a97945f806a1794261e014b7fc3774c7b4f4b9743f3433d887a700000000f7e52c91dc6b359e1c880af09c8589280cbfe0bfcfb6d3ef73dc7a24f8143add64f061f4f352b52ef3d9105930ebf2dda2d8d735c540a45f6125339a0cd6af8f1c211813afedf60ea37b047cf71ad27a48bda6fddb0c3d3576a44f3c3ab6b255b5"], 0x82) 20:49:06 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x0, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) ioctl$SIOCRSGL2CALL(r1, 0x89e5, &(0x7f0000000040)=@default) 20:49:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:07 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(r0, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x0, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000080)=[r4]) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000300)={'icmp\x00'}, &(0x7f0000000580)=0x1e) recvmsg(r3, &(0x7f0000000540)={&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000200)=""/213, 0xd5}, {&(0x7f0000000300)}, {&(0x7f0000000340)=""/202, 0xca}], 0x3, &(0x7f0000000480)=""/172, 0xac}, 0x20) 20:49:07 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x480080, 0x0) getpeername$netrom(r0, &(0x7f0000000040)={{0x3, @null}, [@null, @default, @null, @rose, @rose, @bcast, @default, @netrom]}, &(0x7f00000000c0)=0x48) kexec_load(0x0, 0x0, 0x0, 0x0) 20:49:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0), 0xeffffdef) close(r0) 20:49:07 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10800) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000080)=0xd) 20:49:07 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) getresuid(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) fstat(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000640)=0xe8) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xc) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)={{}, {0x1, 0x742dd2f02f98fd39}, [{0x2, 0x4, r2}, {0x2, 0x4, r3}, {0x2, 0x4, r4}, {0x2, 0x3, r5}, {0x2, 0x1, r6}, {0x2, 0x1, r7}, {0x2, 0x4, r8}, {0x2, 0x5, r9}], {0x4, 0x7}, [{0x8, 0x2, r10}, {0x8, 0x1, r11}, {0x8, 0x2, r12}], {0x10, 0x2}, {0x20, 0x2}}, 0x7c, 0x0) r13 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r13, 0x1000000) sendfile(r1, r13, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:07 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) 20:49:07 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x1, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 426.232406] hfs: unable to parse mount options 20:49:07 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x6558, 0xffffca88}}}}}, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) 20:49:07 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x82) openat$cgroup_type(r0, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)={'syz0', "1791e44c18a27ec5a6a30ab5b576af6c4b54820844745c70e3a23e5251"}, 0x21) getpeername$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000001c0)={@ipv4={[], [], @empty}, r1}, 0x14) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000080)={@remote, @multicast1}, &(0x7f00000000c0)=0xc) kexec_load(0x0, 0x0, 0x0, 0x0) [ 426.319110] hfs: unable to parse mount options 20:49:07 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000100)={0x64cccc0, 0x81, 0x7, {}, 0x3, 0x400}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000012c0)={0x0, 0x1000, "ee70872847a50104106651152d4b4d76dfed753a9fcb6c79cafd9ef6226f8cb5c2ac34fbf3f3f91938a7b3a6664c6cb0baeb35cba0b06e6c74596e84920be9a4b9dc6bb8f24e1ec412cdae06ad298b8c161a43574b7609093f89339be59011e79f2a5f89e13f8e664ef6ab87d30ec92b782dd1eebe81ce328839c312033f7d2aea400960fcce8b5988110003c02065f554b9921b018e493fdd09a363fd11b38f0ca2608610734ed16467cc71ce9ffed727fa8dc040b03fe00e8f28674e2e7674679bdd8b0f8470c9e40c5a89d3535e0e213e299da5bace1ff26b44d7bf70b225d4500b69a9d7dcce30d7e1253190a91eefa3fc2b54db733e65ee2d2d117f6cac7b1ca0ae923935bb213e4dbbb11188ae2d33f56d4c2faaa12dd6f00521a910aee79af0f178e402d443562bc494ae26865b692e79805579bd451aad345589fad28915803ff778fde27220756d6dbcae3f8b43640a8a62df423677882c6b7a010bf3f6a24a790efb796b96d1172c517fbb291f6ea438d7c331c6499c66b00242e1f5d26505e9fa42729e4c377b752788fdd42cbbf9b1a29a8aead0c8a6732fb0996242a796a3372c2463ac49d0859efb00d74f39d1c47c15e7ef7fd3c4e625923f49ed968669ecce2ee6df2e21f61f14775569a270aa90d7cef13391e69291ea3f85fb22c384fa654141c055928d785d1b9ad31ecc9c8842086a3fdc9ad0f857d48eb17f94f832bbaf61fe2fea8f62d39e1312c96ec296e9157e4b1a59205046502fd1ba1865a36a74bff7cb761bf44fee1a668090b116f8705c702a76f9e7776ad5aa410966a44c4aad5204afe3a80c68a1d2bf2b9f38ded4f189778ce9cbe39daf136cabaf8c66efa8888db578b9f0e0f868314115e588c577098df386b80641685d1b629831f0fbd87aef02b21db2fdcd2b9e05b65867b6cb0dd0ca875ecc42d93fe5ad48d067ac5899d775cffebbc6b3a69af30dad406bae96482f6097869b2b37d81a1153e264de9a06a6d3af510a6c1bdb5508381e5667aaf23261744affb75ec99f3f35e960e0f2375106f8873ff917172451cd39434be42353a440076abefa5a2f3feb5aa67037b0aa3acecf7ece1c72c0453713ca3e89667d1805d63a39f19ed8f23260ce21d8d5eead7f5f678f596e5fd233c35cdf03cf8be7ce19233e26cf29688ee429483e955b06a305670ed1d695e4d9e3b239db80152f4f54888441815265d4f3ff133f44289e717a11d0a580b8da5a2e93c5998dae5e8868d77ae959aa2618bacc1ca2cd21a1ac3f62ab96d69bb711ee361685ae458bacf03b134d6a957eb43adad7407a3e86369e57863e4a700f27129e24e0c543f0d009afbd56f113020927ab017fae7480df52afba9adc10f2d484a8ad7a00b7a9169147ddd220c5504aaabca39f266759ea711e2c72587b41d9c0d430a998aa80b691ea81a1aebb5b7df19df094b4a9f2a041dfb9f7cb1eab55d3492543fb96d0cc0d196b65a3dcac1366faa96daa5d9d2d7d2ba3db614869ca015201b3bf687f97bee463b21cf35a3875041d35965c0344e9b3f75df36cb2ab964f6924d865545e7794188d66cec89f8844b068c50f7802ed689b4eb043e94fea724b2d986579e4c2aae28bbde65c44ceee8b9110a9a2ad76823efa7a0bc01f88163c4619c7081817140deca03c40045c9c881a3592ee9815910ed27909cd5d882c634ecd640a6ad34d6af2e9fafd7516bb27b2963dfce1b00217ee9807f98acf9eb58e72352d8621bb0dd5fc7442e3cf5d229d7cb2d45c135e727bd8d71db70175c9736aadc6262c4b5e121fa04ba986196d081f68a83c7d45901b95bc689ce89f3439c31440793b6d169212dc718ebab1e42ceacf4621d67a3447baab14ca6acda49b9f0bd1e72d348a6d7aa07e532ae2453904c56006d7b7fb7bd66ec1947cc1e841883b9d0baea7ad518d32580c51068619ce123424dc45b08b4dac06db69c7cd17e6de154e3d26593927a276491d0c4b201c46e4d94c510351ea901a1fa1aef15a1cf777bbd1b5a80e24e299a448d054d2a2206a0e7f26e6e382841623b69577083064e1432199d38f25dfdec15c9c6ba8776bd5847ba4f2ebabc4542b08dc55b460f4c664b92bec7198bf1fb457eb4183b013e16ce9cc51e370b486301ae6e2d1e3085fc49726acdc11578b5892d9b644b2f0e3647db289a9822ec75e48abf9334b0f38b2eb3a9c822f97c59048ea1ee2ae44f49328f507f2a305b0f637682be4e393e5d868b44d540d0af6be870d6dca03f9f5420659a6e2e8bc7a3f285b8bdee3857cf2f05859a93631ebb2316c559dea7bdbdeea689f797038882b56774a82b09fde423d48ab5367fabf6cd613347874830c927ae102ba82906d789c1fbf0a889bdea3bdaf03204444c88f24bee388b7203b606fc8129b7ad68d30f3b1f52d38f77ee2a298b44db24a249f6767fd3d18a867cfabbce883d30e2ec834a8ca040ef150972f5e30b0d10709231a946e655d03a23ce7f726667c58dea8ca93325a4ab82cf981f7b8f220b0b8e2cda2001863d1a07456a6f926e5dfb41484f52783a8bc5bb7b1e8a573a37fa4de1a6f5d907147f1e9b5032834892922942efd799117dbca154e36cb0467e5e980535906a897b8eff836db2f252b2bc2f8335181d778c91f228e656cc683336501589663ab468cc1f9378174ee659fcdd45265a519b12bf4164c01fab256e2c743dd3aa43451f7c0b5bd719065ff7bc529397bafd484456b39c7054e7c5b01e4975ae158c3d0e9a2b55bb82ad98e05d844500c006cc3552cea081d1a9fced2e3df367acbc33f6c1b5a28522302f9b8268e66357fe41b2df6a4f604f60f2649584cd47fc8e64af2ca9ce933af1a40eb27aad10bef8b5dd4be74f18f054a4916fd27791f66d57bb5c6ac1f68da3a7636d46f7844ab317d4415c10d29351f05c3a111b0f09e9fef7e40d65ca4d35037f8abadba6f23be8537acaa14a174c1f3a9dd7980708029a4f948b4e1a0193bb8ee160366362ae9b0f67d871fe3b7417cb78354d1e99633c85b2d9dd4180eeef54a91aead52c9aebb7f3ead33d404a4852b2f15be7147535da6bf1d0c53f49db807d8feab081e88c836cf29690ac69d70f63a4c36a745b2ce7a8871936de83638d6400cf3e5bf3c484cdb930eb462600b7ab80ab1a6aaeae79e331652a8968ad857fe395781fd7c631eaf59a3d3a68bfcb924fca19baef36828c07186f8bf78a093c1f46b938a51822995874ced53f45f097b4b69b494a7ab98352e3c042b8021d746f1d96e4d9eccf9976944d4b68d859bd53cd77681c4d9e414c17ef6ac092d348cd5b97bf4ac913f1670348c54a558401bc54128d581c1277493a13b08f119d252a80db2cbcae2d1f3c9ab9a923aec71d0e3a5674f8dbb516ad32d19099c2130cb074af96d3fef2313df857a8bb26e9928ac1d0ae23bf6ac68f3b05c088dcda8bf5e1337025f2f28bb0e53d7575b82a1872c58b1b0b641b82f0604992ff2c832ee6e9eb87fbe7bed9c17d7ff346b6a9ed899a2569005c80a45131582a2c8ffd94e0b6f57c05b16dbb57f184c5bed6da09adb73fcb54f7324d46cca3339a507c1e25e7851703238d3628776d4741a7a842b1bd5c4575a3b25def04076c7e2f9384dcc58692057fcd8823e4b56a4f95205b77d6ba5328d0ae854c0bc68d6af45ac293c71565a9df2d0890ac57405d2528580605582613f9f5bdb00a3e4a794917febedd131b432567f9b6623a686510716f9cbc873884680a87d133286d50971c0e049275198ccd2d11378fc63380e60c2427cf7e8995cbe30fa6f8359cac3aa1a47e31b41c86773a3567d95251dfc37ab223fce9361a75977dd9daf6d12104a99a4ee63829b61acbe3f4fe9bcdbaba94c86c05834eb4819a98a712fe5ee2ab5fb4c85eb6c044c8507b878e7192728f32fee0c7db7aa1e02d5f9c1d30cea13f4459e45e492857e86424d3e7690d1a99c410e1906bd033eadc145f5f55e0aadf1ba911e019401a0a616b8eda5a3d7d25cb242ff73025407f630eed5e7e1e17d50513f0ffe692195acb941f79362f3d2696aa9cbd72049c2c6b2410f0284eda566147aecf4dfd3e46834e327edf7d8069d0cca55a166d860cb8cadd86a4e26a8294e08d33a151155401812c1e7e8135aa446fcb8bfa91572b1e692916ea86c6543ed97fbf7ec952a9bd4a02ffcd7ff2203c6e0880cf1c3898fe736f7b89d1637cf895430f2995e43784c41883742a7ff811b7c4a56b21056b217916d68f259fcdc7554d0bac574da6c2d8910ecbb975dc4dea76a90cea7fbf8edfb69d4f0a7f4d1b38d01448017da47bde34d982b686db57c72f6f79549c636b54952d8a68399db8bafadd2857b7f2c4ad81cf529c9744cc9543374929acaabeb2ace70476bd7abaabeb256335e6ae3acb0072143ce4e1deb2cb30bb4b894b980260c2bcc08fa944cc8211c485382952839b8e4779f672a91304fb14b3a0e094725249eb4d9d23febd922bec2bed4384ecbf92f0f4879ade0cc73786ca31c3d94d8ce2abd985906ce836e0e194708423af05705747bbfebc44ded7d592b348577d54414a36c90a2efb3b2b9c02419092b4d599e3eef1e4ec8551ca47ae0dfecf55f730f0c4b18c06164a49cee7ee327c68f8dd1a001b9be1ef14cb95321320b669d0c6ab67e42780bc1c3ac58361b9e4e6b908ff2eddea0f4f35b95a6287051245b93baab3bb206596ad57992f6f6847605320eb3522ce5624b07e2bdcd9529b6bc0802e4547f70994e409f79de1fd1636412e797705f069ab73b6901526040dd6d83130c56c394bb30104690323ed707bf9d9dfc75a43ca365cede20860043db1e2f17ee249122bbaf32e4b2ece125c234cbc87586368481ea4c2513cab4042723b2db108c98caecefcadc99024fd67f8c6b311e9001c4af9a5b8e58dc0dba844af3dcf219e1d466b042cd513d9469699ec23cecaa0a9d6c4455189220f0a6b704b8a8c5e7186d569c8f32b6cf20f7feb7475b2367f05fbd19234db26030caba57fe363e0645a6561ae8384f7dbd07ac9699e469d982085893ceb56fe2c602d545242da629bc68f424e5f5f4e9a1bd93ad92d562abbdcd83a4c0888ae9a90d15e46d2567b02ea1393305cc569839c3b2c7a8c39a41185d1803df0f4774d60dcccd39038f8c4112939cfcbc81db9a1e242a06af7b790c3f07b228a58f5769f4205997432096512feb5038545aa0b24a1cf71359e063715a76ef23c57f7c97cd5090a412344d32e143344080837eae61b42e45f5aa5fa984f79ffb7f952ebbcffd8cb8383919244d8cd0b7a3e1da7135f43c2e6a7c59447204b5628e076047db8f8e3d7616bfe9f5778f0317d666583e71b133c8f03f94f939ca14fcd5d20db5cfcde104f47c6dbfe22b283d95baa36abb115d72b1fef209f444974263830334dcf0aa3d50fa7b72bc0a4d8eda88ecf2502fe4631dc47785be11c860d5d3d6971c06bd9f207b6b1f312740af076d116f9da2b50e27216f4d9286ed59ee88a3a060bf325f42dcb9231fdcaf3745621325785d5c2bf06e2c3506ef32a2e4f12dbe79b7e4b2eb2e7f66aadd2bba9c85dbdff953684b954d7bb47bf232f522f0c9690724f9f8ad60d40aa9b68e9da39e4dfb3162783c829354cd987e9e41d3e3be8bcf3841514c6df365b508e58cb2d306c38f9a29b4adde55c7b35bafd729e21e4d5323531d8f0d7cff22369a147ae98509105a56b3fd4c446be0c3b416e18b6b7f62248c4454890a81e904a6aefe25a98d423afeff95"}, &(0x7f0000000400)=0x1008) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000b80)={0x0, 0x200, 0x30}, &(0x7f0000000bc0)=0xc) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000c00)={r5, 0x4}, &(0x7f0000000c40)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000003bc0)={0x0, 0x12, 0xffff, 0x1, 0xfffffffffffffffb, 0x1}, &(0x7f0000003c00)=0x14) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000003c40)={0x0, 0xffffffffffffffff, 0x4, [0x3ff, 0xfff, 0x5557a89c, 0x3]}, &(0x7f0000003c80)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000003cc0)={0x0, 0x8, 0xffffffff, 0xc10b, 0x9, 0x8b5}, &(0x7f0000003d00)=0x14) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000003d40)={0x0, @in={{0x2, 0x4e24, @remote}}, 0x9, 0x100000000}, &(0x7f0000003e00)=0x90) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000003e40)={0x0, 0x8}, &(0x7f0000003e80)=0x8025e996) sendmmsg$inet_sctp(r1, &(0x7f0000004280)=[{&(0x7f0000000180)=@in={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f00000003c0)=[{&(0x7f00000001c0)="bd416347ee59043f275ef53c6dd734b2d9b33a935c38bed91b411df462e93295819513c2fdd62039eb8642b21bf2f93b2f62c9e7541060cf1dfe651772022e5205cd0d701523136976", 0x49}, {&(0x7f0000000240)="5cc5342c965ff847fa6fed76a9f91e97d6c8b7a1260ccaeb9b522d72a0eac4371c311c6a5af95d4573cb275eaddc7d00861a6d1c3d21287cbc59f8add265e88ed57abb673da45afa0d50064485e523e7059f29c68ab30b7cc46171bb037c3e453768ca8c2d259d8cb7faa6a78245846185c32ce20580af23ad66d95a94092bd84c7305ab1cffe829a255e68a879fd26f90247265ba7e65cdd78066e0880621c28470615747e4906beeaa417f4345aef683a25ffaa5ba", 0xb6}, {&(0x7f0000000300)="17ca5a3733fb3cc0a36cc4feb762244880aa427af051a5cbff9148b7a56f6f90336dedee0488359dda24ce3f2d22a0ea4d484297", 0x34}, {&(0x7f0000000340)="a2981d1a6bf87557f24072c69cf8a9ab1eef05d09ff88fd0e600e10107921e81535e274f858c08bd96e076dae399e755ab7321cdea4eb5b8ec6975ffcec033de6a2c9c0f04b8aac7c62a6fc1db98ccdde03c229940bd615054326796adcd1303afdfc32adb0c649f34c780", 0x6b}], 0x4, &(0x7f0000000440)=[@prinfo={0x18, 0x84, 0x5, {0x10, 0x3}}, @authinfo={0x18, 0x84, 0x6, {0x3ff}}, @sndinfo={0x20, 0x84, 0x2, {0x1, 0x8006, 0x6, 0x7c6, r4}}], 0x50, 0x4010}, {&(0x7f00000004c0)=@in={0x2, 0x4e20, @rand_addr=0xb4}, 0x10, &(0x7f0000000ac0)=[{&(0x7f0000000500)="2c97e75a98e8b61122dfafca2fa4f609d7a94a3532cd214e447e30f5cad54e6462e00611da28395575f3103738cbc79cd8f4146cc8c5677bbe3cd6ab8f4f37faa39b38c5e412b7ee921f1a0c65e86b9d8b0254add72159ebe4268c85aec06c0c8c475ea8fb020a6b65b5a44692f1c36778d0fbc4eeb5e781bf888e5bb37b31afe8933ac5beed0e88c5d6127aac1ac86a6507c8c4a6e769953b1f1c6d02e3", 0x9e}, {&(0x7f00000005c0)="bdca58acfa17ddae75e31cc7261c27dd494aff0e4018ebb00a77dc2d3a44677d34810168f2ee46fc199011b6d69ab56d8a00302d879f2044389490ec20ada81936a3fe0d0121e4843bdcbaf5a619fa733718ba43cded10e19c5b8bd76964e4196ba9d106d70e1cc51949c7d37cfb10154256d1500f78b928f9460709a05529d1c7e8de2e6b97364b1a513eab99a23069565c74d0bd5461930aadb3a2f3dd240e8af20776bd0affbd22bfdadf6b40e237f496b437a11d047d6ca707feb6174f00a8c7cc339532224cb9f9631ccbc629abadc2c9c72d2a4b1a6c23b5b530937975a0f26b11813bd4da", 0xe8}, {&(0x7f00000006c0)="fc143a630e2b70f4e8decabec00b3925a0257824965676f4f9acd79b381f114a2c7b9b9a88d3eb4abe56d743984afabffb", 0x31}, {&(0x7f0000000700)}, {&(0x7f0000002300)="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", 0x1000}, {&(0x7f0000000740)="8545ec579029b27653638135eb910817fe655e64bfcc35c6056fe0547cfb17ec5d30bb3c7050a6fd30172d327ca80fd7cf8fa17cf1be28e19acb316e3d2def776cd6b1b37f97e253476a8617f4c79a65efdd388d1fe3d862541b53f714bedfb5f5443ea4db199954d900d43bd999e6e8a8f91fec5430b936e2469e426c472c", 0x7f}, {&(0x7f00000007c0)="beaa44cee838fae218dbb27a7e555551432f96b8e5bc67d387e065bb8a56d5a35ed4390af3bc5b6b0d4535b0cec1d4729d62922f26e88aad88f9556c8e85b7992558917be1ac589a5c24201331ba65cbca1c2d112091665845d1b779eb4546077c59a5c431d7f74aae6ca294435693aaba313426a11f04cc98a60db0e4601ac555319e92a57a820b8c0f223e1ae3b81c30e9f95eaf15e3522d077d0c95364b812e221c6ff3847a7ab6a95c5336ca9f13ae1c210384f4c83afcb99b95a81199ee2db5203fb6a71e6b66280e8c140b38a1b948606ec5890fd70389195300d27df84d624da328c1f6557765294143fc13e2b1e1182b5877", 0xf6}, {&(0x7f00000008c0)="a2604722f51777bdf37a806769d037da4db321ea3fdb840f753d3a57a4d4997d26dc0727baad829182e0404136d74dc9f0531caa594c62bb9998108cbaf494a807dde843faf548a84740b57f97516d083518faf2cdb70197ae0fb367c1845e7700fc0974eb7268b24fd283922b9de171ea3c20", 0x73}, {&(0x7f0000000940)="5d78b314fb2f9ef1d52d027a8293b872c1100a10049333ed5a49a6c24e0a08cdb7515a52d27b9acb887b7d9a70b699ae1ee80061d7e3f21a591c76b4ea162e95306aabc84579db68f46e34dd94b5fdbbfd1287c715d19c15726d4402526fea9bed0eac1bf02660ddf33965064a0c9a5025f84a7112e519ed900cee1b216bff37dc5c0c2f826a2d31d6aaf461412ea02dce1e2231be28898f8708ef4b701ff185b9f4afb1a362013501a5177ba39856158d378f", 0xb3}, {&(0x7f0000000a00)="9f0f5ab072ed766c1798e510b066b9a396522a45deae33d1a09e8b0796b2316566bac9d081a1c4d1ebf41534fd77f9ec62ddf0b0747d45388bc476abdb7df8eb62a49c3a2a7a7b5fc93cb5974907b840f9ff24c2d6a5c776dfd31131b1be07b78b09fe1b62b24843672a1023a23a36ec1ee175539f1251d4c1a1f30fe3d6347ed33428ad9b90cc2a1c65793b1612", 0x8e}], 0xa, &(0x7f0000000c80)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @authinfo={0x18, 0x84, 0x6, {0x3f16}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x8}}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @init={0x18, 0x84, 0x0, {0x7, 0x6de, 0x0, 0x8}}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @sndinfo={0x20, 0x84, 0x2, {0x7ba7deb0, 0x8009, 0xffffffff, 0x8, r5}}, @sndinfo={0x20, 0x84, 0x2, {0x10001, 0x1, 0xf639, 0x7, r6}}], 0xf8, 0x8010}, {&(0x7f0000000d80)=@in={0x2, 0x4e20, @loopback}, 0x10, &(0x7f0000001000)=[{&(0x7f0000000dc0)="16d59cbffb22c31631a2360c4cce38788949ee1747c91516f25021c2428fabc9c24bc2ac1fb106f84bf64339afd3576357b9cd3d8be9ab6c9a051e8cc339a11f963df60332ab29aaa405b79d8417c80d9aa4ad062bbc4a67f4f9d0e3b9adc59e0b9f970d465219db935bda5c0ab8813e4b419c2231b354dbc900ef8041014b717fba5b3631e7e79ecc5bbadce39f8270c98b13422288914c7410deede7eb11c7bef6fe6fd9161c5d9bfd95c7cbc763b255f752c86330d043f6f4dd1da6ee5f8a0514c82874a60130feaf2afff6f01947abe3ec982e8300ffec31ee80c76cf278e0bebbab6f96bef1b0", 0xe9}, {&(0x7f0000000ec0)="b2a1719ddeeb943846451db7a0e8b43fa15761ba53e0e098bd3fceb9072ebe9aa24763f909a474ac1aac94b18d9eb9cef15d7f9e312de040428ca7c349c3f1bf4d49255efb27b27c76ef32a7bd1de1384ee4d0cf5d441bab2e3b5d28", 0x5c}, {&(0x7f0000000f40)="e2026e141e17829f9a9f6cd5a32503cef4531c61d0c5da9eac2bed92ef2e6ad9a4f5eb5f84a6c32aa10c62b5cc24d7c3046d2d5bbb75385f7d978453662d9ec1917351e421a5fd8e8f5ede82776af7781f561eb594f232d55ea24c5b80eda46d13ff71fb81c1da6723863a27e47f85463d3df90e111b8acebb767cabc52aa97e8c0ec49b9f4b70bc34927702a6512b74", 0x90}], 0x3, &(0x7f0000001040)=[@prinfo={0x18, 0x84, 0x5, {0x30, 0x6}}, @dstaddrv4={0x18}, @authinfo={0x18, 0x84, 0x6, {0x20}}, @dstaddrv4={0x18, 0x84, 0x7, @remote}], 0x60, 0x40}, {&(0x7f00000010c0)=@in6={0xa, 0x4e21, 0x1, @ipv4={[], [], @multicast2}, 0x1}, 0x1c, &(0x7f0000001240)=[{&(0x7f0000001100)="7249b5ffb56977df61ccb341ecbfff765a9fd689c8b43abbd32cacc6cd0ad3fbc6b578a8740fb969e76aa5e7efaae220fb6b770544eb56934eaec100b5636ca0f39035e7a0b6ef572bf4b4429bbc638307455b0f1bc28c95eb1ab4f2e6754004843f4f2d1c33a0b522d0686f4a52135a01c2681073d8c591b3744276ea6643f1ed6c4b2a85ca15707b5f9b01c03b8788267c2294fd371e2b4f389f38001aecb4507abd8727c1c410072059e8ae76a016bb4059e250f6be385a52b7acff6fca5875c51a29c08d59361a5aa7a7ed1b7915ce010b0857800276ab4d7b15cfdf4413830b8e30cf5af78ea4659a567c79af4d38031e", 0xf3}, {&(0x7f0000001200)="9b50388fa4593f8994cae09688", 0xd}], 0x2, &(0x7f0000003300)=[@prinfo={0x18, 0x84, 0x5, {0x10, 0x20}}, @authinfo={0x18, 0x84, 0x6, {0xffffffffffff0000}}, @dstaddrv4={0x18, 0x84, 0x7, @remote}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @init={0x18, 0x84, 0x0, {0x7, 0x9, 0x81, 0x7fff}}], 0x78, 0x44040}, {&(0x7f0000003380)=@in6={0xa, 0xfffffffffffffffc, 0x8001, @mcast1, 0xed}, 0x1c, &(0x7f0000003440)=[{&(0x7f00000033c0)="e861cf69605d47511410a6ff2a0178412ac718fbf435721d04", 0x19}, {&(0x7f0000003400)="0f7b6559feb04a82e5e63985bb181ea4a15e57a894eff790eea426c46ba2c0fc2e2df3df3487fdff36a12d112bae2a4b17", 0x31}], 0x2, 0x0, 0x0, 0x810}, {&(0x7f0000003480)=@in={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000003680)=[{&(0x7f00000034c0)="b6ca4afaf5102c6c3b92035e4f7e527aad92b1344483c231851387ab9c11727bdb18e83706cc9df180c5792b5e76369668de23dab81c3bc5002778a2304156784f7fcdbeddb6a194cd", 0x49}, {&(0x7f0000003540)="c1e01cad6bc25d60d0bc355af58a15154d0c1ef1e6e2211f594df7db691d975435fc8844275ef210fe367ebbafa674fc3d171a154e82354beb2600ce4e682f8e0df8f818a9d8af57a2b51f6a45e285b4a9b8079c33848fdd8da6e8", 0x5b}, {&(0x7f00000035c0)="22043901c87bb4141155205cbeabb3e62fc8de3c33155773dfc8ff086ee3b9c6f1a51e35cf416956317190c95981269024e88cb5ebf742b0f8455110c6b8fbd7a89de41c4b0a283b409af304b018710a3a67d973af840aa51dbdc2a4", 0x5c}, {&(0x7f0000003640)="33e870951dc744191f3a944d086b2e2fa3a37736140f05eef0089c", 0x1b}], 0x4, &(0x7f00000036c0)=[@dstaddrv4={0x18, 0x84, 0x7, @remote}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @empty}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x41e0000000000}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0xe}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x1}}], 0xa0, 0x4090}, {&(0x7f0000003780)=@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10, &(0x7f0000003b40)=[{&(0x7f00000037c0)="d6a3a742394b8e890e3ad363c5dc7526eed537723492a274c1f0424a01c63ed7435734a5be7be8d9b1c59b7438d26ceb169ba94830a74e31efe137800001ce22cc37fb5379011e4b64d1c2bedac7e21118aabcc053c06d6081c5e05b2137413d80fc85efcfa740cc152bc8ce1bf8009b4cba9f8c161468345fa658631a654647cc84d8c6d125d10ab63b84366ddb4aa73285fe05acd9919c9de24418c1be71343cdf1b9e769d059a5330dfa93f7a4c4264d6ef", 0xb3}, {&(0x7f0000003880)="9b0421ced3c3834dd34502cfdfa9fffd7fdeacc360f317719a006c0055e50aebdaaebad783b903efbaba4190fc6d93b1a7547b11a281b34794202cb2863e0929e3a45d8b62ea08efd885ef18a3fac608b157b4e092cc9bbfa8bc50e816221e5134c58fdbd8c4e38a56a184640bcedb12b57d2cdd2b084a293fe00785aeadf53d48a7b668663041f61bc7adf7b856", 0x8e}, {&(0x7f0000003940)="ae02ac16", 0x4}, {&(0x7f0000003980)="17e46fd856ec3a5c223da4b1c89e28f85e3646143301e7b1b27d5eb8439b0bc7ab3e7a97179a3e52dc8bb83b2c971c83278fa945b3b835eec3bfd615c6c3a9fdeafaf1848c75fa56b4ae985c2329a4cafd4ee1344d79bac1eae6bcf9a0efcca8ee3913781330f6ea7ccd995c9fc362056bf26199a53085cebf0d95ea2854ea1472bcd1b7bad6ebaff5c5", 0x8a}, {&(0x7f0000003a40)="18efef1937e5884b5f0e462b74a1be879c2b0d292194b440817738ce65162004d49de73005b64a7aca57286478f266f79019ab924fbb0427a9e9b6114ef33c55426a6dfdb532026a04fd956bde381e309d3386e4cd040206919ee329d972d1aeb74809d8df45fcd70c459ea5c3dc3435c3046895b5192d102e55d663607e9dc2c2b1873eed88161b8f37", 0x8a}, {&(0x7f0000003b00)="7877148e7a9e1e4d0b7d8767938925736da1024461499eef96af3cd615272b8e5053b06569886e3e2a528de35f8320b3a1", 0x31}], 0x6, &(0x7f0000003ec0)=[@sndrcv={0x30, 0x84, 0x1, {0x6200, 0x3, 0x8, 0xfff, 0x8, 0x0, 0x5d, 0x8, r7}}, @sndrcv={0x30, 0x84, 0x1, {0x26, 0x34, 0xc, 0x1000, 0x2b98, 0x2, 0x6, 0x5, r8}}, @sndrcv={0x30, 0x84, 0x1, {0x8, 0x5, 0x8204, 0x5, 0x2, 0x800, 0x100000000, 0x4, r9}}, @dstaddrv4={0x18}, @sndinfo={0x20, 0x84, 0x2, {0x100000000, 0x1, 0xff, 0x9, r10}}, @sndinfo={0x20, 0x84, 0x2, {0xfffffffffffffffd, 0x1, 0x81, 0x800000000000, r11}}], 0xe8, 0x85}, {&(0x7f0000003fc0)=@in6={0xa, 0x4e22, 0x5, @mcast1, 0x4447}, 0x1c, &(0x7f0000004200)=[{&(0x7f0000004000)="01e6f6bb1b4be5e43c580342b60ed5da9e81e6d211aa4fc4efe8f0492fe2e04e0c95920999a1356846cf37e9452ca989f567118d495521549652d4cb7e0f759140a235cf4b4ac5933ded6f7ffd9f43a5b9a9ea47a3227924ff51f15646816ea24c50a2d0b921aa162c7a885af13a6a494612fe193ac5b0c0217950938ec9e5a4ab1710da47cacdbde0d773e2149dc9a0b29332657760132126339aa928c1e310422348cd614313c27d8b62cfac211d9c8b4318decbbb4ee6cb40766f5f5c5d399ad3969184c9eaad2422ce1e9e06801675aa976fdb8f303d18b9fcb2d6b70bee47f8b880582d44cea8f0748eea72888b533e", 0xf2}, {&(0x7f0000004100)="38b4b0bdb1d444eb8ee96ccb656c5591482e7a6e945f59f21af93680fa1f959ee4a2cbbb85b2a0841c10842d55a063a53340458d3237da72c3be86b5ffed85361fe8fb92c1ad24dada4b44371c0e7a23066774840206d938e8c5fd79b4920d1371ff816b717a5dc023fd431453ec2f7f480d8d776150ce7f4b1339dd2c86cb14bc70e934692d6547760827711d4a05475206c12a7ffaabd61d9e83dde4f87d68bdd71ef9d8f04521b84fe1ec150d7c6ccab1accb73a13bd3ce36276c7437a69c433aca", 0xc3}], 0x2, &(0x7f0000004240)=[@dstaddrv6={0x20}], 0x20}], 0x8, 0x0) getgroups(0x0, 0x0) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000040)) 20:49:08 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x6, 0x40402) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000040)={0x7, 0x400000}) 20:49:08 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:08 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='comm\x00') ftruncate(r0, 0x8) ftruncate(r0, 0x4000000000020) [ 426.718470] hfs: unable to parse mount options 20:49:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0x0) close(r0) 20:49:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000040)=0x7) 20:49:08 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000040)={0xa, 0x2, 0x2, 0xfffffffffffffff9}, 0xa) r2 = inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x52000004) inotify_rm_watch(r0, r2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f00000000c0)={0x153, 0x1, 0x85aa, 0x5a2e87e79f7d49da, 0x9, 0xfffffffffffffff8, 0x4}) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e24, @empty}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e22, 0x7fffffff, @empty, 0x5}}}, 0x84) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000002c0)='batadv0\x00') setsockopt$rose(r0, 0x104, 0x17c1fdc3a215dd33, &(0x7f0000000300)=0xd5, 0x4) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000340)={0x6000, 0x101, 0x1, 0x3, 0xfff000000000, 0x0, 0xfffffffffffffffa, 0x6cb5, 0x3, 0x6, 0x4d9}, 0xb) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000380)=0x7f, &(0x7f00000003c0)=0x4) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000400)) mkdirat(r1, &(0x7f0000000440)='./file0\x00', 0x10) bind$rxrpc(r0, &(0x7f0000000480)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e21, 0x1, @remote, 0x8}}, 0x24) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000004c0)={0x5d, 0x401, 0x4, 0x9, 0x0, 0x81}) read(r1, &(0x7f0000000500)=""/251, 0xfb) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000600), &(0x7f0000000640)=0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r0, 0x50, &(0x7f0000000680)}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000740)={0x8001, 0xffffffff, 0x91ad}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000007c0)={r3, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x28}}}}, 0x84) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000880)={'IDLETIMER\x00'}, &(0x7f00000008c0)=0x1e) accept4$unix(r0, &(0x7f0000000900)=@abs, &(0x7f0000000980)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) clock_gettime(0x0, &(0x7f0000001a00)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000001a40)={{0x8, 0x7, 0x9, 0x2, 'syz1\x00', 0x8}, 0x1, [0x65a, 0x1f, 0x9, 0x8, 0x2e244777, 0x3, 0x7c, 0x3, 0x6, 0x65e, 0x4, 0x1000, 0x2, 0x7fffffff, 0xff, 0x1, 0x5, 0x3, 0x6, 0x0, 0x3f, 0x4, 0xf6, 0x74f7, 0x9c4, 0x8001, 0xab6, 0x3ff, 0x100000001, 0x1, 0x883, 0x6, 0x10001, 0x7, 0x80, 0x101, 0x9, 0x7, 0x1, 0x4, 0x7ff, 0x4d2c, 0x6, 0x39, 0x1, 0x5, 0x4, 0x5, 0x10000, 0x0, 0xf1ec, 0x1, 0xff, 0x200, 0xe4, 0x7f, 0x4, 0x8, 0x2, 0x9, 0xced, 0x1, 0x7fffffff, 0x8, 0x9, 0x9, 0x401, 0x3, 0x5, 0x400, 0x7dc, 0x6, 0x4, 0x2, 0x5, 0x3, 0x8, 0x2, 0x8e, 0xffffffffffffffe0, 0x5, 0x1, 0xff4b, 0x9, 0x8001, 0x2, 0xdc4, 0x2, 0x0, 0xca, 0x7f, 0x8, 0x4, 0xffff, 0x7fffffff, 0x400, 0x9, 0x100efdeb, 0x3, 0x7f, 0x6c, 0x0, 0x3, 0x0, 0xcbad, 0x20, 0xf, 0x3, 0x5, 0x7, 0xe07e, 0x0, 0x5, 0x4, 0x0, 0x1, 0x100000000, 0xfffffffffffff04d, 0x3f, 0x1000, 0x9, 0xbafa, 0x9, 0x0, 0x443, 0x7fea, 0x335, 0x1], {r4, r5+30000000}}) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000001f40)=0x1, 0x4) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000001f80)={0x1, 0x0, {0x7e, 0x5, 0x1, 0xfffffffffffff000}}) syz_mount_image$btrfs(&(0x7f0000001fc0)='btrfs\x00', &(0x7f0000002000)='./file0\x00', 0xfff, 0x8, &(0x7f00000023c0)=[{&(0x7f0000002040)="a713646a4755b40be1aeaabe1548ca691b27d7e1fb4efffed75d3f2f4d", 0x1d, 0x1}, {&(0x7f0000002080)="5259c9b4c3cd93c6f32928261b8117f37915a5e94f45953d8ba44d3380e2f13c7b8cacb76240cfe89765fe5d9d326717b18fcdeecd85de7a9b70666754a228cb94cc6a951ceb5437ff57b2a51a5ded9c64bc091531615f86050530b2c5ef37ff4d25270a42a36ae2b9b2f91e240b493df4475a57397d619823dc0e0fb0e6a2bd4893fcb1e6d67f75247d9b9fda69afd4ab9014a4cfd4de1be1a6611b8886de09b7fed59381b6d047f24eee5023aaa1b20b1a2f2d993d3b363db99a3bbcb0589eaa93dd2102e255158cccaa688e66c0ff4bc0e02680e59c0e2dd154d65ae48fbc6d83a9fc61dead9540ab8b42b880945771", 0xf1, 0x8}, {&(0x7f0000002180)="efbe3b1f8834ee9115703c24d056a86bd4cd8051adc6bb5429a469527ec3b9aa11df5a3feff1dc70b7d90e64f45e483ed7d91111d8a3632ec895f3fa509863c869921bc454792ad03efcc9cb39da4231767c251a60d4b4686b7b968b3c8e38f5dde8c3982ac061a3624bae21f88c53c5a9ce", 0x72}, {&(0x7f0000002200)="679ff342d5b74ded6b51", 0xa, 0x7}, {&(0x7f0000002240)="37a05895fb93b9ee6d5e02821e4c30c88f9222e25e1310db31beb18b5d35ce30de6103dfdbaa0b53b070b63d9f4e4c7b0f4ebcaf156ee530aff2340bbc07957172012b0917482d41ff83fbe8ce0796737223bd751e35969d3aed9c4ed82099f4f683325330cf9c7c82b7f763c7496d1994d8af102d895921b5d15c99157c587312728237d11f8c31737b8af61a596f827a2f21d55d8ddba67aef2a403ce57267f3962f223c1960d2fb791ef89aa828d43909940e8a5f70b0f7b8253d0eab84", 0xbf}, {&(0x7f0000002300)="34fc37ec2b5b251f3efaa1287809904e7b", 0x11, 0x20}, {&(0x7f0000002340)="5a58cf552b1e050edf1a42b4dab90834fd678ec9df6af60256b9bbd1d2b8b61e023412be4eb3ecc8efb261f9598777ad", 0x30, 0xfffffffffffff70f}, {&(0x7f0000002380)="4eb3189a5dac7e771a5d6ac2814b1c9e27c2f1d74610c26365e0af3c057660ee3dec74738552f12692cf21", 0x2b, 0x3}], 0x44, &(0x7f0000002480)={[{@space_cache_v2='space_cache=v2'}, {@nodatasum='nodatasum'}], [{@fsname={'fsname', 0x3d, 'ppp0'}}, {@measure='measure'}]}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000024c0), &(0x7f0000002500)=0x4) 20:49:08 executing program 5: kexec_load(0x201ef1c0, 0x32e63ab3d6f949b5, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000100)) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) connect$bt_sco(r1, &(0x7f0000000140)={0x1f, {0x5, 0x0, 0xb2, 0xa600000, 0x29f, 0xffff}}, 0x8) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000040)={0x2, 0x6, 0x9, 0x5, 0x1, 0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 426.781891] hfs: unable to parse mount options 20:49:08 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:08 executing program 2: kexec_load(0x200000000003f, 0xffffffffffffff15, 0x0, 0xffffffffffffffff) 20:49:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0x0) close(r0) 20:49:08 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:08 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400800, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) [ 427.224183] hfs: unable to parse mount options 20:49:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0x0) close(r0) 20:49:08 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffff9c}) sched_yield() vmsplice(r0, &(0x7f0000000440)=[{&(0x7f0000000040)="7ae418a5f2bd0db1cb70d0575dd33dd4b1e5253f783e166f0aafd4f40ec1ef7ac203a0fa4b8b84cf71512060a702deb210b59eafdd31ed4b73b757b0a302a7ec83849b84db3144335a30dc42263dc0664bf1d47d8ec724332b27b791b12ecbae4dd2163fab368f78dc2404fd1001dc76c771318599dbb1dff175e02791cbb82fac87f4fa1bd3df4b8600f4e9b284f9a11060636222853a18060e7c5b1e558ef8687598e5db62e5d24346c0d381e39156604e142f95c7fe2f632fd09e5f96f69c3685d7ca782d15ae07b2e1528600651c6dc47944139e9c7cda64a94285d0eeef13cd305f0df67d4326d79e9ea9", 0xed}, {&(0x7f0000000140)="11b429f8c040bf5fc920071a9e37f117dbde8639ee8ae43b3227cf8f03646728c1a740d30db7aa3c9c846d190f985457cf4ce4ef12fe3d0af09d6ac57a6c8a5232de6b82625b42187ed6b8a49fe7c4e82f3d4c1b0d67602524d1f852d7163b2a2415be5b5ad61db0c13ec6fb8a427b665757928becc01522892fa9b2e917f36f0199a24b43f976ffa68aa1dafdaf7dcc0f9ee797526bd01db1ffcfc8fb060dd6463e6c4012bd51a5f12a0aa99f293366ec65e26ba796e1abfca84dceaca8aa4cd4cabcdd135f", 0xc6}, {&(0x7f0000000240)="1263e79f9d7a1696084518093ff3336b2b5f7623f436a8e1a1848991b00428ace2", 0x21}, {&(0x7f0000000280)="ab19aaad559d41d82ec99ebaff0b5a8241fdadd5a4f3523fa158a575457ac3b847b04a6005c62a2256843f84da98bad867bf663bef9528d6de6db474849bb7f1a410be9be4db1a", 0x47}, {&(0x7f0000000300)="8378eb115e4bf69b457c4802d20bfa12032c0584e7aa23afc8c020768e6ff476bf98d00d6a1ca5a020cf688a5dcfe34fd107777331539e04b60e3dbbb0186787e920919523cec7172d4c7d970ac9022f20d15e23b773d992b573a293eed7c7c8e750c6eb48dddb628d82ae4ec4c840b643d409b073caa3f3915ae1c2487257f1acd5ce6c31e6608f7e57c1e27133cbc90dd2b33afffd7856f81eea096713a3d728db250f73e87c134188c88edef4ba1ee4a94b", 0xb3}, {&(0x7f00000003c0)="db24e330d59ba05c71fb8b28a0cc756d414d290a11b8bfc61246cfad365a2ab0113966236d89cfb425739bec3618fba7499e109974345bf22086e76e5478f751ce03", 0x42}], 0x6, 0x8) syz_open_dev$cec(&(0x7f00000004c0)='/dev/cec#\x00', 0x1, 0x2) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000500)=""/19) 20:49:09 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB='*\x00\x00\x00)\x00\x00'], 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="a4fc"]) 20:49:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(0xffffffffffffffff) 20:49:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 427.565060] 9pnet: Insufficient options for proto=fd [ 427.694682] hfs: unable to parse mount options 20:49:09 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000100)) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x80, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 427.821214] hfs: unable to parse mount options 20:49:09 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:09 executing program 2: kexec_load(0x7, 0xfffffffffffffd54, 0x0, 0x1) 20:49:09 executing program 0 (fault-call:9 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @broadcast, @remote}, &(0x7f0000000200)=0xc) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000240)={@loopback, @mcast2, @local, 0x9, 0x100000001, 0xa5a, 0x400, 0x5e10, 0x0, r2}) bind$alg(r0, &(0x7f0000461fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r3 = accept$alg(r0, 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x2) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$inet6_mreq(r4, 0x29, 0x15, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x29}, r5}, 0x14) r6 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x401, 0x100) io_setup(0x100000001, &(0x7f0000f69000)=0x0) ioctl$IMGETVERSION(r6, 0x80044942, &(0x7f0000000080)) sendmsg$alg(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_submit(r7, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) 20:49:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 428.050287] FAULT_INJECTION: forcing a failure. [ 428.050287] name failslab, interval 1, probability 0, space 0, times 0 [ 428.092922] CPU: 1 PID: 19875 Comm: syz-executor0 Not tainted 4.20.0+ #1 [ 428.099808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.109167] Call Trace: [ 428.111768] dump_stack+0x1db/0x2d0 [ 428.115417] ? dump_stack_print_info.cold+0x20/0x20 [ 428.120456] should_fail.cold+0xa/0x15 [ 428.124361] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 428.129479] ? ___might_sleep+0x1e7/0x310 [ 428.133637] ? arch_local_save_flags+0x50/0x50 [ 428.138233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.143788] __should_failslab+0x121/0x190 [ 428.148030] should_failslab+0x9/0x14 [ 428.151839] kmem_cache_alloc_trace+0x2d1/0x760 [ 428.156533] alloc_pipe_info+0x152/0x580 [ 428.160636] ? pipe_read+0x940/0x940 [ 428.164366] ? aa_path_link+0x5d0/0x5d0 [ 428.168365] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 428.173302] ? common_file_perm+0x231/0x800 [ 428.177652] splice_direct_to_actor+0x795/0x9d0 [ 428.182330] ? iterate_fd+0x4b0/0x4b0 [ 428.186146] ? generic_pipe_buf_nosteal+0x10/0x10 [ 428.191003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.196548] ? do_splice_to+0x190/0x190 [ 428.200534] ? rw_verify_area+0x118/0x360 [ 428.204696] do_splice_direct+0x2c7/0x420 [ 428.208864] ? splice_direct_to_actor+0x9d0/0x9d0 [ 428.213733] ? rw_verify_area+0x118/0x360 [ 428.217896] do_sendfile+0x61a/0xe60 [ 428.221629] ? do_compat_pwritev64+0x1c0/0x1c0 [ 428.226227] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 428.231772] ? _copy_from_user+0xdd/0x150 [ 428.235930] __x64_sys_sendfile64+0x15a/0x240 [ 428.240436] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 428.245024] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 428.249797] do_syscall_64+0x1a3/0x800 [ 428.253692] ? syscall_return_slowpath+0x5f0/0x5f0 [ 428.258632] ? prepare_exit_to_usermode+0x232/0x3b0 [ 428.263663] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.268524] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.273719] RIP: 0033:0x457ec9 [ 428.276921] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.295827] RSP: 002b:00007f9612c5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 428.303552] RAX: ffffffffffffffda RBX: 00007f9612c5ec90 RCX: 0000000000457ec9 [ 428.310823] RDX: 00000000200000c0 RSI: 0000000000000006 RDI: 0000000000000005 [ 428.318097] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 428.325368] R10: 00000000effffdef R11: 0000000000000246 R12: 00007f9612c5f6d4 [ 428.332639] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 0000000000000008 20:49:09 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x1, 0x80) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000040)={0x1, 0x0, @ioapic={0x4, 0x2, 0xffffffffffff0000, 0x4, 0x0, [{0x4, 0x3, 0x1, [], 0x1}, {0x5, 0x1, 0x1, [], 0xcfd1}, {0x4, 0x7ff, 0x9, [], 0x3}, {0x7fffffff, 0x8, 0x5bfb, [], 0x1000}, {0x8, 0x0, 0x100, [], 0x5}, {0x1a1, 0x54b, 0x2, [], 0x2}, {0x3b0, 0x3, 0xf3b8, [], 0xffff}, {0x1, 0x3, 0x62cec639, [], 0x7f}, {0xef, 0x10001, 0x9, [], 0x5}, {0x80000001, 0x3ff, 0x80000001, [], 0x2}, {0x9, 0x5, 0x691, [], 0xfff}, {0x40, 0x7fff, 0x4, [], 0x1a52}, {0x8, 0x7, 0x1, [], 0x20}, {0x10001, 0x3f, 0x4, [], 0x7fffffff}, {0x1, 0x8, 0x6, [], 0xe6d}, {0x5bb, 0x65e, 0x9, [], 0x6}, {0x727, 0x0, 0xae, [], 0x6}, {0x800000000, 0x6, 0x2, [], 0x5}, {0x3, 0x6, 0x5, [], 0x1}, {0x80, 0x3, 0x5, [], 0x1}, {0x29f1d744, 0x7017, 0x3, [], 0x1}, {0x3, 0x5, 0x3, [], 0x1}, {0x20, 0x8, 0x5f, [], 0x8}, {0x0, 0x1ff, 0x400}]}}) kexec_load(0x0, 0x0, 0x0, 0x0) 20:49:10 executing program 1: set_mempolicy(0x4003, &(0x7f0000000140)=0x6, 0x9) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000f00, 0x0, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0xacb}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x7, 0x8000, 0x0, 0x0, 0xbe4, 0x4, 0x81}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180), &(0x7f00000001c0)=0xb) 20:49:10 executing program 0 (fault-call:9 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:10 executing program 2: kexec_load(0x3, 0x0, 0x0, 0x0) [ 428.620168] hfs: unable to parse mount options [ 428.620401] FAULT_INJECTION: forcing a failure. [ 428.620401] name failslab, interval 1, probability 0, space 0, times 0 [ 428.678094] CPU: 1 PID: 19898 Comm: syz-executor0 Not tainted 4.20.0+ #1 [ 428.684971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.694333] Call Trace: [ 428.696956] dump_stack+0x1db/0x2d0 [ 428.700608] ? dump_stack_print_info.cold+0x20/0x20 [ 428.705646] ? percpu_ref_put_many+0x129/0x270 [ 428.710255] should_fail.cold+0xa/0x15 [ 428.714161] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 428.719293] ? ___might_sleep+0x1e7/0x310 [ 428.723461] ? arch_local_save_flags+0x50/0x50 [ 428.728066] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 428.732849] __should_failslab+0x121/0x190 [ 428.737108] should_failslab+0x9/0x14 [ 428.740925] __kmalloc+0x2dc/0x740 [ 428.744494] ? alloc_pipe_info+0x286/0x580 [ 428.748751] alloc_pipe_info+0x286/0x580 [ 428.752832] ? pipe_read+0x940/0x940 [ 428.756571] ? aa_path_link+0x5d0/0x5d0 [ 428.760577] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 428.765524] ? common_file_perm+0x231/0x800 [ 428.769876] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 428.774657] splice_direct_to_actor+0x795/0x9d0 [ 428.779354] ? retint_kernel+0x2d/0x2d [ 428.783262] ? generic_pipe_buf_nosteal+0x10/0x10 [ 428.788131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.793690] ? do_splice_to+0x190/0x190 [ 428.797679] ? rw_verify_area+0x118/0x360 [ 428.801839] do_splice_direct+0x2c7/0x420 [ 428.806006] ? splice_direct_to_actor+0x9d0/0x9d0 [ 428.810876] ? rw_verify_area+0x118/0x360 [ 428.815037] do_sendfile+0x61a/0xe60 [ 428.818774] ? do_compat_pwritev64+0x1c0/0x1c0 [ 428.823380] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 428.828929] ? _copy_from_user+0xdd/0x150 [ 428.833095] __x64_sys_sendfile64+0x15a/0x240 [ 428.837598] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 428.842200] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 428.846986] do_syscall_64+0x1a3/0x800 [ 428.850888] ? syscall_return_slowpath+0x5f0/0x5f0 [ 428.855831] ? prepare_exit_to_usermode+0x232/0x3b0 [ 428.860872] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.865734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.870929] RIP: 0033:0x457ec9 [ 428.874128] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.893029] RSP: 002b:00007f9612c5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 428.900746] RAX: ffffffffffffffda RBX: 00007f9612c5ec90 RCX: 0000000000457ec9 [ 428.908018] RDX: 00000000200000c0 RSI: 0000000000000006 RDI: 0000000000000005 [ 428.915291] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 20:49:10 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) fsetxattr(r2, &(0x7f0000000040)=@random={'trusted.', '/dev/vbi#\x00'}, &(0x7f0000000080)='\x00', 0x1, 0x3) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x0, 0x0) getgroups(0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f0000000100)=0xfe000, 0x4) [ 428.922566] R10: 00000000effffdef R11: 0000000000000246 R12: 00007f9612c5f6d4 [ 428.929839] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 0000000000000008 20:49:10 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0xd0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000200)={'ip6_vti0\x00', 0x6, 0x80000001}) getsockname$inet(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)=0x3, 0x4) setsockopt(r0, 0x9, 0x800, &(0x7f0000000100)="6780e43d2f86a8e8e284dc34b9cbe76d7cd043585e870645d18aae7751b5b95d2a7b8d45d1e16ea8d2a79c70238e3d4d07548af8fdec35c5d1a6c98737eeef861f20c3ea727a06b5e9b86b6b074deb580749ca434b393aecb0074dacf72f5d3409fbedd0a870602f7a1e21f829fb83184f4df81aced346a2d3cd3621b9edee48173a5b8348be3ced2f96d23b9427e5b61bf35b85ea38d08f32161a3272c4897508e6b75468152669b4f20487d4511c3ce450ff549419ba4e5f44d966a3e5bfd3237aa2854549be192718a6691fa4be2a9d155345a7b507b8006d88fa6e3558c540401215c534c8dc4cf62fa578e64206a19b", 0xf2) [ 428.998120] hfs: unable to parse mount options 20:49:10 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:10 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, &(0x7f0000000240)) 20:49:10 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0xf10001, 0xeffffdef) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000000)=0x1d8da0ca, 0x4) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:10 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000007d40)=[{{&(0x7f0000001180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001400)=[{&(0x7f0000001200)=""/199, 0xc7}, {&(0x7f0000001300)=""/236, 0xec}], 0x2, &(0x7f0000001440)=""/117, 0x75}, 0xe064}, {{0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f00000014c0)=""/231, 0xe7}, {&(0x7f00000015c0)=""/223, 0xdf}, {&(0x7f00000016c0)=""/218, 0xda}, {&(0x7f00000017c0)=""/198, 0xc6}, {&(0x7f00000018c0)=""/4096, 0x1000}], 0x5, &(0x7f0000002940)=""/45, 0x2d}, 0xb4ce071}, {{0x0, 0x0, &(0x7f0000005000)=[{&(0x7f0000002980)=""/162, 0xa2}, {&(0x7f0000002a40)=""/165, 0xa5}, {&(0x7f0000002b00)=""/244, 0xf4}, {&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/163, 0xa3}, {&(0x7f0000003cc0)=""/192, 0xc0}, {&(0x7f0000003d80)=""/210, 0xd2}, {&(0x7f0000003e80)=""/71, 0x47}, {&(0x7f0000003f00)=""/248, 0xf8}, {&(0x7f0000004000)=""/4096, 0x1000}], 0xa, &(0x7f00000050c0)=""/221, 0xdd}, 0x101}, {{&(0x7f00000051c0)=@nl, 0x80, &(0x7f0000005680)=[{&(0x7f0000005240)=""/113, 0x71}, {&(0x7f00000052c0)=""/30, 0x1e}, {&(0x7f0000005300)=""/10, 0xa}, {&(0x7f0000005340)=""/210, 0xd2}, {&(0x7f0000005440)=""/14, 0xe}, {&(0x7f0000005480)=""/89, 0x59}, {&(0x7f0000005500)=""/148, 0x94}, {&(0x7f00000055c0)=""/13, 0xd}, {&(0x7f0000005600)=""/93, 0x5d}], 0x9, &(0x7f0000005740)=""/4096, 0x1000}, 0xfffffffffffffffd}, {{&(0x7f0000006740)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f00000067c0), 0x0, &(0x7f0000006800)=""/4096, 0x1000}, 0x8000}, {{0x0, 0x0, &(0x7f0000007c00)=[{&(0x7f0000007800)=""/206, 0xce}, {&(0x7f0000007900)=""/160, 0xa0}, {&(0x7f00000079c0)=""/60, 0x3c}, {&(0x7f0000007a00)=""/146, 0x92}, {&(0x7f0000007ac0)=""/119, 0x77}, {&(0x7f0000007b40)=""/129, 0x81}], 0x6, &(0x7f0000007c80)=""/144, 0x90}, 0xffffffff}], 0x6, 0x10142, &(0x7f0000007ec0)) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000007f40)={'broute\x00', 0x0, 0x0, 0x0, [], 0x6, &(0x7f0000007f00)=[{}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}]}, 0xd8) kexec_load(0xfffffeffefbfffff, 0x44a0abad, 0x0, 0x150002) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40200, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x1000, "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"}, &(0x7f0000001080)=0x1008) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000001140)={@rand_addr=0xe4, @loopback, 0x0, 0x4, [@rand_addr=0xfff, @dev={0xac, 0x14, 0x14, 0x22}, @empty, @empty]}, 0x20) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000010c0)={r2, 0xfff, 0x800, 0x9}, &(0x7f0000001100)=0x10) [ 429.317113] hfs: unable to parse mount options 20:49:10 executing program 1: set_mempolicy(0x4003, &(0x7f0000000140)=0x6, 0x9) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000f00, 0x0, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0xacb}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x7, 0x8000, 0x0, 0x0, 0xbe4, 0x4, 0x81}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180), &(0x7f00000001c0)=0xb) 20:49:11 executing program 0 (fault-call:9 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) [ 429.416730] hfs: unable to parse mount options [ 429.428144] syz-executor1 (19896) used greatest stack depth: 16200 bytes left 20:49:11 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) rt_sigaction(0x24, &(0x7f0000000080)={&(0x7f0000000040)="f2430fc20906f0fe02c442e93affc40220f2c6460f1943b5470ff28300000000f3dbd6c402150b14b4c4e1c9dac342d8f1", {0x537}, 0x4, &(0x7f0000000100)="c4227d1984c90000802066410f3a6286f3ffffff00c4a129d23264646540ee640f58bf00000080672666660f5c47002e0f95f766440f3822b338000000c421fb2c905d00000044d9f5"}, &(0x7f0000000240)={&(0x7f0000000180)="f0430fb05a0d480fc78e0080000066470f570c15f3eaaf2ec442c9bf7a0066430f72e3f8410fc1de36f0438022038f6878977f0079420f1a820e000000c4c1cdfbf5", {}, 0x0, &(0x7f0000000200)="0f0fed1d6636c0f6023e65dbe4c4a3616c64170b76c4e199d937c42145159096bbf9a70f2aa4305bc10000c483097d51b15dc463c90fef206726446d"}, 0x8, &(0x7f0000000280)) getgroups(0x0, 0x0) 20:49:11 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfsp', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 429.584001] FAULT_INJECTION: forcing a failure. [ 429.584001] name failslab, interval 1, probability 0, space 0, times 0 [ 429.641724] CPU: 1 PID: 19956 Comm: syz-executor0 Not tainted 4.20.0+ #1 [ 429.648605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.657965] Call Trace: [ 429.660580] dump_stack+0x1db/0x2d0 [ 429.664239] ? dump_stack_print_info.cold+0x20/0x20 [ 429.669269] ? print_usage_bug+0xd0/0xd0 [ 429.673348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.678901] ? check_preemption_disabled+0x48/0x290 [ 429.683932] should_fail.cold+0xa/0x15 [ 429.687827] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 429.692950] ? ___might_sleep+0x1e7/0x310 [ 429.697107] ? arch_local_save_flags+0x50/0x50 [ 429.701701] ? mark_held_locks+0x100/0x100 [ 429.705956] __should_failslab+0x121/0x190 [ 429.710200] should_failslab+0x9/0x14 [ 429.714007] kmem_cache_alloc_node_trace+0x270/0x720 [ 429.719115] ? debug_smp_processor_id+0x1c/0x20 [ 429.723791] ? perf_trace_lock+0x12f/0x750 [ 429.728031] ? perf_trace_lock_acquire+0x138/0x7d0 [ 429.732970] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 429.738263] __kmalloc_node+0x3d/0x70 [ 429.742077] kvmalloc_node+0x68/0x100 [ 429.745894] iov_iter_get_pages_alloc+0x87f/0x15a0 [ 429.750830] ? aa_file_perm+0x42e/0x1090 [ 429.754903] ? find_held_lock+0x35/0x120 [ 429.758988] ? iov_iter_revert+0xaa0/0xaa0 [ 429.763233] ? lock_downgrade+0x910/0x910 [ 429.767383] ? kasan_check_read+0x11/0x20 [ 429.771541] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 429.776828] ? rcu_read_unlock_special+0x380/0x380 [ 429.781802] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 429.786823] ? iov_iter_pipe+0xba/0x2f0 [ 429.790812] default_file_splice_read+0x1b1/0xac0 [ 429.795669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.801222] ? aa_path_link+0x5d0/0x5d0 [ 429.805244] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 429.810531] ? iter_file_splice_write+0xfc0/0xfc0 [ 429.815384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.820928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.826472] ? check_preemption_disabled+0x48/0x290 [ 429.831507] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.837051] ? fsnotify+0x4f5/0xed0 [ 429.840688] ? debug_mutex_init+0x2d/0x60 [ 429.844850] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.850417] ? __fsnotify_parent+0xe2/0x450 [ 429.854769] ? fsnotify_first_mark+0x350/0x350 [ 429.859369] ? apparmor_path_rmdir+0x30/0x30 [ 429.863793] ? alloc_pipe_info+0x286/0x580 [ 429.868046] ? security_file_permission+0x94/0x320 [ 429.872991] ? rw_verify_area+0x118/0x360 [ 429.877146] ? iter_file_splice_write+0xfc0/0xfc0 [ 429.882003] do_splice_to+0x12a/0x190 [ 429.885823] splice_direct_to_actor+0x31b/0x9d0 [ 429.890505] ? generic_pipe_buf_nosteal+0x10/0x10 [ 429.895376] ? do_splice_to+0x190/0x190 [ 429.899374] ? rw_verify_area+0x118/0x360 [ 429.903539] do_splice_direct+0x2c7/0x420 [ 429.907719] ? splice_direct_to_actor+0x9d0/0x9d0 [ 429.912586] ? rw_verify_area+0x118/0x360 [ 429.916747] do_sendfile+0x61a/0xe60 [ 429.920484] ? do_compat_pwritev64+0x1c0/0x1c0 [ 429.925085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 429.930630] ? _copy_from_user+0xdd/0x150 [ 429.934791] __x64_sys_sendfile64+0x15a/0x240 [ 429.939298] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 429.943891] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 429.948665] do_syscall_64+0x1a3/0x800 [ 429.952564] ? syscall_return_slowpath+0x5f0/0x5f0 [ 429.957506] ? prepare_exit_to_usermode+0x232/0x3b0 [ 429.962542] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 429.967404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.972597] RIP: 0033:0x457ec9 20:49:11 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400000, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f00000000c0)={0x0, {0x3ff, 0x160}}) [ 429.975798] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 429.994701] RSP: 002b:00007f9612c5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 430.002416] RAX: ffffffffffffffda RBX: 00007f9612c5ec90 RCX: 0000000000457ec9 [ 430.009686] RDX: 00000000200000c0 RSI: 0000000000000006 RDI: 0000000000000005 [ 430.016960] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 430.024245] R10: 00000000effffdef R11: 0000000000000246 R12: 00007f9612c5f6d4 [ 430.031519] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 0000000000000008 20:49:11 executing program 2: r0 = dup(0xffffffffffffff9c) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)={r1, 0x1, 0x42, "17797fa13ef576fb23022e6c2d1deddef87f2901c78229b57a3f48595009d8b37f3ace5950478dd114439ecb1b390824083349e406d1e367558a117141086e0b4d68"}, 0x4a) 20:49:11 executing program 0 (fault-call:9 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:11 executing program 3 (fault-call:7 fault-nth:0): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) [ 430.354399] FAULT_INJECTION: forcing a failure. [ 430.354399] name failslab, interval 1, probability 0, space 0, times 0 [ 430.413812] FAULT_INJECTION: forcing a failure. [ 430.413812] name failslab, interval 1, probability 0, space 0, times 0 [ 430.443414] CPU: 1 PID: 19986 Comm: syz-executor3 Not tainted 4.20.0+ #1 [ 430.450281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.459644] Call Trace: [ 430.462267] dump_stack+0x1db/0x2d0 [ 430.465942] ? dump_stack_print_info.cold+0x20/0x20 [ 430.470994] should_fail.cold+0xa/0x15 [ 430.474907] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 430.480037] ? ___might_sleep+0x1e7/0x310 [ 430.484203] ? arch_local_save_flags+0x50/0x50 [ 430.488812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.494381] __should_failslab+0x121/0x190 [ 430.498634] should_failslab+0x9/0x14 [ 430.502470] kmem_cache_alloc_trace+0x2d1/0x760 [ 430.507168] alloc_pipe_info+0x152/0x580 [ 430.511770] ? pipe_read+0x940/0x940 [ 430.515499] ? aa_path_link+0x5d0/0x5d0 [ 430.519495] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 430.524442] ? common_file_perm+0x231/0x800 [ 430.528774] splice_direct_to_actor+0x795/0x9d0 [ 430.533447] ? iterate_fd+0x4b0/0x4b0 [ 430.537256] ? generic_pipe_buf_nosteal+0x10/0x10 [ 430.542123] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.547685] ? do_splice_to+0x190/0x190 [ 430.551699] ? rw_verify_area+0x118/0x360 [ 430.555885] do_splice_direct+0x2c7/0x420 [ 430.560047] ? splice_direct_to_actor+0x9d0/0x9d0 [ 430.564915] ? rw_verify_area+0x118/0x360 [ 430.569077] do_sendfile+0x61a/0xe60 [ 430.572814] ? do_compat_pwritev64+0x1c0/0x1c0 [ 430.577418] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 430.582963] ? _copy_from_user+0xdd/0x150 [ 430.587122] __x64_sys_sendfile64+0x15a/0x240 [ 430.591633] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 430.596224] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 430.601001] do_syscall_64+0x1a3/0x800 [ 430.604906] ? syscall_return_slowpath+0x5f0/0x5f0 [ 430.609843] ? prepare_exit_to_usermode+0x232/0x3b0 [ 430.614888] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 430.619747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.624938] RIP: 0033:0x457ec9 [ 430.628135] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 430.647038] RSP: 002b:00007f3525ccfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 430.654751] RAX: ffffffffffffffda RBX: 00007f3525ccfc90 RCX: 0000000000457ec9 20:49:12 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:12 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x261659ff3ee125d7) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000040)={0xffffffff, 0x0, 0x10001, 0xff}) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7, 0x33, 0x1}, 0x7) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000080)={r3, 0x7}) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000140), 0x2) [ 430.662038] RDX: 00000000200000c0 RSI: 0000000000000004 RDI: 0000000000000003 [ 430.669313] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 430.676593] R10: 00000000effffdef R11: 0000000000000246 R12: 00007f3525cd06d4 [ 430.683897] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 0000000000000005 [ 430.692911] CPU: 0 PID: 19992 Comm: syz-executor0 Not tainted 4.20.0+ #1 [ 430.699784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.709145] Call Trace: [ 430.711751] dump_stack+0x1db/0x2d0 [ 430.715402] ? dump_stack_print_info.cold+0x20/0x20 [ 430.720434] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 430.725920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.731482] ? check_preemption_disabled+0x48/0x290 [ 430.736522] should_fail.cold+0xa/0x15 [ 430.740429] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 430.745543] ? retint_kernel+0x2d/0x2d [ 430.749452] ? __should_failslab+0x99/0x190 [ 430.753785] ? write_comp_data+0x68/0x70 [ 430.757860] __should_failslab+0x121/0x190 [ 430.762107] should_failslab+0x9/0x14 [ 430.765912] kmem_cache_alloc_node_trace+0x270/0x720 [ 430.771048] ? debug_smp_processor_id+0x1c/0x20 [ 430.775724] ? perf_trace_lock+0x12f/0x750 [ 430.779964] ? perf_trace_lock_acquire+0x138/0x7d0 [ 430.784899] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 430.790218] __kmalloc_node+0x3d/0x70 [ 430.794029] kvmalloc_node+0x68/0x100 [ 430.797841] iov_iter_get_pages_alloc+0x87f/0x15a0 [ 430.802777] ? aa_file_perm+0x42e/0x1090 [ 430.806841] ? find_held_lock+0x35/0x120 [ 430.810916] ? iov_iter_revert+0xaa0/0xaa0 [ 430.815174] ? lock_downgrade+0x910/0x910 [ 430.819322] ? kasan_check_read+0x11/0x20 [ 430.823487] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 430.828768] ? rcu_read_unlock_special+0x380/0x380 [ 430.833711] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 430.838732] ? iov_iter_pipe+0xba/0x2f0 [ 430.842724] default_file_splice_read+0x1b1/0xac0 [ 430.847573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.853120] ? aa_path_link+0x5d0/0x5d0 [ 430.857107] ? iter_file_splice_write+0xfc0/0xfc0 [ 430.861956] ? lockdep_hardirqs_on+0x415/0x5d0 [ 430.866540] ? retint_kernel+0x2d/0x2d [ 430.870435] ? trace_hardirqs_on_caller+0xc0/0x310 [ 430.875383] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 430.880146] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 430.885626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.891169] ? fsnotify+0x4f5/0xed0 [ 430.894812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.900367] ? __fsnotify_parent+0xe2/0x450 [ 430.904698] ? fsnotify_first_mark+0x350/0x350 [ 430.909299] ? retint_kernel+0x2d/0x2d [ 430.913208] ? security_file_permission+0x25f/0x320 [ 430.918235] ? security_file_permission+0x94/0x320 [ 430.923200] ? rw_verify_area+0x118/0x360 [ 430.927365] ? iter_file_splice_write+0xfc0/0xfc0 [ 430.932220] do_splice_to+0x12a/0x190 [ 430.936040] splice_direct_to_actor+0x31b/0x9d0 [ 430.940763] ? generic_pipe_buf_nosteal+0x10/0x10 [ 430.945670] ? do_splice_to+0x190/0x190 [ 430.949659] ? rw_verify_area+0x118/0x360 [ 430.953825] do_splice_direct+0x2c7/0x420 [ 430.958017] ? splice_direct_to_actor+0x9d0/0x9d0 [ 430.962877] ? rw_verify_area+0x118/0x360 [ 430.967037] do_sendfile+0x61a/0xe60 [ 430.970775] ? do_compat_pwritev64+0x1c0/0x1c0 [ 430.975377] ? copy_user_generic_unrolled+0x89/0xc0 [ 430.980405] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 430.985948] ? _copy_from_user+0xdd/0x150 [ 430.990108] __x64_sys_sendfile64+0x15a/0x240 [ 430.994612] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 430.999201] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 431.003971] do_syscall_64+0x1a3/0x800 [ 431.007869] ? syscall_return_slowpath+0x5f0/0x5f0 [ 431.012808] ? prepare_exit_to_usermode+0x232/0x3b0 [ 431.017839] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.022701] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.027892] RIP: 0033:0x457ec9 [ 431.031091] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 431.049993] RSP: 002b:00007f9612c5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 431.057704] RAX: ffffffffffffffda RBX: 00007f9612c5ec90 RCX: 0000000000457ec9 20:49:12 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000080)={0x60, 0x0, 0x5, {{0xffffffff, 0x54, 0x9, 0x3, 0x9, 0x9, 0x9, 0xff}}}, 0x60) kexec_load(0x7f, 0x668, 0x0, 0x2a0000) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x6, 0x2, 0x5, 0x4}, 0x14) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000000)={'ip6erspan0\x00', 0x1000}) [ 431.064976] RDX: 00000000200000c0 RSI: 0000000000000006 RDI: 0000000000000005 [ 431.072246] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 431.079517] R10: 00000000effffdef R11: 0000000000000246 R12: 00007f9612c5f6d4 [ 431.086787] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 0000000000000008 20:49:12 executing program 3 (fault-call:7 fault-nth:1): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:12 executing program 1: set_mempolicy(0x4003, &(0x7f0000000140)=0x6, 0x9) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000f00, 0x0, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0xacb}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x7, 0x8000, 0x0, 0x0, 0xbe4, 0x4, 0x81}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180), &(0x7f00000001c0)=0xb) 20:49:12 executing program 0 (fault-call:9 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:12 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x80000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x302, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8010}, 0x40) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0xff) [ 431.326305] FAULT_INJECTION: forcing a failure. [ 431.326305] name failslab, interval 1, probability 0, space 0, times 0 [ 431.360695] hfs: unable to parse mount options [ 431.397588] FAULT_INJECTION: forcing a failure. [ 431.397588] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 431.420016] CPU: 1 PID: 20018 Comm: syz-executor3 Not tainted 4.20.0+ #1 [ 431.426896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.436257] Call Trace: [ 431.438872] dump_stack+0x1db/0x2d0 [ 431.442532] ? dump_stack_print_info.cold+0x20/0x20 [ 431.447569] ? percpu_ref_put_many+0x129/0x270 [ 431.452178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 431.457738] should_fail.cold+0xa/0x15 [ 431.461643] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 431.466771] ? ___might_sleep+0x1e7/0x310 [ 431.470989] ? arch_local_save_flags+0x50/0x50 [ 431.475604] __should_failslab+0x121/0x190 [ 431.479857] should_failslab+0x9/0x14 [ 431.483703] __kmalloc+0x2dc/0x740 [ 431.487285] ? kmem_cache_alloc_trace+0x354/0x760 [ 431.492147] ? alloc_pipe_info+0x286/0x580 [ 431.496401] alloc_pipe_info+0x286/0x580 [ 431.500498] ? pipe_read+0x940/0x940 [ 431.504224] ? aa_path_link+0x5d0/0x5d0 [ 431.508227] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 431.513178] ? common_file_perm+0x231/0x800 [ 431.517526] splice_direct_to_actor+0x795/0x9d0 [ 431.522212] ? iterate_fd+0x4b0/0x4b0 [ 431.526025] ? generic_pipe_buf_nosteal+0x10/0x10 [ 431.530917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 431.536478] ? do_splice_to+0x190/0x190 [ 431.540474] ? rw_verify_area+0x118/0x360 [ 431.544648] do_splice_direct+0x2c7/0x420 [ 431.548817] ? splice_direct_to_actor+0x9d0/0x9d0 [ 431.553689] ? rw_verify_area+0x118/0x360 [ 431.557857] do_sendfile+0x61a/0xe60 [ 431.561613] ? do_compat_pwritev64+0x1c0/0x1c0 [ 431.566224] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 431.571802] ? _copy_from_user+0xdd/0x150 [ 431.575972] __x64_sys_sendfile64+0x15a/0x240 [ 431.580485] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 431.585083] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 431.589869] do_syscall_64+0x1a3/0x800 [ 431.593800] ? syscall_return_slowpath+0x5f0/0x5f0 [ 431.598747] ? prepare_exit_to_usermode+0x232/0x3b0 [ 431.603786] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.608658] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.613857] RIP: 0033:0x457ec9 [ 431.617069] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 431.635980] RSP: 002b:00007f3525ccfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 20:49:13 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x521000, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x4, 0x0, 0x4}}, 0x80, &(0x7f00000012c0)=[{&(0x7f00000000c0)="895a161e0167c1b102e3680909c14cdd68a5cbe1cb34eb70f9426a6b599cf01618a7a894f20b96536958b8634653a60f98ae0fd35d382e9630a160b9c03eb20245aa1660c9f2bb11089da1aee45be8428599c821eb40881d901890a1df03affba7525292a77339262da200390d01da586aaf3ff1867ae3f1f42c1e940b4ef6a3ff131aab41714647008a6adfab9551a71aa23674976bcb025b0f4f3f179850c6e371eddc1a355dd21412a7fc9e5387be8589a639fba672089e8e50930669782ac86c13b1ab5df09d26738c4895bf31b4a394be0acf3c0494a0785ad4777baccee3c181be27711a732a237269c1", 0xed}, {&(0x7f00000001c0)="493cc21bbc824fd2957dd3911f7d490ed5ffa54cb8f94e9252eddd6f9430079720dc40c7c4460846a1770086784a51562056d6ae9020c5566728e10573598abb363db3eb72cb84881cf721c58ba5f3860956fcd13417c5cab444213a43b5d0ffc1008ae54392c9779e2b43ab637429943572338b34981bfd2af1ad87bedcf948d395eb5e20661de2d20ba1f69e02b3ea", 0x90}, {&(0x7f0000000280)="50cbcd275633e67b034102a3879235cc6a98b6a1b7fd1ba0591b4da7e1332efee4f44483dcc57ab36cc8826da4b460b24d79c3cfd93b74528186646b614431", 0x3f}, {&(0x7f00000002c0)="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", 0x1000}], 0x4, &(0x7f0000001300)=[{0x28, 0x12d, 0x80000001, "6347b0d66c2f54f0ec43998b68e9e7d9c4"}], 0x28}, 0x800) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x4) kexec_load(0x0, 0x0, 0x0, 0x0) [ 431.643706] RAX: ffffffffffffffda RBX: 00007f3525ccfc90 RCX: 0000000000457ec9 [ 431.650984] RDX: 00000000200000c0 RSI: 0000000000000004 RDI: 0000000000000003 [ 431.658262] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 431.665544] R10: 00000000effffdef R11: 0000000000000246 R12: 00007f3525cd06d4 [ 431.672825] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 0000000000000005 [ 431.680173] CPU: 0 PID: 20021 Comm: syz-executor0 Not tainted 4.20.0+ #1 [ 431.687033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.687042] Call Trace: [ 431.698994] dump_stack+0x1db/0x2d0 [ 431.702709] ? dump_stack_print_info.cold+0x20/0x20 [ 431.707737] ? retint_kernel+0x2d/0x2d [ 431.711648] should_fail.cold+0xa/0x15 [ 431.711671] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 431.711698] ? arch_local_save_flags+0x50/0x50 [ 431.711712] ? lock_release+0xc40/0xc40 [ 431.711730] ? rcu_pm_notify+0xd0/0xd0 [ 431.733144] should_fail_alloc_page+0x50/0x60 [ 431.737669] __alloc_pages_nodemask+0x323/0xdc0 [ 431.742403] ? trace_hardirqs_on_caller+0xc0/0x310 [ 431.747389] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 431.752446] ? retint_kernel+0x2d/0x2d [ 431.756395] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 431.761970] alloc_pages_current+0x107/0x210 [ 431.766399] ? alloc_pages_current+0x10f/0x210 [ 431.771000] push_pipe+0x3fc/0x7a0 [ 431.774570] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 431.779520] ? _raw_spin_unlock_irq+0x28/0x90 [ 431.784031] ? lockdep_hardirqs_on+0x415/0x5d0 [ 431.788665] ? iov_iter_revert+0xaa0/0xaa0 [ 431.792935] ? trace_hardirqs_off_caller+0x300/0x300 [ 431.792952] ? do_raw_spin_trylock+0x270/0x270 [ 431.792976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 431.792997] ? _raw_spin_unlock_irq+0x5e/0x90 [ 431.793015] ? finish_task_switch+0x1e9/0xac0 [ 431.793042] ? finish_task_switch+0x1a8/0xac0 [ 431.793055] ? __switch_to_asm+0x34/0x70 [ 431.793099] ? __switch_to_asm+0x40/0x70 [ 431.802807] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 431.834934] ? iov_iter_pipe+0xba/0x2f0 [ 431.838936] default_file_splice_read+0x1b1/0xac0 [ 431.843791] ? __switch_to_asm+0x34/0x70 20:49:13 executing program 2: kexec_load(0x1, 0xfffffffffffffda7, 0x0, 0x0) [ 431.847859] ? __switch_to_asm+0x40/0x70 [ 431.851928] ? __switch_to_asm+0x34/0x70 [ 431.856030] ? __schedule+0x89f/0x1e90 [ 431.859938] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 431.865239] ? iter_file_splice_write+0xfc0/0xfc0 [ 431.870101] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 431.874874] ? lockdep_hardirqs_on+0x415/0x5d0 [ 431.879471] ? retint_kernel+0x2d/0x2d [ 431.883392] ? trace_hardirqs_on_caller+0xc0/0x310 [ 431.888351] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 431.893817] ? retint_kernel+0x1b/0x2d 20:49:13 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8000, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000001040)) read$FUSE(r0, &(0x7f0000000040), 0x1000) kexec_load(0x0, 0x0, 0x0, 0x0) [ 431.897718] ? trace_hardirqs_on_caller+0x310/0x310 [ 431.902761] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 431.907543] ? retint_kernel+0x2d/0x2d [ 431.911464] ? security_file_permission+0x94/0x320 [ 431.916415] ? security_file_permission+0x9e/0x320 [ 431.921405] ? rw_verify_area+0x118/0x360 [ 431.925588] ? iter_file_splice_write+0xfc0/0xfc0 [ 431.930456] do_splice_to+0x12a/0x190 [ 431.934276] splice_direct_to_actor+0x31b/0x9d0 [ 431.938992] ? generic_pipe_buf_nosteal+0x10/0x10 [ 431.943861] ? do_splice_to+0x190/0x190 [ 431.947854] ? rw_verify_area+0x118/0x360 [ 431.952035] do_splice_direct+0x2c7/0x420 [ 431.956209] ? splice_direct_to_actor+0x9d0/0x9d0 [ 431.961079] ? rw_verify_area+0x118/0x360 [ 431.965248] do_sendfile+0x61a/0xe60 [ 431.968991] ? do_compat_pwritev64+0x1c0/0x1c0 [ 431.973653] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 431.979260] ? _copy_from_user+0xdd/0x150 [ 431.983461] __x64_sys_sendfile64+0x15a/0x240 [ 431.987983] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 431.992594] ? trace_hardirqs_on_thunk+0x1a/0x1c 20:49:13 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) syz_open_procfs(r1, &(0x7f0000000080)='cpuset\x00') setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ipddp0\x00', 0x10) [ 431.997392] do_syscall_64+0x1a3/0x800 [ 432.001300] ? syscall_return_slowpath+0x5f0/0x5f0 [ 432.006262] ? prepare_exit_to_usermode+0x232/0x3b0 [ 432.011299] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 432.016178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.021388] RIP: 0033:0x457ec9 [ 432.024601] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:49:13 executing program 2: kexec_load(0x0, 0xda, 0x0, 0x0) pipe(&(0x7f0000000180)) stat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000040)={0x5, 0x3, 0xc5, 0x2, 0xfffffffffffffc01}) [ 432.043513] RSP: 002b:00007f9612c5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 432.051236] RAX: ffffffffffffffda RBX: 00007f9612c5ec90 RCX: 0000000000457ec9 [ 432.058513] RDX: 00000000200000c0 RSI: 0000000000000006 RDI: 0000000000000005 [ 432.065794] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 432.073074] R10: 00000000effffdef R11: 0000000000000246 R12: 00007f9612c5f6d4 [ 432.080384] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 0000000000000008 [ 432.131181] hfs: unable to parse mount options 20:49:13 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:13 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000002c0)={0xffffffffffffd270}, 0x4) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/65) ftruncate(r3, 0x1000000) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x0, 0x101) sendfile(r1, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffff9c, 0xc0505510, &(0x7f0000000400)={0x5, 0x4, 0x7009, 0x4, &(0x7f0000000300)=[{}, {}, {}, {}]}) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f0000000040)=@generic={0x0, 0x9, 0x81}) getgroups(0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)=0x0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x4, 0x5fc, 0x0, 0x0, 0x0, 0x40, 0x20, 0x1, 0x5, 0x6a7, 0x2, 0x5, 0xd0, 0x4, 0x1ff, 0x101, 0x7b3, 0x9, 0x351f, 0x7, 0x0, 0x87, 0x5, 0x1ff, 0x9, 0x7fffffff, 0xfe00000000000000, 0x80000000, 0x5, 0x40, 0x80000001, 0x9, 0x101, 0x2, 0x100, 0x6, 0x0, 0xfffffffffffff001, 0x2, @perf_config_ext={0x2064, 0x7}, 0x0, 0x38c0, 0x100000000, 0x8, 0x400, 0x8000, 0x8000}, r5, 0xe, 0xffffffffffffff9c, 0x0) 20:49:13 executing program 3 (fault-call:7 fault-nth:2): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000040)={[{0x2, 0xfffffffffffffeff, 0x7, 0x40, 0x7, 0x0, 0x3, 0x7ff, 0x6, 0x40, 0x7ff, 0x8000, 0x1}, {0x7f, 0x7fffffff, 0xe6f, 0xf46, 0xc0, 0x3, 0xfffffffffffffffe, 0x1, 0x10000, 0x3, 0x0, 0x9, 0xfffffffffffff800}, {0x8, 0x8001, 0xfffffffffffffff8, 0x5, 0x2, 0xfffffffffffffff6, 0x9, 0x80000000, 0x0, 0x5, 0x8, 0x7, 0x5}], 0x6}) ioctl(r0, 0x1000008913, &(0x7f00000004c0)="0a624470ced639000335a3455e994b4e968e9efa8b3eb84692e214e1daa26c6ce4133d8300c41690e35a4f11ab73cbac12873942c5b01a3a45606de7ad8973017fd14f70d7394739af617178043599add91ce93c42c85786cf1b1e42b14b6680780e2791e4f7ec044152de6aa02d0bc5fe6cf9109b9cf094f008ad33b60ed7f61d1ecceedce65650ad046c20c1d9244eb535eb50113b6bb296d7115a2a4cfbe9184c3c89cf53836e507ac1e82a19c2f0cb3aa88757cd1ead9448d13605d8ae837ae80fdf9b205bda637cf8847bb329000000000000") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x201, 0x0) fstat(r1, &(0x7f0000000340)) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) accept4(r0, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000240)=0x80, 0x80800) 20:49:13 executing program 2: kexec_load(0x0, 0xfffffffffffffe64, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x640580, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x88042, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)=0x0) r4 = socket$bt_cmtp(0x1f, 0x3, 0x5) r5 = fcntl$getown(0xffffffffffffff9c, 0x9) r6 = socket$inet(0x2, 0x6, 0x5) sendmsg$nl_generic(r0, &(0x7f00000017c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001780)={&(0x7f0000001900)=ANY=[@ANYBLOB="14150000210001002cbd7000fbdbdf251b0000000c002900000800000000000008002900", @ANYRES32=r1, @ANYBLOB="08005c00000000034c2d7e00451f61f12f5be0e9ae11c390bb4af98520124a02d19f5fc3c571de5108008600", @ANYRES32=r2, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="080067005e0000002b36cf64eec907b619c1c9353ae325dc4f93d406491301ebd5e5cdb72a510a0a1fa835366156b93872b45395fc47dd2fb09684d9edb1ed169fcb1b0f7738f5ceb55129a09d905e08004a00", @ANYRES32=r4, @ANYBLOB="87d010350008005200", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="0400050004005900"], 0x1514}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000004) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f0000000180)={0x8, 0x6}) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400000, 0x0) bind$netrom(r7, &(0x7f0000000040)={{0x3, @default, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0xfffffffffffffe3d) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000280)=0x60b746f65e973dba, 0x4) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) setsockopt$IP_VS_SO_SET_FLUSH(r6, 0x0, 0x485, 0x0, 0x0) [ 432.327290] FAULT_INJECTION: forcing a failure. [ 432.327290] name failslab, interval 1, probability 0, space 0, times 0 [ 432.434958] CPU: 1 PID: 20058 Comm: syz-executor3 Not tainted 4.20.0+ #1 [ 432.441849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.451213] Call Trace: [ 432.453823] dump_stack+0x1db/0x2d0 [ 432.457481] ? dump_stack_print_info.cold+0x20/0x20 [ 432.462517] ? print_usage_bug+0xd0/0xd0 [ 432.465119] hfs: unable to parse mount options [ 432.466598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.466621] ? check_preemption_disabled+0x48/0x290 [ 432.466647] should_fail.cold+0xa/0x15 [ 432.466671] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 432.466700] ? ___might_sleep+0x1e7/0x310 [ 432.466718] ? arch_local_save_flags+0x50/0x50 [ 432.499530] ? mark_held_locks+0x100/0x100 [ 432.503785] __should_failslab+0x121/0x190 [ 432.508571] should_failslab+0x9/0x14 [ 432.512411] kmem_cache_alloc_node_trace+0x270/0x720 [ 432.517529] ? debug_smp_processor_id+0x1c/0x20 [ 432.522228] ? perf_trace_lock+0x12f/0x750 [ 432.526473] ? perf_trace_lock_acquire+0x138/0x7d0 [ 432.531422] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 432.536722] __kmalloc_node+0x3d/0x70 [ 432.540541] kvmalloc_node+0x68/0x100 [ 432.544375] iov_iter_get_pages_alloc+0x87f/0x15a0 [ 432.549367] ? aa_file_perm+0x42e/0x1090 [ 432.553445] ? find_held_lock+0x35/0x120 [ 432.557555] ? iov_iter_revert+0xaa0/0xaa0 [ 432.561815] ? lock_downgrade+0x910/0x910 [ 432.566000] ? kasan_check_read+0x11/0x20 [ 432.570195] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 432.575492] ? rcu_read_unlock_special+0x380/0x380 [ 432.580450] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 432.585476] ? iov_iter_pipe+0xba/0x2f0 [ 432.589478] default_file_splice_read+0x1b1/0xac0 [ 432.594351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.599926] ? aa_path_link+0x5d0/0x5d0 [ 432.603923] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 432.609220] ? iter_file_splice_write+0xfc0/0xfc0 [ 432.614089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.619656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.625203] ? check_preemption_disabled+0x48/0x290 [ 432.630243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.635792] ? fsnotify+0x4f5/0xed0 [ 432.639456] ? debug_mutex_init+0x2d/0x60 [ 432.643660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.649211] ? __fsnotify_parent+0xe2/0x450 [ 432.653551] ? fsnotify_first_mark+0x350/0x350 [ 432.658152] ? apparmor_path_rmdir+0x30/0x30 [ 432.662583] ? alloc_pipe_info+0x286/0x580 [ 432.666845] ? security_file_permission+0x94/0x320 [ 432.671805] ? rw_verify_area+0x118/0x360 [ 432.675971] ? iter_file_splice_write+0xfc0/0xfc0 [ 432.680833] do_splice_to+0x12a/0x190 [ 432.684666] splice_direct_to_actor+0x31b/0x9d0 [ 432.689362] ? generic_pipe_buf_nosteal+0x10/0x10 [ 432.694232] ? do_splice_to+0x190/0x190 [ 432.698210] ? rw_verify_area+0x118/0x360 [ 432.702387] do_splice_direct+0x2c7/0x420 [ 432.706560] ? splice_direct_to_actor+0x9d0/0x9d0 [ 432.711437] ? rw_verify_area+0x118/0x360 [ 432.715611] do_sendfile+0x61a/0xe60 [ 432.719372] ? do_compat_pwritev64+0x1c0/0x1c0 [ 432.723980] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 432.729548] ? _copy_from_user+0xdd/0x150 [ 432.733724] __x64_sys_sendfile64+0x15a/0x240 [ 432.738234] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 432.742838] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 432.747623] do_syscall_64+0x1a3/0x800 [ 432.751527] ? syscall_return_slowpath+0x5f0/0x5f0 [ 432.756474] ? prepare_exit_to_usermode+0x232/0x3b0 [ 432.761516] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 432.766388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.771590] RIP: 0033:0x457ec9 [ 432.774796] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 432.793708] RSP: 002b:00007f3525ccfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 432.801433] RAX: ffffffffffffffda RBX: 00007f3525ccfc90 RCX: 0000000000457ec9 [ 432.808716] RDX: 00000000200000c0 RSI: 0000000000000004 RDI: 0000000000000003 [ 432.815993] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 432.823269] R10: 00000000effffdef R11: 0000000000000246 R12: 00007f3525cd06d4 20:49:14 executing program 1: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000380)={0x9, @pix={0x0, 0x0, 0x31364d59}}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4002, 0x2) write$9p(r1, &(0x7f0000000040)="9a7d2f0868d2efa7d1b1f1028ddcf6ac3127aa395dbc3e9b014c3044c7b6", 0x1e) [ 432.830546] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 0000000000000005 20:49:14 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x28040, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000080)={0xa0, 0xfffffffffffffff5, 0x2, [{0x2, 0x6f55, 0x0, 0x9}, {0x0, 0x53, 0x0, 0x9}, {0x2, 0x1e2, 0x0, 0x6}, {0x5, 0x5, 0x5, 0xffffffff7fffffff, 'ppp1{'}, {0x1, 0xffffffffffffffff, 0xb, 0xef, 'selinux*GPL'}]}, 0xa0) mkdir(&(0x7f0000000000)='./file0\x00', 0x8) [ 432.904187] hfs: unable to parse mount options 20:49:14 executing program 3 (fault-call:7 fault-nth:3): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:14 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000100)='/dev/vbi#\x00', 0x7) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:14 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="230000005e0081aee4040c9eb50000000000000000000100", 0x18}], 0x1d, 0x0, 0x1ec}, 0x4044800) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x90300, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x117}}, 0x20) r3 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x140000000000, 0x10000) ioctl$VIDIOC_G_FBUF(r3, 0x8030560a, &(0x7f0000000380)={0x8, 0x6, &(0x7f0000000300)="e3412ceb101399be10409db6f296cbf74eeb41ceabbe39d858477c5447df1259a890da7537861880b2df46d44e144c46b6f3bcd428807e514181913a12a0beb023526827e50ccc4e7923dc8adc1a166d336bc5", {0xfaa, 0x1d, 0x59565955, 0xf, 0x4, 0x80, 0xc, 0xaee0}}) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r2, 0x1, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0xffffffff, @remote, 0x6}, @ib={0x1b, 0x4, 0xdcf2, {"ff5c2585b929ac6fa74a5d8c08be787f"}, 0x100, 0x7, 0x9a3d}}}, 0x118) connect$caif(r3, &(0x7f00000003c0)=@dgm={0x25, 0x7fff, 0x4}, 0x18) recvmsg(r0, &(0x7f0000006080)={0x0, 0x0, &(0x7f0000005f40)=[{&(0x7f0000004d00)=""/105, 0x393}, {&(0x7f0000004d80)=""/142, 0x8e}, {&(0x7f0000004e40)=""/4096, 0x1000}], 0x3}, 0x0) 20:49:14 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:14 executing program 2: [ 433.109700] FAULT_INJECTION: forcing a failure. [ 433.109700] name fail_page_alloc, interval 1, probability 0, space 0, times 0 20:49:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10500, 0xeffffdef) close(r0) [ 433.195876] CPU: 0 PID: 20102 Comm: syz-executor3 Not tainted 4.20.0+ #1 [ 433.202795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.212168] Call Trace: [ 433.214777] dump_stack+0x1db/0x2d0 [ 433.218457] ? dump_stack_print_info.cold+0x20/0x20 [ 433.223497] ? is_bpf_text_address+0xd3/0x170 [ 433.228023] should_fail.cold+0xa/0x15 [ 433.231929] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 433.237054] ? arch_local_save_flags+0x50/0x50 [ 433.241669] ? lock_release+0xc40/0xc40 20:49:14 executing program 2: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="98001000", @ANYRES16=r0, @ANYBLOB="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"], 0x98}, 0x1, 0x0, 0x0, 0x81}, 0x10) prctl$PR_GET_SECCOMP(0x15) ioctl$VIDIOC_G_JPEGCOMP(0xffffffffffffffff, 0x808c563d, &(0x7f0000000200)) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x3) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) kexec_load(0x0, 0x117, 0x0, 0x4000000000000000) [ 433.245774] should_fail_alloc_page+0x50/0x60 [ 433.250292] __alloc_pages_nodemask+0x323/0xdc0 [ 433.254981] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 433.260034] ? __kmalloc_node+0x3d/0x70 [ 433.264039] ? rcu_read_lock_sched_held+0x110/0x130 [ 433.269071] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 433.274630] alloc_pages_current+0x107/0x210 [ 433.279059] push_pipe+0x3fc/0x7a0 [ 433.282640] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 433.287586] ? aa_file_perm+0x42e/0x1090 [ 433.287605] ? find_held_lock+0x35/0x120 [ 433.287630] ? iov_iter_revert+0xaa0/0xaa0 [ 433.287651] ? lock_downgrade+0x910/0x910 [ 433.287669] ? kasan_check_read+0x11/0x20 [ 433.295807] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 433.295827] ? rcu_read_unlock_special+0x380/0x380 [ 433.295866] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 433.295881] ? iov_iter_pipe+0xba/0x2f0 [ 433.295922] default_file_splice_read+0x1b1/0xac0 [ 433.312570] hfs: unable to parse mount options [ 433.313701] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.313726] ? aa_path_link+0x5d0/0x5d0 [ 433.313745] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 433.313779] ? iter_file_splice_write+0xfc0/0xfc0 [ 433.323718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.332547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.332565] ? check_preemption_disabled+0x48/0x290 [ 433.332595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.378395] ? fsnotify+0x4f5/0xed0 [ 433.382054] ? debug_mutex_init+0x2d/0x60 [ 433.386270] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.391825] ? __fsnotify_parent+0xe2/0x450 20:49:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10002, 0xeffffdef) close(r0) [ 433.396175] ? fsnotify_first_mark+0x350/0x350 [ 433.400789] ? apparmor_path_rmdir+0x30/0x30 [ 433.405241] ? alloc_pipe_info+0x286/0x580 [ 433.409514] ? security_file_permission+0x94/0x320 [ 433.414469] ? rw_verify_area+0x118/0x360 [ 433.418632] ? iter_file_splice_write+0xfc0/0xfc0 [ 433.423495] do_splice_to+0x12a/0x190 [ 433.427322] splice_direct_to_actor+0x31b/0x9d0 [ 433.432027] ? generic_pipe_buf_nosteal+0x10/0x10 [ 433.436898] ? do_splice_to+0x190/0x190 [ 433.440910] ? rw_verify_area+0x118/0x360 [ 433.445080] do_splice_direct+0x2c7/0x420 [ 433.449263] ? splice_direct_to_actor+0x9d0/0x9d0 [ 433.454144] ? rw_verify_area+0x118/0x360 [ 433.458321] do_sendfile+0x61a/0xe60 [ 433.462114] ? do_compat_pwritev64+0x1c0/0x1c0 [ 433.466758] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 433.472314] ? _copy_from_user+0xdd/0x150 [ 433.476504] __x64_sys_sendfile64+0x15a/0x240 [ 433.481027] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 433.485644] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 433.490426] do_syscall_64+0x1a3/0x800 20:49:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10004, 0xeffffdef) close(r0) [ 433.494367] ? syscall_return_slowpath+0x5f0/0x5f0 [ 433.499314] ? prepare_exit_to_usermode+0x232/0x3b0 [ 433.504427] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.509330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.514577] RIP: 0033:0x457ec9 [ 433.517780] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 433.536692] RSP: 002b:00007f3525ccfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 433.544413] RAX: ffffffffffffffda RBX: 00007f3525ccfc90 RCX: 0000000000457ec9 [ 433.551729] RDX: 00000000200000c0 RSI: 0000000000000004 RDI: 0000000000000003 [ 433.559032] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 433.566311] R10: 00000000effffdef R11: 0000000000000246 R12: 00007f3525cd06d4 [ 433.573614] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 0000000000000005 20:49:15 executing program 3 (fault-call:7 fault-nth:4): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10003, 0xeffffdef) close(r0) 20:49:15 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x98b8, 0x5, &(0x7f0000000340)=[{&(0x7f0000000080)="bc08a69e714ea71eb3dc2bbcdaef55436957845cf0590793b28179dc13ab5556af095240b5fcbdab34e5cfeab5988b5224464451f4769f32d614ad697b95f04421a4fcae5394e014f549", 0x4a, 0x101}, {&(0x7f0000000100)="72af72dd49bbcd816e3d5b4902615cd34d7ad48ec06149b42db7d8b33864b1000b51e72d217765d8116698e74fa9f76f987c1973c8de02097366cd1f34e1093bfab5ac16c2e5ee1888e7abf2c2636e697c52df78d8ae0174bb9ca2f5f6ea31e6ee", 0x61}, {&(0x7f0000000180)="337247d6e87181dc066a05", 0xb, 0x9}, {&(0x7f00000001c0)="265de531eec2c0e8bd4111f1a4c76671c1cd4d7041867e6aecd59c049de850898975fb6eaeac0e0146cf4bafb221fc06e90451c0411d2e6d9a925f3383d607b3eca2c911047726ff5995f68efb7eb14085305ca9884114ce510a9b20124b5678ccff07d7c991c87ab610e780a4f00869788e055f43a08bd5e1901f3e79cc396c04d9e65513a4ea3d66851779d281c76c519db655ba22ed695c8634244d3eceaba2", 0xa1, 0x9}, {&(0x7f0000000280)="1612b896542fb0471508c8240082564eb349ff2c41f9da70c612075c9118814adda23337f267677db94892de28b67c494507ccc929dc8654aae93316248595b653d1ae22bbf39d2ffcfaca81d2d3b12ab505466bdcd00d15257d3d2cee2600016e60cc14dcee8431dbc13061d1950db1e9d8502f16508b9fe8f24088c0d696f85a21865babd04e9f6a", 0x89, 0xa5c}], 0xd, &(0x7f0000000500)={[{@whint_mode_user='whint_mode=user-based'}, {@four_active_logs='active_logs=4'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@euid_gt={'euid>', r0}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 433.646942] hfs: unable to parse mount options 20:49:15 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 433.771725] FAULT_INJECTION: forcing a failure. [ 433.771725] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 433.820623] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 433.836746] CPU: 1 PID: 20140 Comm: syz-executor3 Not tainted 4.20.0+ #1 [ 433.843605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.852960] Call Trace: [ 433.855573] dump_stack+0x1db/0x2d0 [ 433.859233] ? dump_stack_print_info.cold+0x20/0x20 [ 433.864263] ? is_bpf_text_address+0xd3/0x170 [ 433.868784] should_fail.cold+0xa/0x15 [ 433.872692] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 433.877823] ? arch_local_save_flags+0x50/0x50 [ 433.882424] ? lock_release+0xc40/0xc40 [ 433.886414] ? rcu_pm_notify+0xd0/0xd0 [ 433.890351] should_fail_alloc_page+0x50/0x60 [ 433.894869] __alloc_pages_nodemask+0x323/0xdc0 [ 433.899560] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 433.904601] ? __kmalloc_node+0x3d/0x70 [ 433.908592] ? rcu_read_lock_sched_held+0x110/0x130 [ 433.913629] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 433.919169] alloc_pages_current+0x107/0x210 [ 433.923587] push_pipe+0x3fc/0x7a0 [ 433.926939] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 433.927150] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 433.939510] ? aa_file_perm+0x42e/0x1090 [ 433.943589] ? find_held_lock+0x35/0x120 [ 433.947688] ? iov_iter_revert+0xaa0/0xaa0 [ 433.951116] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 433.951933] ? lock_downgrade+0x910/0x910 [ 433.951948] ? kasan_check_read+0x11/0x20 [ 433.951966] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 433.951985] ? rcu_read_unlock_special+0x380/0x380 [ 433.952011] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 433.952027] ? iov_iter_pipe+0xba/0x2f0 [ 433.952055] default_file_splice_read+0x1b1/0xac0 [ 433.952074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.952097] ? aa_path_link+0x5d0/0x5d0 [ 433.952116] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 433.952136] ? iter_file_splice_write+0xfc0/0xfc0 [ 433.961654] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 433.963303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.963322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.963350] ? check_preemption_disabled+0x48/0x290 [ 433.963380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.963397] ? fsnotify+0x4f5/0xed0 [ 433.972860] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 433.977733] ? debug_mutex_init+0x2d/0x60 [ 433.977760] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.977776] ? __fsnotify_parent+0xe2/0x450 [ 433.977796] ? fsnotify_first_mark+0x350/0x350 [ 433.977813] ? apparmor_path_rmdir+0x30/0x30 [ 434.005450] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 434.006390] ? alloc_pipe_info+0x286/0x580 [ 434.006424] ? security_file_permission+0x94/0x320 [ 434.006447] ? rw_verify_area+0x118/0x360 [ 434.016640] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 434.018724] ? iter_file_splice_write+0xfc0/0xfc0 [ 434.018748] do_splice_to+0x12a/0x190 [ 434.018773] splice_direct_to_actor+0x31b/0x9d0 [ 434.018795] ? generic_pipe_buf_nosteal+0x10/0x10 [ 434.018822] ? do_splice_to+0x190/0x190 [ 434.030196] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 434.034926] ? rw_verify_area+0x118/0x360 [ 434.034952] do_splice_direct+0x2c7/0x420 [ 434.034978] ? splice_direct_to_actor+0x9d0/0x9d0 [ 434.035009] ? rw_verify_area+0x118/0x360 [ 434.035030] do_sendfile+0x61a/0xe60 [ 434.035063] ? do_compat_pwritev64+0x1c0/0x1c0 [ 434.035092] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 434.035110] ? _copy_from_user+0xdd/0x150 [ 434.166541] __x64_sys_sendfile64+0x15a/0x240 [ 434.171049] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 434.175641] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 434.180417] do_syscall_64+0x1a3/0x800 [ 434.184314] ? syscall_return_slowpath+0x5f0/0x5f0 [ 434.189263] ? prepare_exit_to_usermode+0x232/0x3b0 [ 434.194294] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 434.199181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.204383] RIP: 0033:0x457ec9 [ 434.207603] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 434.226531] RSP: 002b:00007f3525ccfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 434.234243] RAX: ffffffffffffffda RBX: 00007f3525ccfc90 RCX: 0000000000457ec9 [ 434.241516] RDX: 00000000200000c0 RSI: 0000000000000004 RDI: 0000000000000003 [ 434.248789] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 434.256072] R10: 00000000effffdef R11: 0000000000000246 R12: 00007f3525cd06d4 [ 434.263352] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 0000000000000005 [ 434.323472] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 434.356246] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 20:49:15 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000004, 0x13, r0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf1000d, 0xeffffdef) close(r0) 20:49:15 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000240)={'syz'}, &(0x7f0000000300)='\a', 0x1, 0xfffffffffffffffe) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x94102, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000540)={{0x0, 0x3, 0x9, 0x1, 0x9}, 0x6, 0x4, 0x56, 0xf4, 0x10001, "36da46623f4403ac2260f5cfea6fd202c5cb67cff5ba319519b6e3299cff6f82758bdda100f3d836b92fc10e77b93cbd4a9d9dbee4bde6fa27c34f96b5baa8ff5443a2011d4c9d9543fa7d792af469d1acf0584b9760bac1c051607f13b0204f5c2e151b35696d42ede657ee759e3e20f48d7cdfa7f264e09ded3514947f6bf0"}) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000200)={0x401, 0x3, 0xffffffff7fffffff, 0x4, 0xec, 0x7f, 0x4}) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000480)="3894e0aa755678642797c675ec97969c56f2bf12f6039bb83db491604e9211ccc8408e7618ea37393e03de7717926ee49759d8a25fe0ee491d33465a996e601cab82e84deffd4f43b4b8de7c4fc0f12375966fce546ed08ab352a291b7f16898f20eb89ab513fe62e97796f94ae97e59c92f1eb86a95087d0372707700c803790f74e808663977e98054589d308059a63b0534d429abbad8c75335c1bcd5f596b4ef809be3492bf40907de6a8cedbb24290c9e878204418bbe903f3ced734530", 0xc0, 0xfffffffffffffffd) r3 = semget(0x2, 0x4, 0x424) semctl$SETVAL(r3, 0x0, 0x10, &(0x7f00000002c0)=0xffffffffffffffc1) keyctl$dh_compute(0x17, &(0x7f0000000180)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffff5, &(0x7f0000000340)={&(0x7f0000000040)={'crc32c-intel\x00\x00\x00\x00\x00\x00\x00 \x00\x01\xc0\x00'}}) [ 434.367490] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 434.406190] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 434.425778] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 434.433439] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 434.489751] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 434.509716] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock 20:49:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="0adc1f023c123f3188a070") r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) stat(0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = creat(&(0x7f0000000200)='./file0/f.le.\x00', 0x0) r3 = open(&(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) ioctl$BLKPBSZGET(r3, 0x127b, &(0x7f0000000240)) renameat(0xffffffffffffffff, 0x0, r3, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000000)={0x0, 0x1, 0x0, [], 0x0}) 20:49:16 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 20:49:16 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) getpeername$tipc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:16 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x01', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:16 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:16 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x30000, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000100)={0x1, 0x85, &(0x7f0000000040)="c7614b09f143b1d354c1d60bd6a92112461329811cdeff1137f993255bacb566c8f92039befbe1a24becbb036c5c4c1a1977218925c8f768a7d6e91e916a0eb5af25f8964026733d68a7ac08a1c4aa048e9a93c60413883b06852688b506bd8091f91455179c86dcd993a7d594adfbd5d3ba01d2a11bdd57d274b85cbe1cecd6a80799c9df"}) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000240)) accept4$rose(r0, &(0x7f0000000180)=@short={0xb, @dev, @remote, 0x1, @default}, &(0x7f00000001c0)=0x1c, 0x80800) [ 434.855781] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000203) [ 434.874487] FAT-fs (loop1): Filesystem has been set read-only 20:49:16 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) lstat(0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000280)="9a865201943f7d30e6eaa0071200431853f4929ad20cf2b5c310a6e525017c2a8a6f18a29a2dfdfaf0ac85dfdbd7e72447d6f6dea5ae4bab6eececc7e845ef4bb29d1b48bfeee60bfeaa8697ab3932de67f6e6ddddd58019637924581b8c8ea6a5c18df6ea600493cbf7fedff432594cc48c4f9f5ba68549c30eaba02a510cd9ddd245e8445c6bd448fc6a64613298d4086d3271554c4a78", 0x98) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000180)=0xe8) socket$inet_udp(0x2, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:49:16 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(r0, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000080)=0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r3, 0x7, 0xde75, 0x5, 0x3, 0x3f}, 0x14) ftruncate(r2, 0xd800) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:16 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)=0x7) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e24, 0x20, @dev={0xfe, 0x80, [], 0x1e}, 0xfff}}, 0xffffffff, 0x80000001, 0xb20, 0x1000}, &(0x7f0000000400)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e21, @local}}, 0x9, 0x6, 0xffff, 0x81, 0x3}, &(0x7f00000006c0)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000002980)={0x0, 0xb6, 0xb1e7}, &(0x7f00000029c0)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000002a00)={0x0, 0x7f}, &(0x7f0000002a40)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000002c40)={0x0, 0x200, 0xffffffffffffffff}, &(0x7f0000002c80)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000002cc0)={0x0, @in6={{0xa, 0x4e24, 0x1ff, @mcast1}}, 0xe5, 0xffff, 0x2, 0x7fff}, &(0x7f0000002d80)=0x98) sendmmsg$inet_sctp(r0, &(0x7f0000002ec0)=[{&(0x7f00000000c0)=@in6={0xa, 0x4e22, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000100)="2462847ff89174d74aa57c86935456339171bb8fbba54c021945067135e142eef878bf21599a625f1c57a045be2f14fea5571a65277c04f04d3937d679d530c8ebdb19bae41f822a67d032da0b8adbbdde5cd2fc572a08b51ca0471e50ace47e", 0x60}, {&(0x7f0000000180)="7dee2a52776b13a95ba7e227c701a4c224e194c7f1d763a11ab59d16ed37366c80437056a240547d5136957dc13f541d07b413bb6f43877c15d1f63aa90816a5a710439217f26a1c393bedc55d283992aef7064b87d8a1c759cfb59a1c9ea1b48ee063ce29e33ac1f765490358bbf5eb35326a8658e2b1de", 0x78}, {&(0x7f0000000200)="f1204f779f6ee3b7c3637812a52d95a09633c19a28f83a3ffee8f6794b666f3d99e1b90279a90e2a39abc283ca1277411c58a20bb2724426fd2acb452f6f0fb25f3d56f57d329c77bd3d1a4bcdeba65f656bfb79fd8783a5a354a2ce2bf407943aeaa7c66a607951fd20cf4d4a6fd00dfa8c75a042e2b40458402649727ec7c68d47192a76eb7378b32d7d1409eff439cb76e87d7b27a3e7c0929dde50110354eac98caba951bf755acc04609ea79fdb25cbf3f4b7fd7957c66e3ec63057e5dd6b126f3b29f1c1b5e55c8b20de4e8a8953f9c6f5ec4dafaa0d72895caa97e349a6d8422464aa2ca3d6e25fc97ade1b12", 0xf0}], 0x3, &(0x7f0000000440)=[@init={0x18, 0x84, 0x0, {0xb85c, 0xfffffffffffffc01, 0x3ff, 0xffffffff}}, @init={0x18, 0x84, 0x0, {0x0, 0x7fff, 0x7, 0x1}}, @init={0x18, 0x84, 0x0, {0x97, 0x4, 0x101, 0x8}}, @dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0xf}}, @sndinfo={0x20, 0x84, 0x2, {0x3, 0x202, 0x1, 0x2, r1}}], 0x80, 0x20000050}, {&(0x7f00000004c0)=@in6={0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xff}, 0x1c, &(0x7f00000005c0)=[{&(0x7f0000000500)="af9b1dfb822e3e71a13ce1c09a", 0xd}, {&(0x7f0000000540)="37811bca6b02fdd33f2efb6f08c2bf3e72db770221788532b852790b10a77c0549463ef495ad4600e3307c31ff3ad3df7aa20084d113c903cab34ec3eccee212f7", 0x41}], 0x2, &(0x7f0000000700)=[@sndrcv={0x30, 0x84, 0x1, {0x9, 0x9b, 0x2, 0x5, 0x2000000000000000, 0x57, 0x6, 0x7ff, r2}}, @authinfo={0x18, 0x84, 0x6, {0xfffffffffffffc00}}, @authinfo={0x18, 0x84, 0x6, {0x6}}, @init={0x18, 0x84, 0x0, {0x401, 0x5, 0x400, 0x1000}}], 0x78, 0x8b60a71a7b32a18}, {&(0x7f0000000780)=@in={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002940)=[{&(0x7f00000007c0)="4ffe9518406f2c9e35a3233cec2f227b6559e8ab16322aa37b02fb568b068a21cae435f54fab0726765c1ab1e9f064a0763ba877b1f068036e07b473e52dabf9cff7e81707c23468c6e6f03f3a6615c23894be57d544bba764d49d53265609bb99c09a0ee5a7820ca1fdf22f8addf3f9c6f30fdafa5aaf90b9d55b090c03b83f45dde60c2c34bc0e11edb579cd8c611c34052d98751ff2e3a25fb8543da17898fdc0bee16c27aed92f993282fa51431b7dc28e49a68c4ca99c08b35aea734dc0c1bcce9a9cd2bff8471a581349f8a90aa9fce51bdb4253add60d27d523a6a41178c34e79b3fd3c8fa48ef93184dd245ed5e3179e2667563c9739d563cc4fdb6ffda97f18dcf0727d72a2d28cafdde06c76b88bfa186e47ba14c1003d3ae5a407c5a8955d27942d3493f020f5c74ac1e6ee53bd0354f7a94895954b13d124648d7c19214c47b7c386fe8ebf892d17be6c759c6a6d9d45936c9089d498de10291b09167ffc7ae484d3faf4f54365f623cd2241c5d645fe2453b0b2a400df26faef7bf431817b363b702b03449d418d1e82aa48dbb94c5b2f2b16d4acf4eca804633dac8b6051c898fdf44adcbd9e83df6d2dab07bfc49ca3e0d8696c12fc9c51c8ec918c911459db0f956aebc55174d3cf1cac0bb4cc2090b3e7cbfb97c4bb1f3daee5c86d2a753edb2206e61e2117ce827091b4960c7b28384f2d29bb4670877266a50ceaa5a575d1fb024efceba168d0d37b928a1c8fbcc33d7b8ae7352d3d7be6bc34be8cad3db57d4be88650731e17d406631d37124fc11f3d68b79a4733b6ec7d615fe32ae0c3e2a6c0ec7f3586d6e02502365f2670f6e24fa3f59183c00d6a0ab4abddc9e3c90fb3c6c0c8008b8e75f1c1952ea58700d5f54b814aef18edb1573715824c249bb0ca638ef043c6702b246ce371e33aaa77df7629caed87ed7a935fe27c80c3f6110613e75a026b3cf8fc0361a40c6ffdd2919e0214a73f792dc7b9ec6747a845ddcb99f7eff09518bbfc6b87ebc3ea94e5f174f7c80ab419ac03b937e9882ea2a19c44c82426d75343dc7e3e8c1d59e13ada5b23bf9aafcb432f7221bebb5458d182af230d898c0535f4efb276f14f11daae5d38703961298da2152e5cdb8703de968fd3e0df38e678cbd81001e05a13c2a4200b2df58497da237f171a74a1f44f186eed94bea5089a031c87c63a6777fcb8098c3c5aa4847f603dde27d1a4e298b4db53d372f037c5f605cc1a2484f88b10f100a66c0751370b4fe8295bd91bf0f6eb13cb0cd506416e5a8b0d2c94b931fbde34b355d1438a4c71b49a346a38383768a441885afc8ae501fd280fed537fe69ff2f8831d745377f97e4629e069f1c7d503f9387461baf39efeea8b9b59f881cc781deadf110dec7ee6be26341597298eb585e78d5f6188bc059219b445774e90307128891500ce3dcf06251b4d2c1798f9a69f07dd764aef37bd629b2dc13e94abbf5e527996c186030c5101e47bc574afad43087ed69856e14fed8f6ecfd92d548e001ce7cb403902853fbc7d1aa8c24122fb78f5288fb98c9243acf12178d4b45e1c310caea6eec22d3b0b627a4ab5f42da52b78ff12ea5a6ee495e25e229c118110eed6f4fab5927a57d9024373974274c584dc579a2887fb791df95859ad855affc3c284a2ce3db6edef775ff1e85d6a392bb1688c83d0db0b2a4d87dc2dfa270195c4073e90dec70cd9fd0746a767f284129366140c2823ce29b55f3d481ff2112626b8f109214a0f274b245c10bcbce35a0a3679d0efcaf8d0abf40e5358a20cd507f3c16a3986560fc64c8b36eb32dc6582110330e2dc7523eddeca19aca1e61834a52f37567f66a779f95b36849b55770d76014871c7f6e6e7d5efbd3db9625cb5818fd03f6a7e90310b13a2527a65535fc34a7ec520df21f65775cc82dcd2c7bb249bb07848e79b7e73d19ce13eea2166019d5964b47c4ce611d783252d8fceb91a15414736f5e87378edf57df0b9f666a2cc0ab673d46b9ca6647ec538f85d5fffd7b243fb9c6e6c12c746414400075dc6a12a95771d64eb30697e25b80fbeaa12a56baaa280edc3016330016d18395bbb0d0bab024b04640ef9474ed4fad64a9eb5fd3684fde91aab4b50132cc8186795137d164ddfc858470291c3118d27e556a72e6a24353009e35db294e1fc095fecf4be934974a98fadeb7d2e6f5051b8f90a82760cbcdf14b4b3cd13e41548d328432e21e11abfa0fac5d4536e7a6784faf4e80697fb0b7e1164a5422446c1bd3d3e9563591fc307809b43137a047b542e011a85eb3b2c4d0df06f7221e3b03e0513d26edae4145dbd087c5c409063b82887a065b6b661c8ac85863068350da55271f79035c664b74ca642847d0da0c2a7dbcf90f62f51854569a6a1c1b0ed86efb9644486a88e90e5e67ca45e760cb604b46358d0837fde35e55daccae487bdbdfd00d98f37624ce59e74b1115bef2d55719f8602dc4d47d7a53bbb1358d72de5c63cf8b0a1f7427359d1aa13ef8a9d0a645033033c56284a2f60fbfd3d3f8f71d97809764e82b8e61057da9676c1119e7dd3859f2271b1d5545370b382e3b7cd0632a54436723e52fdd3c0250a3c00c5316578300965e4fc0b829037c9859efdcae3b2ff68a7ff8d65bc484efa4eb47fa8771bb968e50f93b68776f0e0868c575ee3f6fa0e280b17279c10593a18556e3c6a52d5825d0eb8f38c18b1b79edab971f8675b9c9d36b869c23f92c4ea8f3522b1620ec6f770caeef8bcead16d640d26a1ef6f1826a9fb11ec8274886b1221a032ac2b2226026181c8ba8f80dc0d535d1817d41d6a90b5b90a8a3b999da2d3fe4536cf77aada3adb1b656b08c291fa6027135a6e78f4ac566a73b371b8d705970a37951e0e0909ba9b15aa1a4d513e35f9c85068288791c854190abbe75135dd841a8a6411831b1611c4f3cfd27d1eaa29d6d1a3867faa1ca3276a89cc816cca3db6a32e501e89a210ff883d72d2144247b257f962ade78dce931d5eaedc452c3507e72f728a5c3ffa9d45585a3ba93d3bc08f63f792fb10e5f6c641988097dad5efb2d923ddbfe53a8126a10d40999c5e4c6c952258d38c47fb93193b98cea2789063671aaf9a5dabe786548227cdca850a81d2ce770b0e0273c165259b6527ab8d2b9b6533996a840d6624c77126f40e0c90407fe40adede084bf2380595f4c3cece35e616163ce972c0493eef14ca8e7afc332ef6817c5f99720ccb6a6dc9f01e42acf3bd5e52f82b24a1f7a79169dc90df23aef3f0855ff98bb7d15205a28dca4cd0475e6cee741efe9279a54f35b61352ecb0f72290c82320e2fc28eebe302bb21feb5e25e6d7b77f42b7b148a9c2ed589a70c4775a4d24ef13db7d3664764aefae21acdc4788cbd05dee20b6be36ab5669e8589ab41a90140769f8b87cc3dae20114cce74e809979a9f86687ca7f1a25241875da92a55f8c63a2d272fe148f55d2791e63551d7fc418b73963b25477f90a66a71457a6fae2d40901d044e63f7266e2612e9384f25347f27dfa481da69b53a77d5b367bdd477e7a36ae9046e38eed4e38d897f68fbfeaccf2768d5c1e6b6b6c9e7fd97b7c37abd87412c52c9d41f3a3f9e579394a6adf71d8900eb95f366856efcf4ad46cb490b31847c31508b206261075b840ee7968c525b01eba62e7b661fd177779b0b89b344ca3946b858bfcc7ebd33df6342ce273f78816d28b9a2b1397b48f5a8b283819bc4952e1580c66a4797e1270f83f3d641ab2302dc6b21835b27531619287b8af24fd3ad8c01068ed046eac790d60e68488a3e152957d6980bfe98a75eb22452b6530c48123487642a118eb922e9dfe35b615b9b16c88b87f60ab31e93bdd72f4fc6598ba3ca66b94c3e70ef5eb533c0fb23f0b0476a26af9dd7114894a33ecc88957d038d07fbf31666295b8a27f54bf13d20ddcb378b14522c41f9289a8fa829b94ee1ebf86861b07fc2bc101d1bad3a63e98cfad700f6baf07e7ecfaaf907bd6ff3c9be4fb9b9cf05a53573a917c02da0c56cfa64832eb30ee53c18ce1b26d5a1973ed8897cecc783901ea3afaf78b4817320f68b9baf3486733d66940f74ce1c1783414388ee971e9acbb7e2c1fdfaa2625e3c17bbb5a95ffdd0bfcaf109069bc40fa7997fa76a2a1e9505f24005dfe59b44e2aacc05f0f9437d099ef5c0f7347d30d05b468c7a5a5c041f52ddaf7730ff3b2d9bdb83ab9fc660f8241787c6c1b8b04a01aa9655ca834fdba98cc93aaba9b4410a58ec32f78029f09f2bc35c82f03e5e777b736e12cf2ad03f42c524f54d7ea5ef497350bf807f5440521273111e79c3286f2cfa977e29e57a26033e64de86517c9ed2e2f5fa226a3d6dabba3ea25d7421452719a428bd93f42a10d751f1de23738a219f726d6309fb90bb2b06b533a5e94976ac3c8e5e38076aea4e3e7759258f4046d4c51b47e21e5d36b9e0e44cf505c5db3d8c1a17d4149b1d0ddef7ad86b7d8f7db8bbbe196f0ee037276d3c2d96c7a1cbcf4e3fcb85647535408876a3e230f8f78d191b9a08fb594c0193c539d92773ac324d8b6bfc7c63549789195fa731c7007b35004c6a2e469640c6f04cbf406232b9cc6c5e4ec0a6922f9c4852b7b9505cda8d09c6847247f090e5935b5478939232dbf110fff07645d8aa82986350f8761f6ca2ddd0481f928314d6fa32d437394df78b3592433bd83debc35424ea06527bda611d7cca965c997f07240c825db0163e548e79dfe68dfbaeef9b7aac0e30e3aeccd60d2c0a2b654557ed61f66a087c8ddf78aff4781e84bd4807b30fdab92fe25b6e8c7bf94938d2063518de0f0b697713b64fdcb879a936def23f60c80cbbc0ae9b2dd1c488cf198b5fd307197fd80b13f9aaeb10bb447d3de276c8b2d2ba230fccac37d2cf4fb375ff3ab0fd70308f035594ff86a26433a22df2941abc136524f4acf4c8441510be2e97361a39e928f07f79890df1bc66a9b1c77a9af73296d8690e5e50104f6f96c2e9b12ff2fec4dd69eb84d0464a4534be0815d8a32769ac8b005cffea8dacb8884ccc179e1ce0ad980aaa4093a176c7afb8eb0ef135b3060e770bbfa7f3c8f0646ece5062faafd81bb5485d411734c318ca9b458d2918dd5d803614aebdfe94d61331e3ef5dd55ccfca397e5a803c30b5e1f92b75018483237dd11baa306c5a7a8da5df83311181b311ecaedf9621371dfe050c3e6b0c9db68d2a975c63ce0e200692d2624f479aeeddcedf3aa7edfbc298762011a6ae3cb2b2b59ec12698b89b760d33759b9f0790425bdcb6b7c545cdf33f1d49c2e40d253b676a25b0a802f38a4f47f37db5e3663d5ec4a63490e829ab26b3d3f5a841608e59c1355ff9933f7969466a4672625dce83949098c61278f3e2a8bd0c195ee66445d1d1d90f7e0ee57bc10af0b2d4a80763b09673a60b60b914cc93d31d2c18c65141805991c286f01b1ec8bda21255ce1d9eee443c1ba71dbf2a2af004765c8dfd38ee27ab9018905e2d77691a28dc4df67bed593f97f7270ca8025bffb22c18e9cc016f5637638a1932796c8cba1666b9a95995f3c07e6594f85b5d922efd7da849485e9e4643a05cb6237cbf9a169673b8930a536a88cc15c2b5111c1da71ae8fa4480ffda5db9027e9c9f8526eca72bd4227f6f9f6bab50c76258f70e930b3ba41588bdfa5eac024b87c0d59b5d01f4e0145b8e9a4254525c02b42c50103702e694bfbfefbc31c4a68bdf08a1eb4c9f1506b39cdb09082b3c018d553e0f95a052e344", 0x1000}, {&(0x7f00000017c0)="29f053d84c106ff2e5ebe735047c3d71a20037d57015a7819dd0a8c5a632d4a396d34eb6bbc49ca5a1d443fee603428a018a12505f950b21b41e2ded5edaff05594cb228eece6e62e15e438233", 0x4d}, {&(0x7f0000001840)="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", 0x1000}, {&(0x7f0000002840)="6fbc4def737afa0f96ecc0ffb1375aa500ef74b0fd956fbce0ce4802387aa6dcc6aad4006ffae51e38c511e4a328a81b9aab96feb08b97aef61a5cee59337d98676c79181474668d002d8645c1ccffbf48261a44ced7c7ba30232929fba0d3ada10c1859dbbf00f2072287c9f1399e39191f0988525b7cb213e33861183c47dc9fa113d782b80021ef56c26069c2d8f919ffcbe31077a36c12273dc0d3407122b2e76bd5d7eb08b2cd59c96bbc0eb0a0eb566a89caad1b0fb6a5e24d4cb27463e2e58b5b13b4faa41ae022a77918ce9a4e1d39a596bd08ef0969cd34629ba8ed01b9a817a8ca5f9a976be3db0b41b8947ee55f", 0xf3}], 0x4, &(0x7f0000002a80)=[@sndinfo={0x20, 0x84, 0x2, {0x200, 0x200, 0x3, 0x9, r3}}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xc}}}, @init={0x18, 0x84, 0x0, {0x2, 0x4, 0x1, 0x100}}, @sndrcv={0x30, 0x84, 0x1, {0x5, 0x2, 0x2, 0x0, 0x3, 0x8, 0x1, 0x8, r4}}, @authinfo={0x18}, @authinfo={0x18, 0x84, 0x6, {0x2}}, @authinfo={0x18, 0x84, 0x6, {0x8}}, @init={0x18, 0x84, 0x0, {0xff, 0xd1, 0x7}}], 0xe8, 0x10}, {&(0x7f0000002b80)=@in6={0xa, 0x4e21, 0x9c0c, @ipv4={[], [], @empty}, 0x9}, 0x1c, &(0x7f0000002c00)=[{&(0x7f0000002bc0)="2f6cccb1e9b827feb020b599d87ed40b544a2498766210541ac5d87ae97bc59f008871", 0x23}], 0x1, &(0x7f0000002dc0)=[@prinfo={0x18, 0x84, 0x5, {0x10, 0x67e}}, @sndrcv={0x30, 0x84, 0x1, {0x1, 0x200, 0x201, 0x0, 0x2, 0x400, 0x200, 0x80000000, r5}}, @init={0x18, 0x84, 0x0, {0x3, 0x100000001, 0x4, 0xff}}, @init={0x18, 0x84, 0x0, {0x7a09, 0x7, 0x4}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @authinfo={0x18, 0x84, 0x6, {0x5}}, @sndinfo={0x20, 0x84, 0x2, {0x0, 0x2, 0xfffffffffffffff9, 0x44c, r6}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x4}}, @dstaddrv6={0x20, 0x84, 0x8, @local}], 0x100, 0x4}], 0x4, 0x4000) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x800) kexec_load(0x0, 0x0, 0x0, 0x0) [ 435.219591] vivid-001: kernel_thread() failed 20:49:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10010, 0xeffffdef) close(r0) 20:49:16 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\xfc', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:16 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) accept4$x25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x900, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000040)) 20:49:16 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) write$capi20(r0, &(0x7f0000000100)={0x10, 0x7, 0x3, 0x0, 0x7, 0x15}, 0x10) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xb19e) close(r1) prctl$PR_SVE_GET_VL(0x33, 0x1d47c) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:17 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f00000000c0)={0x0, 0x9, 0x7fff, {0xffffffffffffff80, 0x80000000}, {0x5, 0x2}, @ramp={0x0, 0x4, {0x80000000, 0x94, 0x7}}}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f0000000040)={0x20, 0x6, 0x9, 0x81}) 20:49:17 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(r0, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:17 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4180, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x212200, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)=ANY=[@ANYBLOB="070000009101070020000300010005000400bf421c"], &(0x7f0000000080)=0x12) 20:49:17 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10300, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:17 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf1000d, 0xeffffdef) close(r0) 20:49:17 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) 20:49:17 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0xff, 0x200000) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x4e24, @remote}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x70, {0x2, 0x4e22, @local}, 'veth0_to_bridge\x00'}) kexec_load(0x0, 0x0, 0x0, 0x0) 20:49:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10600, 0xeffffdef) close(r0) 20:49:17 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x88', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:17 executing program 2: kexec_load(0x100000000, 0x238, 0x0, 0x0) 20:49:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:17 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) r1 = fcntl$getown(0xffffffffffffffff, 0x9) write$P9_RGETLOCK(r0, &(0x7f0000000040)={0x1e, 0x37, 0x1, {0x0, 0x100, 0x6, r1}}, 0x1e) 20:49:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:18 executing program 2: kexec_load(0x4, 0x0, 0x0, 0x0) [ 436.542035] hfs: unable to parse mount options [ 436.604310] hfs: unable to parse mount options 20:49:18 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10010, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:18 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x7}}, 0x6bf, 0xa0000, 0x67, 0xffffffffffffa77c, 0x20}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000200)=0xb1) kexec_load(0x0, 0x0, 0x0, 0x0) 20:49:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:18 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10002, 0xeffffdef) close(r0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x1) 20:49:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf1000d, 0xeffffdef) close(r0) 20:49:18 executing program 2: r0 = geteuid() fstat(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000180)={{}, {0x1, 0x2}, [{0x2, 0x1, r1}, {0x2, 0x4, r0}], {0x4, 0x4}, [{0x8, 0x3, r2}, {0x8, 0x2, r2}, {0x8, 0x6, r2}, {0x8, 0x4, r2}, {0x8, 0x5, r2}, {0x8, 0x2, r2}, {0x8, 0x3, r2}, {0x8, 0x7, r2}], {0x10, 0x4}, {0x20, 0x5}}, 0x74, 0x3) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x1000000, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@xino_off='xino=off'}, {@nfs_export_on='nfs_export=on'}, {@nfs_export_off='nfs_export=off'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@nfs_export_on='nfs_export=on'}], [{@pcr={'pcr', 0x3d, 0x18}}, {@uid_lt={'uid<', r0}}, {@seclabel='seclabel'}, {@fowner_lt={'fowner<', r1}}, {@smackfsroot={'smackfsroot', 0x3d, '/\'*vmnet0lo!&,)'}}]}) kexec_load(0x6, 0xffffffffffffff58, 0x0, 0x0) 20:49:18 executing program 2: 20:49:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:18 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) socketpair(0x11, 0x5, 0x6, &(0x7f0000000100)={0xffffffffffffffff}) accept4$ax25(r1, &(0x7f0000000140)={{0x3, @null}, [@default, @bcast, @rose, @remote, @null, @null, @default, @null]}, &(0x7f00000001c0)=0x48, 0x80800) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f0000000040)={0x4, 0x40, 0x101}) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000000) sendfile(r2, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000200)="c02771b87137b53a1e8b355298130a9dc5d96a3c3ad7e6d249879fc7b2dee4f674a1abecf28fae9499f19abf28df540b46979e3a69b83aa15774528008e41ea5d557601e6a1590de1d5f8365d2080280416e50cd41cb5491664b9b521fbb0c6f1aed7386fcd2edc93e474a228ba8ccf73be74bb2ced73083", 0x78) 20:49:18 executing program 2: kexec_load(0x40000000000, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x145200, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000000c0)={r1, 0x8}, 0x8) 20:49:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61289a40, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000000000000, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(0xffffffffffffffff, 0x1000000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='\x00', 0x1, 0x3) sendfile(r2, 0xffffffffffffffff, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:49:19 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10004, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:19 executing program 2: r0 = syz_open_dev$sndmidi(&(0x7f0000000180)='/dev/snd/midiC#D#\x00', 0xffff, 0x4000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @dev}, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) getresgid(&(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) fstat(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f00000001c0)='system.posix_acl_acc\x04\x00\x00\x00', &(0x7f00000008c0)={{}, {}, [{0x2, 0x4, r1}], {0x4, 0x2}, [{0x8, 0x4, r2}, {0x8, 0x7, r3}, {0x8, 0x4, r5}, {0x8, 0x7, r4}, {0x8, 0x2, r3}, {0x8, 0x3, r2}, {0x8, 0x4, r5}, {0x8, 0x4, r6}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x3) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10000, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r7, 0xc0286405, &(0x7f0000000140)={0x0, 0xffffffffffffffff, r8, 0x0, r9, 0x0, 0xff, 0xab5}) kexec_load(0x0, 0x0, 0x0, 0x0) 20:49:19 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) open(&(0x7f0000000040)='./file0\x00', 0x800, 0x8) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) [ 437.769744] hfs: unable to parse mount options [ 437.838040] hfs: unable to parse mount options 20:49:19 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r3, 0x4) 20:49:19 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) 20:49:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x200000003ff, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000400)='\xac\x00\x00\xae\x89\x9a\xc9\xa0\xe4tYfH\x7f\xd6\xa1e\x19_S\x0e\x05*\xab\xae?\xb9\xdf#\xe2\xf3T\xd1\x16@\xc5Mr\xf8[P\xd0pe\xf8\x90\xcb\xf5\xc9h\xd02\x15\xe7\xc8\x80\b\xbc\xac3\xc6u25\x0e\xfc\x90RA\x19\xd2\xd9\x8c\x12\xab\x12\xf5\x82]^\xf6\xb12\xf2\xd2mq\xcd\xaf\xa5\xfe\xbf\x90\r\x93\xfdA\x06\x88\xf4\b\"\xa8\xda\x88+\xd5\x9a\xe8\xd3\n\xed\ni% \xb8\xf2z\xf2]\x1e\xb2n\xaa\xe2\xeb\x15\x10\x98\xa8\'\xef\x06\x93\x9a\xaa\xb7\xc6.\xa2\xaa\xf9|3G \x9e\v^\xf7\x80\xf9\x81\xc9\x89\x82\xf4\xae(\xe4@\f3\x90,I\xa2\x00S\xc8\xc0\xda\xcdH\xf7\xcdZ0\x10\xd0\xbbdW\xf3\xfedW\xa2V\x01p\x8b \xa1)<\x12\x9bV\xda\xd4m&\xc4\x0f>+\xee\x15\x1es\x1d\xa4wZ\xfcE\xb5\x82\n\x80\xecx{\xe1\x91\x8e7\xc5M\xaa\x1c9\"*T\xaeo\xd9\x8er\xe6\x1ef\xb5\x9bN\xed', 0x1) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e21, @loopback}}, 0x98}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}}, [0x8000, 0xbc, 0x101, 0x6, 0x8, 0x0, 0x7, 0x0, 0x3, 0x80, 0x4, 0x200, 0x7, 0xfffffffffffffff9, 0x1]}, &(0x7f0000000080)=0x100) 20:49:19 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "f192e05ceb360d6dc53133724b636c5cfd44b9426c3145b37135e8be868e2e84092442b6040b61e58080415e8e9c8190763743e36b3fca5391faa109cb46140c", "e5fb1ab255dfd013129ebd0113a7d0dc5716a84e72771273eb750445b6595d5a16626b9257ca9a1c8dc065920282627802d4a4ae3c9efd92a2210f159ad24d00", "ddb510ab823f2eb1ba3adaa15f6a0c382e79b5b2aedf025d63b74854b9010618"}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 20:49:19 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 438.147612] hfs: unable to parse mount options 20:49:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001940)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYPTR=&(0x7f0000001800)=ANY=[@ANYBLOB="20e315ac0e396b62aa16e7c80af3670cf573267c7c611b4d4fa6769a2510ddceceae50c2b4f2b0d0938d3d09e227ca030851f7d60ea7a9eb164833fa8be8cdfd5b9be0b237f5af3c974fd61b9d31f6aad0b32dd98485488282eb74429c4784e7d08895db53b063747a4177fec55986b073dbb18cf9d13bc89e3c687c99c8a0d9dd6cbe75d3083c6251aa7e09c542666e143f671d00ef62cf3399c4c995f3fd9eb88cf2f3f28d41b550deaa16cd05718df751f7f45833e4479b246b0bb52c454d0d861cec05458f3a2735dcf2ea871f", @ANYRES16]], 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) sendto$llc(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000200), 0x0) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{0x0}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}], 0x4, 0x0, 0x0, 0xffffffff}, 0x6}], 0x1, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000600)) recvmmsg(0xffffffffffffffff, &(0x7f00000064c0)=[{{0x0, 0x0, &(0x7f0000004200)=[{0x0}, {&(0x7f0000003000)=""/4096, 0x1000}, {&(0x7f0000004000)=""/181, 0xb5}, {&(0x7f00000040c0)=""/216, 0xd8}, {&(0x7f00000041c0)=""/9, 0x9}], 0x5, &(0x7f00000042c0)=""/17, 0x11, 0xfffffffffffffc00}, 0xd04}, {{&(0x7f00000057c0)=@alg, 0x80, &(0x7f0000005a80)=[{&(0x7f0000005840)=""/13, 0xd}, {&(0x7f0000005880)=""/105, 0x69}, {&(0x7f0000005900)=""/48, 0x30}, {&(0x7f0000005940)=""/75, 0x4b}, {&(0x7f00000059c0)=""/175, 0xaf}], 0x5, &(0x7f0000005b00)=""/142, 0x8e, 0x2}, 0x6}, {{0x0, 0x0, &(0x7f0000005cc0)=[{&(0x7f0000005bc0)=""/196, 0xc4}], 0x1, &(0x7f0000005d00)=""/193, 0xc1, 0xde7}, 0xfffffffffffffe00}, {{&(0x7f0000005e00)=@rc, 0x80, &(0x7f0000006040)=[{&(0x7f0000005e80)=""/158, 0x9e}, {0x0}], 0x2, 0x0, 0x0, 0x294000000000}, 0x80000001}], 0x4, 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000540), 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000580)=ANY=[@ANYBLOB="ff0002000400ff0fff7bad255c143758a631c674a2aa1a6eaf30855c92406bd25c22f9810312650cbb9cbd7d5e9ce432dd4746e1169c54f462ac7346f8b803000000000000008eef1ca59d"], 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="39000000ff03000009000000b51cac0b0ff8dba220cf6ee9e949e616eb4c01514061e3eb99f744c458bf292a7022f494cf376a50064b1c3dd26f4e2c2c5c81573b36616f5f"]) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) r2 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000001340)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000940], 0x0, &(0x7f0000000700)}, 0x78) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0x8) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) dup2(r5, r2) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340)}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000280)={r4, 0x81}, 0x8) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x31, &(0x7f0000000840)="07953002f46cccade723d12d7cc66468927c54826c7113b0dd5f08e83ee7bd84b4f3b291ed16d40c6dc3ba11f5e9e2db3b1245dd65928cdd0b07e204717acf14f4a0d8fc856312cd329cbf1483e6bfd10ccbb1e3df358a7cd483c8ba422cdadf40fd457e10e25ebd6573e1ba5185cb7fab78af981e90", 0x76) shmctl$SHM_UNLOCK(0x0, 0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYBLOB="f61f000000"], 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x10000000}) 20:49:19 executing program 2: r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x401, 0x20000) r1 = dup(0xffffffffffffff9c) linkat(r0, &(0x7f0000000100)='\x00', r1, &(0x7f0000000140)='./file0\x00', 0x400) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4067d, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000040)={0x62, 0x7, 0x2, {{0x55, 'eth0#^(cgroupposix_acl_accessppp0%bdevvmnet0eth0selinuxmime_type!nodev(+securityuser}'}, 0x81}}, 0x62) kexec_load(0xfffffffffffffffd, 0x0, 0x0, 0x0) [ 438.235755] hfs: unable to parse mount options 20:49:19 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\xf5', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:19 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10002, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:19 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 438.429577] QAT: Invalid ioctl 20:49:20 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x290302, 0x0) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0xffff, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r1 = shmget$private(0x0, 0x3000, 0x1003, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f00000000c0)=""/155) [ 438.554824] QAT: Invalid ioctl 20:49:20 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0xa, 0x2, 0xfffffffffffffff7) r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$setlease(r0, 0x400, 0x1) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 20:49:20 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x160000) r0 = shmget(0x0, 0x3000, 0x240, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000000)=""/247) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x20002, 0x0) getpeername(r1, &(0x7f0000000100)=@l2, &(0x7f00000002c0)=0x80) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000340)=0x1000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f00000001c0)={{0x10001, 0x3, 0x2, 0x8, 0xffffffffffffff7f}, 0x800, 0x100000001, 0x64e9}) 20:49:20 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000040)={'gretap0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 438.844027] vivid-001: kernel_thread() failed 20:49:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r0, 0x741) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:49:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/route\x00') preadv(r1, &(0x7f00000023c0)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0) 20:49:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\xe2', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:20 executing program 2: kexec_load(0x8, 0x31a, 0x0, 0xffffff7ffffffffc) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x401c0, 0x0) getsockopt$inet_buf(r0, 0x0, 0x2e, &(0x7f00000001c0)=""/149, &(0x7f0000000280)=0x95) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3f2e, 0x101000) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f00000003c0)=""/247, &(0x7f0000000140)=0xfffffe97) 20:49:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x5a6af000, 0x1000000}], 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000002c0)={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80}, {0xa, 0x4e21, 0x0, @local, 0x4}, 0x0, [0x0, 0x0, 0x0, 0x2be, 0x0, 0x100, 0x5]}, 0x5c) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) syz_open_dev$mouse(&(0x7f00000004c0)='/dev/input/mouse#\x00', 0x0, 0x40000) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x683) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) write$FUSE_ATTR(r1, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) recvmmsg(0xffffffffffffffff, &(0x7f0000008a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:49:20 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@hci, &(0x7f0000000080)=0x80) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0x1, 0x8fd0, 0x400, 0x80000000}, &(0x7f0000000100)=0x14) r2 = accept$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @loopback}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000140)={r1, 0x3d}, &(0x7f0000000180)=0x8) 20:49:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x5, 0x503) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x0, 0x2, [0x10000, 0x9]}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={r4, 0x7fff, 0x6, 0x7ff}, 0x10) 20:49:20 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10003, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:20 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$setsig(r0, 0xa, 0xa) openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x400100) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x400000, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000100)=""/16) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000280)={0x0, 0x0}) sched_setattr(r2, &(0x7f00000002c0)={0x30, 0x6, 0x1, 0x0, 0xa6, 0x101, 0x5, 0x8000}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) sendto$inet6(r1, &(0x7f0000000180)="66b794ad2be6308495c9272de49d1f31af1f2a47f195a2eaa4c7e8259a1193c7c023c5c61bb088696973afedb91c3103edaa46df1160c9b23620b8972bed0799b15e1f11068494a34d382ab5d56f3d41ae77440aac8c4b83ac05e78c8e6e0b52281fb0cfa14b2a7b507f45dcd69f12df983d939b4238ae907d916ca050d1c630aa6a21c80ac2c7054cb3eadc1d5a664130726eff73d0a2e0eb1bbe658baaa30b6347c5e687287e6d3e0a92593295251acfb6d0bf4c370123e55f3f0a8910e8a27349a28a48d8abd0a291", 0xca, 0x20008010, &(0x7f0000000080)={0xa, 0x4e24, 0x3bbd, @empty, 0x9}, 0x1c) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) tgkill(r3, r4, 0x2b) fallocate(r1, 0x0, 0x1, 0x6) [ 439.489296] hfs: unable to parse mount options 20:49:21 executing program 2: kexec_load(0x1, 0x338, 0x0, 0x30000) kexec_load(0x3, 0x8, &(0x7f0000000500)=[{&(0x7f0000000000)="fc23f926323f08443ba03f9a5676cda00f90a018a4daa2fa7c5b166a008c0dc526bee687e0cfc1271cbb39b6673bb87fc18c4187b7a1e8880489709ff0fcf7b123d98b4c633af5e4b5df26795f8c0fd5fbbff534837317402763bc7689c09c52fee388eaf944ab5271d423fb11c01422b55f585a7b8cc27ca7be5e2146e646e9632d276e8290d3e81621660880f97686be179b2ff9d892463e37b6637fd8a02c", 0xa0, 0x3, 0xfffffffffffffff9}, {&(0x7f00000000c0)="06cce85299bb0de34d67e140b8fd5859639b141dd3d14ce5ede136406236c4d84e47f602febfeb18aef91a9a3eaac946baac16be72272392e5b89ace183f0fabe5f47253a459229d1218b1cb47203d9a662a616ebb0f630fb743d39fc02885c1d9256bbec596358ceef363cd0b5750c704c0e97c8ec8add11b9184e9d98ebce01c37adc65c52acee20922ee0382340ce5ab474e33496fc7fc965182d93b016bb239d01df3db148969f8c59a5b3572b51f5af0b54b2d25e07131bb1abdb6a9c6a07075209f34eb54f1ba3afcc1a7b96ea005d74feffd2b9be9cacfe307c1a8f00023102054fefd8ca79e6d899cf9d4ae5", 0xf0, 0xd1a3, 0x3}, {&(0x7f00000001c0)="b8876537e037982f2e9e70dce44229b1d7c0a85dffc8edc434d31046dcc94e0d6e2acb776b8d9ed9f753dd3d53e570390f241e7be39f4ef976832cddc657e188c4c1c50935baa87526fd0dc94e90b53980d859059e51dab981b64cc36acc3fac7d5edb19cd43904b4ccc9737817759", 0x6f, 0x1f, 0x401}, {&(0x7f0000000240)="886a1b3bba5bbe8743e7b17c9409411ac6b3daad38dad07e8a9a5ee8572c2336a305d466a1429fa924", 0x29, 0x8, 0xfffffffffffffffd}, {&(0x7f0000000280)="3dfe0336d87bd5a7d09545f3f281c7c2501ae553ea02e2b6162e06f1d59cf715cd79c7d9d5951edccbcc875432fd26b8dd358b415a715f853502baecb980fcfae226dfdb3b3c046ecb8d78f616a9718594ffc7d52530346209b5c6c202f97924b836c3bf8329734ac24eb96524c298d4cb125f21483fc0968ded9b2770535571b5da98b40d5b8827c553744c78ba099ba439fa3a7ef24e15721cfe0e44089d62f2185400a472b940c5ab26bca6404cc1ac9f5a5ebd07e8988c7c682498101873f9ec9e8f76382d02d89ab83b3155dc04177e98f27be29ed256971ff2ce25c75179cee6abd6cd69176322812a7298cf208b7e2aa128ac769a23", 0xf9, 0xbf33, 0x1000}, {&(0x7f0000000380)="78a27478becab7039438c3c76e3875dcec96bbf641b13fdfe393250694679fefbcc3d2f1d4a4db2acb73c8f6284cbd03efc8228cb29b9c12cc88c023d778b2c8b3d0a8dd1dfdd920d82771dac85d137fe5a3470c587cda47d126dd384be60de420622d0a01cc2dab84790e9ecd2316ddca4f5025200cd3cbe519dfe4ecbfc709082a277385577705c9717f864260c095f1bf31ee790ea3842aa8fbc9bbdc", 0x9e, 0x4, 0x18}, {&(0x7f0000000440)="43e2962507d4d79366e9aac0758c1e9391182e7556cb7592c3db90de878b7787c9156b56bd0bf14b567457e7b6cc91", 0x2f, 0x0, 0x217c40ef}, {&(0x7f0000000480)="5bd2d4da3365f4d8baab4bf2d4bedd58e322def83a04efb3eff19c471895538ffa59ff6c0b8953f77f37828d3da3bf67c9dc7c83c7ae9e6456b1f6b19d70c723cb44a29a9da9bab66f9e7f2aae755ab465d2b14d546ff4a6f49c892ef53a4536ea18f461b5c8cf7b526907d65bfcdc57b1a2478298f2", 0x76, 0x9, 0xffffffffffffffff}], 0xa0000) socket$bt_hidp(0x1f, 0x3, 0x6) [ 439.575879] hfs: unable to parse mount options 20:49:21 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040), &(0x7f0000000080)=0x4) getgroups(0x0, 0x0) 20:49:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) recvfrom$rose(r0, &(0x7f0000000100)=""/212, 0xd4, 0x40000002, &(0x7f0000000040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @null}, 0x1c) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:49:21 executing program 2: pipe2(&(0x7f0000000000), 0x4800) 20:49:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:21 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$int_in(r0, 0x5473, &(0x7f0000000000)=0xffff) shmget(0x2, 0x1000, 0x10, &(0x7f0000fff000/0x1000)=nil) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1ff, 0x410000) write$FUSE_LSEEK(r1, &(0x7f0000000080)={0xffffffffffffff8b, 0x0, 0x7, {0x80}}, 0xffffffffffffff53) syz_open_dev$vivid(&(0x7f0000000100)='/dev/video#\x00', 0x2, 0x2) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) [ 439.953213] hfs: unable to parse mount options [ 440.067549] hfs: unable to parse mount options 20:49:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x31100, 0x0, 0xd, @dev}, 0x80, 0x0}, 0x0) 20:49:21 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000040)={0x0, 0x1, 0x201f}) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:21 executing program 2: kexec_load(0xd3, 0x0, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x86881, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x20, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0d6300000f6ece1ab3000000010000000000000004430440040000000b630000"], 0xe0, 0x0, &(0x7f00000000c0)="75e1088dd4ddd314c11f4e55e0923688241639a9b2a168b4680c1dd1907ff7d27bc6a381af2ebd1eba380f80a23975b94a13eeaf243aa4ae4e3fac9635e8bb1e1670b071b08a3b722563969dbb8aec143f938dfa3f0582891d2a34069960635eb02339a7b26344e5e3a2cd130036d0a80239ecdb81e3a510db9aeec890ab6ace49f35902b133db80496a6e5b88cd1ae1bbf5e887d77648c26649cf5de2b246cd73e11ff299e59074fb425e9386831ebb0b8250607ca25981a7b4e79183e4ac6a2cf884904cc0aa725964754dc55af197fbd82f95d936a2247f0431d6ac469762"}) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000040)) r1 = socket$l2tp(0x18, 0x1, 0x1) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) r2 = getpgid(0xffffffffffffffff) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000200)=r2) 20:49:21 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf1000d, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 440.400093] hfs: unable to parse mount options 20:49:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) kexec_load(0x0, 0x0, 0x0, 0x0) 20:49:22 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) 20:49:22 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x1, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 440.530911] hfs: unable to parse mount options 20:49:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) getpriority(0x2, r2) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:22 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200240, 0x0) getpeername(r0, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f0000000100)=0x80) bind$bt_sco(r0, &(0x7f0000000040)={0x1f, {0x1, 0x2, 0xffffffffffffffc0, 0x5, 0x80000000, 0x7}}, 0x8) 20:49:22 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, &(0x7f0000000100)=0x40, 0x4) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="0fc78c456c056504290300eaffb1250d35df09000000000000004384bd8cbb911db29db54432ac91fd80d2e213bf293217e08880dc6d4bfb6c4b1fe79039bd73c9996390e9b91b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) 20:49:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280)\x00'}, 0x58) close(r1) [ 440.915716] hfs: unable to parse mount options [ 441.032120] hfs: unable to parse mount options 20:49:22 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000280)='\x00\x00\x00C;\x9d\v\x81z+\xf3\xa2\x8f\xa2\xd2\x9e\xf6,\xe5k\xb8\fW.\x1a\xa0=\x1e\x0f\xf1\x17~\x0e\x9a\xacQ\xb0\x05\x1f \xac\xf3\xb70\xaa\x0eT\x93p\xba\xb1i+E\xc6-f\x06e\xf2 \xe7E\xc9\xb4d\xb7\x1c\xc0Q\v\xc1\x03\x16\x8f\x93k}\x02\xaf\x88_=\xe2v\xde\xfcgh/lpZ\xba\x11\xe4\f]\xdfzY\xff\x85\xe5\xa8\xcc\xd0S\xbf6\xdb\xc8;\xc3\xdb\x86\xdc_\xf4\xc3\x11\x9aPe\x82\x0f\x8aF\xeb\xbb\x1cF\xcd\xfe\x7f.\xba\xde\xf0', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x1ff) syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r0, 0x7) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:49:22 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\xf2', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:22 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2000, 0x0) kexec_load(0x2, 0xfffffffffffffc57, 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) eventfd2(0x1000, 0x80801) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1100000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB='H\n\x00\x00', @ANYRES16=r1, @ANYBLOB="00022cbd7000fddbdf25080000002c0003000800030004000000080008007f00000008000500ffffffff080005000000000008000800020000000800040003000000"], 0x3}, 0x1, 0x0, 0x0, 0x8000}, 0x1) 20:49:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x6, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0x83, 0x1b743ffd, 0x8, 0x5, 0x1}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000080)={r3, 0x48, &(0x7f00000001c0)=[@in6={0xa, 0x4e22, 0xe227, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000}, @in={0x2, 0x4e21, @rand_addr=0x400}, @in6={0xa, 0x4e23, 0x7, @empty, 0x1}]}, &(0x7f0000000240)=0x10) r4 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r4, 0x1000000) sendfile(r2, r4, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) 20:49:22 executing program 2: kexec_load(0x5, 0x0, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x80, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000040)=""/112) 20:49:23 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0xfffffffffffffffc, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000140)="63a4ea4145016bb1d535e584dcff3cba67c152b011d7c23c0e0afee8a0b405ae1c07fc716599ec79dc26129ad60a3baf29", 0x31}, {&(0x7f0000000180)="f711432fc7dc9410b977e13e0452f56294fcaaa34af811c81c5274c08b01670b88279e76b36dd362cbd45e2b9fb51f53", 0x30}], 0x2) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) ftruncate(r0, 0x8) accept4$tipc(r1, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x800) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a0000020000000200000000000000"], 0x10}}, 0x0) 20:49:23 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x3}, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x422080, 0x0) ioctl$FICLONE(r1, 0x40049409, r1) bind$x25(r1, &(0x7f0000000040)={0x9, @remote={[], 0x0}}, 0x12) 20:49:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:23 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x101000) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000040)={0x5bd}) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000080)='/dev/vbi#\x00', 0x1) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0xfffffd) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:23 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0xde, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='net/udp6\x00') getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000004c0)={0x0, 0x2, 0x2, 0x20}, &(0x7f0000000500)=0x10) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000540)={r2, 0x6}, 0x8) 20:49:23 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000001600)='/dev/snd/pcmC#D#c\x00', 0x101, 0x212000) r2 = fcntl$getown(r1, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r1, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r2, r0, 0x0, 0x1, &(0x7f0000000200)='\x00', r3}, 0x30) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001640)='/dev/rtc0\x00', 0x141000, 0x0) connect$l2tp(r1, &(0x7f0000001680)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x1, 0x4, 0x3, 0x3, {0xa, 0x4e24, 0x14663629, @mcast1, 0x8001}}}, 0x3a) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r5 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r6 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r6, 0x1000000) sendfile(r5, r6, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r5) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) ioctl$FS_IOC_SETVERSION(r6, 0x40087602, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x2f, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 20:49:23 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x4000, 0x0) 20:49:23 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x3, 0x8000) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 442.202269] kvm: emulating exchange as write 20:49:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={'nr', 0x0}, 0x1ff, 'syz1\x00', @default, 0x3, 0x8, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @null, @default]}) close(r0) 20:49:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:23 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x500000000000000, 0x242002) [ 442.307832] hfs: unable to parse mount options 20:49:23 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r3, r1, &(0x7f0000000200)=0xf10003, 0xeffffdef) close(r1) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f00000000c0)={0x7, 0x1f}) bind$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x8, 0x391800) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_setscheduler(r4, 0xfffffffffffffffd, &(0x7f0000000080)=0x10000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000100)={0x1, 0x0, {0x1ff, 0x7, 0x200f, 0x0, 0xb, 0x9, 0x3, 0x7}}) getgroups(0x0, 0x0) [ 442.395279] hfs: unable to parse mount options 20:49:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x5a6af000, 0x1000000}], 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000002c0)={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80}, {0xa, 0x4e21, 0x0, @local}, 0x0, [0x0, 0x0, 0x0, 0x2be, 0x0, 0x100, 0x5]}, 0x5c) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) syz_open_dev$mouse(&(0x7f00000004c0)='/dev/input/mouse#\x00', 0x0, 0x40000) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x683) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee00]) write$FUSE_ATTR(r1, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) recvmmsg(0xffffffffffffffff, &(0x7f0000008a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:49:24 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x20001) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001140)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001180)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000001280)=0xe8) getgroups(0x3, &(0x7f00000012c0)=[0x0, 0xee01, 0xffffffffffffffff]) r4 = socket$unix(0x1, 0x3, 0x0) r5 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000002680)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000027c0)={r1, r0, 0x0, 0xf, &(0x7f0000002780)='cgroup.threads\x00'}, 0x30) sendmmsg$unix(r0, &(0x7f0000002700)=[{&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001100)=[{&(0x7f00000000c0)="2f18efea7d1286801867a7727565603aeeeaa6254a1a9e4c15e25cca4abf3c41da0ea7ad8914a76063ff54b8c0199bd37dd89ca9d0df593456a112e9a4", 0x3d}, {&(0x7f0000000100)="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", 0x1000}], 0x2, &(0x7f0000001300)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}], 0x20, 0x4000000}, {&(0x7f0000001340)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002600)=[{&(0x7f00000013c0)="395efac5a0df91264bef7e376ea9c33c6fee0983c81ea05cd431a8871d850fa15991d64e8307d900e5466eae91acd2fa412854617a2f77201d2bb51c6ccf4565e8ccc4fd89a02151b6e7d012f860542bfd69ea6a8af7707de651252b081c72e0b9f23998c6bd858efefa38db4994cc7b9297fe1ef557b40c9e30a547", 0x7c}, {&(0x7f0000001440)="632a7386e8d7277c474031aff73c563c3aa49f293026a59618d2779866edb1bb12d1da5c56bbcdfdc79967abb12934b44f963eebcc3649144d4a39ff6d2d115eb76b56a1954622d3c4c5bb6b70d96de45a59ab4f9c7048319046146d446a7b71ee1273f29468230f4635", 0x6a}, {&(0x7f00000014c0)="6c70f76bf7df54d5da1b3de2da9ce9b5ddb482535de9ccb76248a578bb06a04795a0ba7badb12f222ecfd506b2266ae9c1a5acd9a5e528c3feb3852d1e9887219b608106a33d7c925eee3d10019e921917196c7975b806f557c27076aa0a2769d571907a6fa95edb991aeb7b07c38a9b8ef196f46baf685a50472735709139b4aa9a21a6174a1d946e5a850e55e60a2a6c4599727293aeeee9638f278aa7b1001554b45b261eb0641b2712e26cf72c67fa583a48", 0xb4}, {&(0x7f0000001580)="30742538b9f98cbc1f0ca299618f41bff3d82caa805145c64551c78416e30632dc357a94adb88a68e886855dbacf014abdf670ffc0c329c3bfb0fabf9aab095b43eb09420408e01cf257c69f2cdd5c1fa064484c39cec41474", 0x59}, {&(0x7f0000001600)="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", 0x1000}], 0x5, &(0x7f00000026c0)=[@rights={0x18, 0x1, 0x1, [r4, r5]}], 0x18, 0x41}], 0x2, 0x8005) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000002800)={0x0, 0x8}, &(0x7f0000002840)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000002880)={r6, 0xf4, "89d9029ab20becaaf6ebea46c52c8ddda7a9eaf06dadf1cead981cbf7156000f3ba30b410ee9da8010ae875c72479e586030f67549c9f0d9d58dc669d71b314a7d33e5940de86342535540400ca8f97dd8330b145bbd764553d491d695f5dbbf14db6fdc952e592fe5704664beb0a9aeb92f317baf2bcdfceee81af5fdea93a0666f546ac67f27a0db9317f2483a19e1892e50b000b30a175e4b4e8ffd5693ef692bf11bb032a945bd3f3d590494745a499a77a3fe3e9e0dac54d86f63487852284b04ee9d4521e5179789b98ff1ac3322ddbab7b0dcbc447526508831bbadcd1df231f48499a4334c8f73a3840f55827f532536"}, &(0x7f0000002980)=0xfc) kexec_load(0x0, 0x0, 0x0, 0x0) 20:49:24 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:24 executing program 2: kexec_load(0x3, 0x224, 0x0, 0x0) 20:49:24 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r2 = getpid() get_robust_list(r2, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000080)={&(0x7f0000000040)}}, &(0x7f0000000180)=0x18) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:24 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000040)={0x2, 0x6}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:24 executing program 2: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000200)={r1, @in={{0x2, 0x4e24, @empty}}, 0x2, 0x8000, 0x101, 0x4, 0x7fffffff}, &(0x7f00000001c0)=0xfffffffffffffd29) kexec_load(0xffffffff, 0x0, 0x0, 0x1e0000) 20:49:24 executing program 2: kexec_load(0x6e7, 0xffffffffffffff39, 0x0, 0x0) 20:49:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) close(r0) 20:49:24 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:24 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8001, 0x101902) sendmmsg$nfc_llcp(r0, &(0x7f0000000a40)=[{&(0x7f0000000040)={0x27, 0x1, 0x0, 0x4, 0x3, 0x6, "8e1e8db8ba23a1c691c8d9b7f8bd15cf9831b986723f2405b2ae5b4453046a09a175351eecf17c0ad39a2aefcd1e7a9a60749d6247ddbacdbe754575aa4bc1", 0x3f}, 0x60, &(0x7f0000000480)=[{&(0x7f00000000c0)="5f6af862a5e227aa616dea862db64958ca5cb6db4103f61c999e579f41e810263feb2001aa4b609f8f8b7fba6af546c75d98cb9b8e66b9b88ce537b9d56ad7155c6aad327e00b92b1a184fa123832266d1eaf3a28377b2c03d9da61631ecb14f8f4e66daa6e704b1aff11fb29ff1ed4c79c131e10fe48db2e8fa7559e2541f645c8679a471bbdfec8dcb4733f475752ec271550f7b8355483d7a0762b86c2e240edb4601ec87e990493d3e9f644affb6c9f3c800ad3361e9c54cbe608b3a47d5d2a3945913808caacebf62", 0xcb}, {&(0x7f00000001c0)="04ebcc6e2c5207af463c2ff72580eb78dd2211a4bda52cb60d8f137a40d10813938c2a1b9c0141575517257a1f8c52e01e47a701227768b3eb67e6f8b12cb0822a8e506ebf7be2f8085d4633f2bf7618515232e046df83d71a5ab783804c6cddaac3b219ff6ce5b47519d660498fe18b50b5d7ea66172ea5026a05826bbcbdcd2aebd50d54a48938c525e7d555a5a6401465d082b78cc6d26be0c605ea32d83402793a9b6fd838abc48444c065290e2088598937a8eeb1d603c5f8d3224713383f33117fc8d6525cc70e61aede1ccefed517830c949cccc67829fe7ad6664c9e", 0xe0}, {&(0x7f00000002c0)="9e04fb20092af24cb989d94c70b718ed2d2a79834bbf9ee8d9db3fed1901d974b80074c924782997d3ce672eaae5c5962e2f8076d43d957596c1a9941a89cfd57229d53a5239cba61103f7bacc944d3b493fa0127a1cefcb6d", 0x59}, {&(0x7f0000000340)="99b66b4711ab7712f7d27920a01b53f3424a0345482cd54a7b2ac1e4b87316c529c6ad9686e5b1e9254c5078a475fd563f78d4b37f3779064529127c1e3e045c9f01962a813528d1a1076178ffe65e73a8998955ce70fa87b0e32792d25c835bef98dfc1865df990bdef057f1ea42c1be95a42645b9d1923984b5410c47bcf1f55e8e6f154", 0x85}, {&(0x7f0000000400)="6b8e90aa308df7b1ea4d9b9ebfb147d70b88e226b04f019ff065a70276af18137e87b6c7a5910752fdeeb2b0bf79abe225bad9e36c6b28ca3abc31d91f0f395d10fda8985d33be930d7d5d5fed5c7130a81006f4df", 0x55}], 0x5, &(0x7f0000000500)={0x18, 0x0, 0x7, "cc1c7b0f"}, 0x18, 0x40000}, {&(0x7f0000000540)={0x27, 0x1, 0x2, 0x2, 0x9, 0xfffffffffffffff8, "ce3248cd6e880edb6abef79ea1a03982a1fc34f72e1771719b348491b759b80a395e8fa24bd851542b1168f6b45fcab8757e10eacca2ef4f8078d15c5c4e8d", 0x9}, 0x60, &(0x7f0000000900)=[{&(0x7f00000005c0)="08ed5a2a2c97e09d36e9f8154952f38f0e2a5a8591d29bad41cbc00866e0d0aa17a689006a110ac5ac0c5b64c782cd99b222b559535c5b700ac0d0586c01dc57d5941216ec4bc5dbd523a9f3643b7f9c316fb77c55f541b4563529b90375ea7f5f4dbbb2d8693b5577294e1f98b157a7aaff9a48967a4953944668820ec00f61d6f67cbaa546f6d3408fdc28c4afcdf8b772b5d3fbd5c2b2bb5cb4cb8709717cf61af6e6e3461939249836af17941e8716303c92befdd9f9d2718b6b7c", 0xbd}, {&(0x7f0000000680)="124bbb17c9bc4b4aa6e2400f5033e26fc7397408eacfa719bcc445a1f21208c2262df079b4cd791872204b7a296664a2c25b71ceb0304aa53707eb2fef93f2ed4b28bc34a930299ae62eba42c40b95ae36288e757d20da2ba17c3124ea94cd1d50f3e2cd9b57fb615ad851a5ba4f051dfa8f4afefdc05082995f8c92ddcec7f7ab2e41f35eb0fc5c06354105803da3e4b94e93", 0x93}, {&(0x7f0000000740)="f45e652bf119edebec63c3c44113ffb1e5da9317bc86b29332da84de6b60def3529697dc84ec38bc4aa2fbbac31517b5cf323a859b3bb9632b9ef1802609b25731436fdf4f8e6f9cbb56dade2204d59bc6275abed263e39b88f833bdc087ed36", 0x60}, {&(0x7f00000007c0)="d458af5afabad961f99ca8bb8937962aac909ba4dade353caba9eed55dc9c9a706d09d8180dcf376bc187acbc77380c1f3b0824cf6de243d36aae9f4c990b8b01d3cbf8f878a4826cc3f2237f2eacd03780a361cc30755cf87b28a66f2fd9823f50a2401bba9364f6fab2f72b217084213edcd586f26847708fe1c2c2afa463aab2c7cb72346ba7dc548c07c0eaa1d2489ae0c0aaf2a244539caec83422be3059e823aa35cfaabd11379c09155fe2b485d403b6be07afa8d1e49d3e69a5f26a554202267833e49810edfd671e9b9ffa2f2404b6e0655fdc5b01417727226d9f20ade073d96bb013204961355", 0xec}, {&(0x7f00000008c0)="6718d2b3c9ef38", 0x7}], 0x5, &(0x7f0000000980)={0x88, 0x111, 0xffffffffffffffff, "d5d9ce1be846ee7098f1298bbb303bf4f161b1a165d8fc42332204ddcbdc932e9e5bb43bb42cb8664e35cc300a58842e954c4e7893652b8f14508d7a2fdc76bf388cbd73d43f331d8e300d03b551e6cc5454ae0fa078625efe1f10ebbc3f8ee3870353571aa18b9f7c47b13ca47b63045a57e42b7070c377"}, 0x88, 0x90}], 0x2, 0x20048004) 20:49:24 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) getgroups(0x0, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000100)=@v1={0x2, "6cd9e2c8e4b3e91928"}, 0xa, 0x2) [ 443.320089] hfs: unable to parse mount options [ 443.415428] hfs: unable to parse mount options 20:49:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/\x00yz/\xe2A\"\x84\xbe\x01\x9933\xaf\x1b\x1d\xa5\'w\xe7\xae\xe5\x0f\x85\t\xf5\xba29\x86\xa9G:?\xf1L\tu\x96\xc0\x11.h\xadQ[w\x84\xb4\xd4\xe1\xc3Y\xfc\x91j\xf65\x89\xfc\xb8\xa9\x97e\x93\xf9\xd27\n\xd8K\xd6E\x86D\x18!\x0f.\xa26\x1b\x19\'K\xbc1\xef\x82\xbbB\x01,=!\xe0\ry\xd4`]\xc6D\xa3,M\xc7\x0e\xdf\xd8d\x03q\xdc\x9b\xde=\xec\x17/2\xb3B\xad\xfc\x91\x93\xd3\xcc\xa9\x0f\"\x86j\x16\xad\xc0kHn\xe1zma1V!m\xe9\x95\xef\xe2\xcc\xdb\xed\xa3\xac[\x16\xde \xcdG\xaa\xd7\x16\x05\x96\"\xd6p\x83^\x9fM\xb2\xe5\x97\xf6J~/\xdd\x99\xeb=\xb2\xc6E\xc7Z6\xca\x7f\x01\x11K\xa6~\xb7pE\xaefLV{\xe0\xc3\xcd/5\x16\xcc\x85i\x8bf\x13 \xfa\xa5\xa9)7\x00\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r1, r0, 0xd, 0x2}, 0x10) 20:49:25 executing program 2: kexec_load(0x3, 0x0, 0x0, 0xfffffffffffffffd) 20:49:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x903fe, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfsY', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:25 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x987e, 0x602) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000003080)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000003640)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003740)=0xe8) sendmsg$netlink(r0, &(0x7f0000003bc0)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f0000003b00)=[{&(0x7f0000000100)={0xb8, 0x3e, 0x400, 0x70bd2d, 0x25dfdbfb, "", [@typed={0x8, 0x3, @u32=0x6}, @generic="b553fcb007a6592adff1e43419092b680ba8a0c6b24e4f8b44bf2297b5272dadac549d209c1159e9f236175177cee80287522d3453c219a567109fe9a8129e3107a55372882f64b016b5d4eeafdaa2d415b6a691ffba0ac47515ef8aaa96274e0f87719a150b198756a61569cf2a8861e18993c54a7974d9107ae4aa4c0185da34d8a12d883e435e73998cc87d0b01d6bd856e835c51777c795ef389a445b5"]}, 0xb8}, {&(0x7f0000000300)={0x108, 0x2e, 0x200, 0x70bd2b, 0x25dfdbfc, "", [@typed={0x8, 0x8e, @uid=r1}, @nested={0xc, 0x11, [@typed={0x8, 0x4e, @ipv4=@broadcast}]}, @typed={0xc, 0x1c, @u64=0x6}, @generic="cb916eb4ba408c4c88c8868f6072751ff672949da01ab0e01afada8cf489069638543c71aea6552aaea588c03845436215d801953302a91a4e34b483cc0fcc28222f7e0c7ebe888531ca661791d86e77b8bb5cdc8e6af46ae6cc012a7b013212586684b371effdfd950197ac345030462a7e9bf7d9ef745f6ddc482d1d652282a8976e853d9d96b54c2b98af41091bd368d8e14dd453c73dccbd9d8ed0d8a2750387b697be4991c4a2a0ea82847f2fafda56f89963ec0edc4e335430dbd698d4453eb64a29bac1f4f79c7bd384a1bfc1640c753cc7"]}, 0x108}, {&(0x7f0000000580)={0x5b8, 0x34, 0x400, 0x70bd29, 0x25dfdbfc, "", [@nested={0x198, 0x68, [@generic="2403a096abdb8c6abaa745a76910d592066395add8b4eec57160ac11bf66fbe2111c99799d64d69fe59e5006df046ef043058d322faede4fdf2ff6bb821f82a398a19199f61bcb3103d521f2a77cf29c3cda5c338ec3edf933d84b2fd5da616871a0cfea7bfb92e166a5718d262b096ce5662c6191edbf1a90c3afe45023f0f472c8fb51ab49a42e8d94fc7f363120547d74fa7780710d8fcaca080e44", @generic="a9047c7b77135579a739c6fc214da486ad9024dd2a8aad75f023c35cabaff79a6fb95a707e46a9ea5da8f2594ddc8781ec01a46fc6182cb24d863e711154e4ff85690d65925070a0cf8d685a5c7402ad01", @typed={0x4, 0x8e}, @typed={0x8, 0x7c, @uid=r2}, @typed={0x8, 0x39, @pid=r3}, @generic="dba35e1e12e03c0c685f6ea6c5b2e054375b9414ba8adc1fef299726aa3000e22e67066dde5183456d61613375aecc29c45f25753dcb151a5d704372076ccbe848047945bba1d1bf364cd688671364871c1542c1809f4b1a1ab510031ebb69d33f9415443e6938a48968335687a1fde7df4b4d49dbc9b0030341ec7c9fa47884fe2f9615fc956f25d61785c862c0d857"]}, @generic="e48d06c7269d4ed79805f7a9909c7aaa7286255b08e0ff27e09938f66858361d4acb853b876b41a904949912f503b5c26899b2d720525effd3ee42efb367a438dd9c4a06e92c4ca42304", @generic="28957486db67b7b0539a1ecc20702c9aa64cd10dffcae84e38dcf2bb9abce83095c744d3cd5522a6ff70eaddf71bf4b55809033e3b2cf6cb20dd2caff32d270691029e04f2112952de43ba27e236b257aff328447a706c01960b8565d30c59a7b62e1accbbe53526efef76a607b4447fd60e75daf2cc6138ba195ef321e0b0c95ebbfbe112877f50880af9159150eb18b18f74443afaec58262d00d4e8219818b2114f236acd712cf5a07dc7d9d3323c71f8626e602c6b4a873f8826984c3cd4eae7e3ef551a2cf2300a343ec56788974fb60b6e226a767ef9d472f0dcebe33f0c86c3b2464abc6da8bfbe1efe0c1984", @generic="8d70a8f71537a408044f69b90209e14b71a4986c538eb3fa3548e147ff9d9e86974a381366a7ed09d82791ef724491aa7a005917c4d5b9c8f3600983005c4715cb123e67768afff654eb5dad4526f8d990a796886acdcedec16d4b9773e9523c65d120e04442fb8ad45be478111be0a3bfd898cd725b7e5f0497ba78672a9504", @generic="6004510b82842580452023342c88bb2ed9ca9729bf24a50234e724f3d0b56cefa76f7a2031a34592331a7fb7fd5295be3f59b988607682b44a5c77d8868def80e8ce9c39128433a4bb7b41eb3d1e1032eba2975dc7ef39fcd459ea2ca9648fa13547a7400e53f92e3ac82b65fb4ad85b0fffe62c2bf991d9d3c38b5ad09f7bf74dbfae943c5ec2779018b399a9", @generic="cdcd2dbd6c6ac428c1bf8053c5d9786bbf0aa2654c002df171e47a47100dbca541f365cfcea3101df947a961db75ff3be183067fbe5d8d72ff87b61fb0af7de95fbad589d3e496da1014e95ed675dbad7fb5b772f2e2dfe23bc0095ed918cd88d133de61c8ab45887f1e5eedeea389c0e7054f4d39f9c080eb0d2f6e69d129953360753ce97a9f1a369d29277268b4b2f9faa7c4d8b351cd08c6eac2f7c2c7954286b2344814d9f7e9e20da8fb78c202c0d6643eed3482dc5c018a92a5427224a6d8bd12e0193977249189b6c630ea726ba6bbf551e9d0eac53314e50dbbec0e", @generic="a1559fa4e546ec579fa93644c4b3362ce700131b2af186d4da7d3b6ded2342602b5b1631f4b40210160809a98e2a550db5e304b701fdaba763431bf4a55ef014d7a31168b588c19a85b5337732233ac7d8", @generic="f45c06ce6c1322c0bba88942c59dbc69a6f6021b36ac215775ff975edd8d234e4fdd19f635d07a0e47010d68b2a73ac426e2d85e90f62350e0ee7921e839ef3c34fac3af0867eefda185bcbe174199034481485545397b10900cbe606b90d4d74d5f5c9603b81afe3d1cc6c9868646fee940f2182628c9e3a7da84813c08a3f8520905c3b167d41190751b55c44285", @nested={0x8, 0x47, [@typed={0x4, 0x69}]}]}, 0x5b8}, {&(0x7f0000000b40)={0x253c, 0x2c, 0x0, 0x70bd25, 0x25dfdbfb, "", [@generic="f23ff4841d6cbe8c5d83c86686695e5b676dbb55bbc07b72b08ebaed70f5ed4e34183c9430c1b2d4a41d018b5ae7d850c8d2bd29ec0531222a9d40a37eb42795cf8d8e87320a66f3d2528362b8e7609e0b8f190d", @nested={0x4, 0x39}, @nested={0x11d4, 0x1e, [@generic="100f5d6dbb0e48e6ce51a373b4b3d42c360b5d206f9db3c992d45449ef8b4a0d367ba3248b7e6729de248c3b7d75ce0c02cc376705f4b7656f4be148335027aee76249ba6c7993c77ef2d4", @generic="65293aa94a51f23ef551b5dbb9e54ae74d2b777067f2b154f194f895c4698fbd0305da0873f600618eae03349e34cdba3720d01cc16f381df43358bee3c7a82d6bc3f4cbbcad1ea86210ed1a30a026971d921aba0c6e9fccb541b45b82abacc1df60256711fb039d", @generic="2d78d35b8be906df7ef9acb37e1f8aa73bebb703be7408c7be6ecce60cb5e1afe73ea686c2ce83878fd653d0cb145141bd5ef16706ed7c75e88cc2ded9787c3d50db8279955654e9fdcfc0a4ce5c5d2b7a50e138d0ff5349bbb6c1b1d703ed44be", @generic="c61b8ab4f8a5e3d5a214e6eccd9c2c09991b3f6a3c4910", @generic="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", @generic="6188d4d45f7f9a6b3aed6dbb3d6732fafdcb6474e948e73cff90262d02814bb0cc4c868262c68a4105a0b14975683dffadcb42ef8e5c5b7001d59612af95f12f5e22a83c96416e3a6b7348bfc9d74a46597c072f62e50afc1d22d40df157229265241f94530e5f20d207ab529b1f506c9c3d144f289cc9c05420b13e7247811cd535e18d3d0c7766229b6ef0990084045c7e694cc8", @typed={0x10, 0x9, @str='/dev/dsp#\x00'}]}, @nested={0x9c, 0x79, [@generic="72ef829ea1da6ab7335119ec78c76aeaa8da259356a1dbcd0f6795f805e9f37dab57e78eeef5d6e48eb541b7abac2b61d9589aca521dd0164b3358e4e1dcf9f3d8345913b62ee82066192967947db10d9f4b938ff8ac671658e0a455c1042306f2ba6630c58c0ebf568d223983032c427c73f6bb46b86fc7f2", @typed={0x8, 0x50, @fd=r0}, @typed={0x14, 0x2b, @ipv6=@mcast1}]}, @typed={0x1004, 0x5, @binary="ca26d9380389e28c7e7c4050876e0fe510539257728ef7a7956115176b71cad0d84062b393501b618570496cd4fd2a3414f9cb93f8fd634b216816f74bb4c72b2dcbcd4dae499947d7026a928ff35bc11b43aedbe3969c05131eec3476696428fe05be577359e2d19d8fa78e33aa04f10283125997d64d9a68fe01426fcd8d04d76e50ec25d364a1c64e4d09fc4f73359d3e6577db94667bdff0fd23c064d89f3b4bda0014909b7c5fa12b413d786a412647558aede25678c5fb26c59f0f667663497b336b3d5f5d10199ec12eeedf549e9f98d8507e0ccde5d0ca7d7833f843257f8e5e9d87aeab04327103fa7f7563ea0f37617bfe2fcb4b0edc0a62c1ea5b54c9c12b4cfbc36fdc437e3338550409eb64c6dcfe6161e61e13ddc9245bcd8e7f7b8e80c42ecb5ed98f5fe17cdf5a13b7143ff2d9c1529cac363d96f2565ff0bf56fe6b454272cb892016e1393b4323869ecca2e3c1f92f3806618d3bcc8a9d3055ae2124a36073505a78683ca5cc4a33fb23e02c804a39f42ff5ccadc7fe135022551a05e9726dead59a3f57bef629ce97c2709d6346ac22e22382ea8a8c7fac046101e5cc2d6600e34d7b8d0d2d90f365a4f6054d87f128862f230c2de12cc19b243db6665445fa639d012f5742b88f4fc2429e55e63a83a370409cfbfd46ea97a482ccce2a63b574bebf535dc1ad85dc2b3b8afe600645ce848fd311cba9bccff0145a6ed663255ec50bf283280484bb5d3edc5a9b0f036c3c2b9b4eade4ad4026ca0004541c4d4fd869d7e4b15bb0b9fe92ac07aa3f5594d6175143d21e39ebcb597280846fa6533891b510624c7fdb7cb3d3725f678da7435b23ad700e4a60d7cf2cc54d77ac7957e8fb4ab19af1c2ad21b01b4af5d56671e3d90675a48a95aeb63147e1cfaa3d9bcac9d7fc130d1cb64e17683593d601cce6f41ee924f59be571ba37aa1daf8d75b376464ba8c35be0459882d24185ec18c4e5f1352c95b1bd174fe71e2481d01462ce111ee3afd3f5bc140300bd44fca60ccfbd5c1a27df3be71603f7ac88d1ad6c8f10319b854f0f8016324a0954b2977e242cfcfdf860dd3fcb257bc0a87010c2073e53f2f01159ddf6b1e79c5f4b24651a59f98c4dffefc97c3cb7ac28a12d6b1a7aa34c84461976490cd23aec18cc509ccf27d6db3f179c195bb3ae72c697d197c6a6bd2d714c4658a14ccf7e835d9b53a06cb7154006c8af97e13cab0cda7bb027b65c73113cd5318dac6b8a89427c44c9d931167f42714f7c7924853547eec334192db8ca87887883e48e06e7d48e2029c8bc690b88fc908a33bfb4ece30521374270c3c13ec833b367e324111ab08001e47bfe727d04e8f8f6229bfd555469b13c6827b892e99799211254779cc12acd256f0605eefaa58671eb92de3cfecbc5e72ab2ea50d94a5caf198eac5498f61b90de9fe751f44c43984aeda22e248b52bcef639d56e28d5217a446d7941cefe96a148d154f0f444bf7e200fc4c53bc5c1289dc0f418d1f62763b4f99e1ca6717c18de329c8e545736f87aeaad81fad5e7cacb3067aa29a7a62f97df6556be36270628c1d86a7b42e04712e438e501e7ba4f072737fe3224ba6e4a8e83875ca5e0c649d99db3cda86a9f9ba63f31a60f6258aea1511ef79fabbceb85b4d9831965253198423fa09fcf28be23e788a9f83754897e5bf5c6ef0f2c166f74706b391468dd09a916a8e802b135c7bfa16fb319bd53dab932d1f33edcb880de12e5bdf55c6fdd66fc3317969cb50ef41669926e0328cbd530562da1a47ed5ec4301db4eadcc6975b0a11f57a5ea7045fcbde42c353397f2ce9771e851e3705661316c17e52a120b4a5caac7799745b3a632e0ecd1ae883d1641345083bdea6091b111877396918f75890160fff0cfd0671db98b246ddf2a9df188f7dc33a4629fc4caa5c750c914645c7163a0a6a8eb85da936546173e5fb7d589ccb64bd52a9a8aa1808f1f0623dfc1fdaf7cf86d65352f06eaa90abb7102448acc0961287b490ea87cc01c902b12b4a2ca92d95502ce45fd85380c466cb7b9b56cc700e3fd9cb2a0b3a8b899dae6ef4502d9dce4173f72e6aeeb99e0c6fc2f83aecb69c9ff83ee0d463b154801de3a998577201d0fba463740d0e90855ee74616086fb3257e628f62e2493e14bae48f9699ce33d064e5686024ad9d045f8ebe78d89e6fc2b4e0ccc2bdc2c5b78314e16d41201b8c59d0c45329a50a33094c3febbecb11111d6430537dd31fd67d76ea84309b191ba5d4e1f8432923b9f142b440309eab6095fc8d6b76512d2ee7f523b1d96a65686ab54e099abf126273d398dfba81e2feaaa846144ae176c3f53fc84f7ecb6009a66605bca1e40131f05c5f9615476968a1ba6ab1fb8eb9749d5597b8346f40eaa762ef6734800743a44ba5ac252724eabc0f46d03ae09e4b0d80aaa0c8fab49c90f747cefcadff0880d1ba9b35d68607b63e553ace8b5379494949a234a71990b95834065e4ec6666f96dd65670fce4e692c3bb6c82693b47f68e439a1eaae2baf1de605aa7a2ffd7129d5815800c67bd71777aeedf5472f6fed0fe98b351a69d9b0116898fb6d59e4a247ce39c92dfcbbb5af1a19277b7af73bc5a9b70fbb5378b68b10850a9173dbe05105cb1efadd4bc288cbd409c07fc402372e9fd7a20b2b733e51beb0d159175f14a8cf116fcc7c8176cd5b3be0c7073e7f0f792edd1c61d8b7142e326448270884d18a5c726925b77e7cf60bfcf88981726e9522446fda7c521df8d8816353b5e4157c6fb56ae7f30c4bdc41114d896c62e0b68fb5dd4866469b31aec699c8661c7504854d5e443a0f4fc0ec0f3c05a0abb16bbcacd95aa7ac00cb7a42649e92f60a38462ecd20a3e0010728507891bac28793fc60fb32c9048e368d8c5e301abeb0aaaf2a87f6d92920913317dd6c6579021f27413972068165688c01b7f26828fc9f28d413a8b9857519ec7c8a3c8e3b9e413a9a29a11e29bd28aaacda613d51ce186a3539b507186e5ac31f4b576b77ebd3ffef5ec3b422ad79720e200e837b10cd0f9957ebf836fc138367546ef8cc55c8ea9dc99c40d49f72666fea13472a3edb8a40fa81912b35e74e09e2bf128cb56ca478173d07afc2a61ac4ee3a3ec1a30c4183d96c67e7c96f250769587666be7fe2d71f1f35fda60befa38521224c1c62988e5f868f7a907da871bbd990b59a41648ef3c44af7b134c11e00986437c1f8d4244e94c558a78e85eedfba364b2b797930d630100a14810f6bf5c33667e8aeb7e71c0b79993f6fd4d89adedabb86ab5f4bba7e3ea825ce913c98ae2601afd8a52ef877c84150f1bc064b013b0b5ca3b9b88e6bdcc0e4c3e053ec201af3a3ae0f880356dcd4f2e3bc5f2b434677f2b8c795e4579c0dc3e889c190742cedcfec997ac6753a6210a2c1a17e0d1d6c0645e8797308fd60cef880dc4cf7b6c7051ff6e7587e4c5beec6eee06625d9f0e14e96deb8b10da2b13f79c1e4c2101758d36682c3dac6d383cb669989f1726d607aaf4cae4daab8a67a407f1ec86c1e35cfefae54a1950358e2ebb6abc3a031c54b3fb5f0383da3a9c3e2f098c35d6240f7b3ceb4aa42c7eebc31baa8810bd2cde43c43ffcae7e2508010e842959f4bc79a2ee417ca3c5be755935cf56226171e77639430825114caee356ea000fa50bf0cf8bd90f58e8e6911decd41395ad76c6b857f899f24c80cca3420a4def84544a3d287d9314bddc70c1358e4a6e3a187a00f0bbbcc5b6b0a7f701a8f4602f622a1e24e8cbe81bc9ff600672df6ee2f0df62dd3edcdf7a0cb9ca47993e636190c2e19fb212c8d727abb740b19da33550840b91f8877a809849972c942a476a7094b83d094c0c97cfc755ec4195039fcea57c2c54577fd744cf5da86a70c6c823a6f140638a684a7cb2ae195ed1794c1e7206db94b95763575bf51d5caf2edde0c508c39378164728bf7ccc4afaa5013cee46fcb0cbb59056d08811ff5e642aedf0e6716af66b2b05176877941b8fb5dcbaa724e034dc7e367d7f9197e17af4279b606c31abffde192725ff04731b59491249aeb81daed3fc22b2fde66a5701cd04090d3134ef8cb5791b814dbda2923bebed4a9b7e93c605fd678091c1b0dcc503e872b1635659adadf570af8690188a281ec9dcdcb67a68b3032981654f79d08b324254bb50e479188a2f07acff292bdc6e7a866fded71355a0f602c33ced60418c8bd76644b9bed40f89e0c881b685fd0e1672730ce8d648636ee39453e09e884d2893b80da0d170e975894c57972c822e8870f3506539f4c072d8da3de9ae0dd07c63897f064fb649fb7faa3e3cf2ca32e44ea442416b204b9b187c0c2a8e7356632a5d38eddd0d3a10a106853a3298f5b15635a1e582a91f5a541add7312dba58c6ef995020c5528ea5dd1e49758eb86cf6fc5862a6a47463f8b4a593f68b45f34f96c4a1dbfbf3e5d75f71783d000d848f9efa30484c677afaa97a26f0beeca2eb73f44524b6f3336d6c43322b44b4d3b7ae674a30890f4df80af3bac1949b3e7c935c59d0b869fd74d2712b63098d32aec56f7e1a11c6a947ce73143636904dc1dab2dbb47e49b3f30610d5557613238489d1cf561a5d5a87e40e7f3d0a421e6e26a8ed6d8365ee63e528754bff1658bf563220a6aabc872b3fcade85a1e21e0ab49ca7800f13582008c0f9e7da9afd8f3de1a174fd6e2de25c714aec1bb073c205b4c0218b10c9d201c1bdad00a9fbacaaa347dbd3aa5a49177ceb8e123d9693bce802ea820c27e3bdd66fbe519b74a35b65cec6df17285898cbfd56c51af1a37861caee9e703912a304b862dafb11ff0aefc90ee37d13dbbea120584c672334f650ab81bfd3e0bbb3a4d8f19a303aa5393ad7adfbb00cb1851b86abe24a77ee77ab49dca3e8ff9429c0874be62f87c057809b1cfbe8476419428dfca49a6146fcbd3bd5accada8421f896d3f40a3905aa16133b8bf652d00f14dc2694fe3f39b9ef6ca935726853f0e69722bff7e0ec3a8d4f789db6fe05b7dcc67dfe243ca3746479b22e4cac02fa315d9c4b888a8508a10edddb1e748454d697fdffa35773f4887c8eb4f60d396b77daaabcfd189bf2d34125a7c1ff031840caa531d233362c85b05fe96a02ef0e90efb3b1fbc5a5c8c33ba137893ab4879b70509c5861ac3b4bcaca2a7fce23fc7b9a2af9f45fdbe89c777cf35721c0d365ac9f98412eb7d299cc9ae285872343124549e7a77d878f14a8d613b57922698bd606acf3f72a3e8a5a9dff8a55e9d0ce9014634f407446da52ed5006e1b339bcb61391d97f1d84f85b970fe1c0a7d692808e09292aff402c06873d26c583fe48e854c097f6acf9f03bc92ebf64bf13424020da68b6eda10320f5b9836b7246aaa82cbdfd737348935e08e19b2ad076e340cf0b31d20113f37f8b78d7937b750f68932c99496437e3568c268f127a952a2c0e102327e144c4df97ec0f7df248eab5e4eddb6b3e44df40c48a9625e42b8d8bcabc899289684d2b5a1b709542b9ec159195cf05794170444bb58fa9427480824beb99e89e8ddcc0c83858612a944667b5da6cb7648fa9bd028dbd2a23829012ad4993eed85a1a749f443cce9ea02ea057877e3a3a6f91ff2ae23a9836f8d94927a1209752900d5139b428e3eeb4cd24562f55f3b8d511c8f15e891884b7f21f900fa2d9890c4e063e1422bc7e49f6ebccf52c5e2050ecaec55b1ee27828d6398385fb3c2fe7d19d377a3b70eada99ed236b51562d99eae0c3deb817"}, @generic="f68e5c44becaf3e4af59f029ff441303dfe46a6c77cfbe4ec92b55525bb5730be25d9e669ef47b4b1fe2837960228f7150c00c4f5de1d1b16e140a54626ed8df0d74dbcdc7a5cc9358de7b889bddc0f10a8aeff82d06eee1ff5aa7c8728f731789611920540d1b504d20692914fe190c7d82ee420ddc270a6a74be4592cda26ff123b2f207a938d0ce65c48cc042634d36447f7cc91a5e0a795e0a472bdc2e90e251534c2303feab3336b41dee20d2692ae68002ccd29e5bd77bb9834bdf694ff71e4a8f30db554c8ebb49804aec", @typed={0xe0, 0x16, @binary="e8e9c39c4600918e40d27373b4ed34f8c2c17ad4404c04fedde6777c267bba416e9dc1cf2441b96bae5172abc59d08ecd831cabf6c5151e8e28868db6142c34e7bbf3bb0d0d6d79391e90e946cb8fbc4d606521ad65afe5c60a3f4941297e5b7154da1e8387364d0922a28c33dfee5f1a6279875c6a919810bca724f400f392a9b3979a55911c000c116bbc2f941fa6d6d77313a43e89fdcabb6fa63848cf171dc74af7ca4a928451a8ea6162452a006a156843c38dab85854deff1e314b89799559fce971eccfef18f2ce11063268896595cf9f89e5c94421"}, @typed={0xa8, 0x69, @binary="55b5158069a15aae5e240fd41baee026d104d28a02f4c084134f1b7873a4cd7cfd12db4ac015b3c698792d25923ae72e31e5c851aeae247f3423a5fc130b39254e267e060ecfb6880b7b23c6a4bed90edec1dea765649bafd0dd37bbe24424447179f12a41656e91ca8d90e2f72f19cdc25f87166cb4bca4a98a31243593fe3137e0e59e31c4fa6983ee8f8812d2130d52f3fd7c7ff0d6e9c5b584e0b00af87810"}, @typed={0x8, 0x40, @ipv4=@loopback}]}, 0x253c}, {&(0x7f00000030c0)={0x544, 0x3c, 0x0, 0x70bd26, 0x25dfdbfe, "", [@generic="ed109e331b780526dd03f7f5030e1bacaae6aa10bac5cd2fabc6c4fddfe25711e297c631deda7a07eafc18f41467e30c5d422ffdfd52a63b987566e1b5c1636012db5c786f1fd8a3578d46c96419d3e35566e8515017f5b7c592ab2c91537813", @typed={0x14, 0x25, @ipv6}, @nested={0x16c, 0x7f, [@generic="acd0b36bd8c3ea34dea34f34a781d2e16d125f8735a71283272806fc0c6dd841b9e73d8c26b706cf2e89d5284c2e84ed884779b3512d28f7c0a70e95d2fbca5ae9b5676b0506658197fd0e1e5762c4ac7e3cd821b05fad538b7ebca465a9421cf9c2c1f77f444c015ce15b9877437073dd8370a8bf3c344fc1ffa78af4c0efeb8c7c66c9ecdda0e7ee1354252ddd2f313eb7ed5ef54826840204aea22eea1a02dde6a936b3227190c492c58f3f7fecd6fe", @typed={0xa4, 0x31, @binary="f136c9e33d136281df1547a12acedaa808a19f1d025853923613dcb78584be89ad7eba7bdfe7d00670571f8d41a0a9a4f5f4d6f6dd35a527ad74fc192585f732a40fa45e4643fd23d5c622ff3738ae9989a492dbd925efc79c3136234dd5335864b410232d90cc366f5b5055f2aaf92dd9860e6198c6cc365905995cd34b2c9bb1720d4437b321c1a7d9e3680f26f28dd6e681a9efda1dd80d6718129fa6e5"}, @typed={0x8, 0x1d, @str='.\x00'}, @typed={0x8, 0x32, @pid=r4}]}, @typed={0xc, 0x96, @u64=0x8}, @nested={0x250, 0x0, [@generic="719e1926f43ac45fa1299ac2a67ce7071b3a9254f7ab1eaddbf1eba29b2e16632c", @generic="a12d9f709920cae7ac077f4aa1a7be2818cb73695a9bcdd6fc43a9a337581e5013f2253af81dda68a7f224237aeba0fdc3b08a82b171e2f6ebb21b3eca9efb6576d3a1ba9af4bd17fc388f0cc34b0360723a8f0cbc535aabe130320852fc348b55d4211af9bc8fe75227af0d929bbdf40bfcbc4156ec92a9a019c5c238a742c1eee49e19ba8e2a1a4549023e4f64edfd6d2d0987e8b8f6f318441c2a52d1873775c6ea5a3255bf8d88b0d0524df043f61aca0ef7489f8d9510eca3f9d845ae68664d08230dc7c40a56c6b1b831b7fa1bf5a77b46", @generic="7e5b622eb3ae2cf52b1831296bbb5e61f8a20c9f54a3099b27444b9c890c1f6572e356db945aa7", @generic="5d5461cad4b3ad991a726265894c646c19700fe377a33a8f6b43b39a62a665b20d8c6355e718339fe921498b266c727641cf546b36d5c7c79c3b4aa77def4e9ff29aa5848e578c2c9fd48cce8e30c1f5b6538d91981c3833cdefcab54b7ea351a8047249cfb6db8af777d33320d6dd94f6733e1d5110211d65046692175a46a18ab638213ebc9819f7385303d850e7b6e2ba94f6f03451c7ba461c64d45b20a27dd167cd2cb619c9de671b628a8020c01a59c5345844862abae7f39f22239c5acedb3124d86cc3046c3df8ec823edb41ec5c6abcd394fb645b5f0d8b7ce395cd68b4c07e5951e826344696c2d51e8301feb2d25a967c3a05", @typed={0x14, 0x70, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @typed={0x8, 0x57, @u32=0x2}, @typed={0x8, 0x4f, @str=')\x00'}, @typed={0x8, 0x12, @fd=r0}, @typed={0xc, 0x56, @u64=0x6}]}, @generic="7b43aea3568539d2e6fabe9f75967031f3ba420301f7d763d2ee9426edad5c80c83fb31891727373976fc5115e0e16a6b21f349aaf2c5171eacfb9316b5cf7bab71341887e5133141df62c0c68a90334a84b353602f1fe3ec7ba579d5588b408308a56c70a686835cd5b31898ebb28d7984afbe7b9189716d5f4e2355282c33f96aed9c7798f5c172f981710321db6810cdcca2e759f2f442dc0df0616f8e6edda44669aae71797950c2d6f09d79744d692d425f98674a0d934aec59e5281a2305ebd65b72a23840098ac260fa6e92d6ba0a11c5843ec9247746f268352902a1f4195804adb1cdc74d4f2c76794916677a1669cdd1dbf7e2"]}, 0x544}, {&(0x7f0000003780)={0x370, 0x2a, 0x200, 0x70bd29, 0x25dfdbff, "", [@nested={0x4c, 0x22, [@typed={0x8, 0x7fff, @str='.-\x00'}, @generic="7e26d598c4e72c9f0d9da231bf81544f8c30fc4081b41091d191f70190604720c1049122bf337d0ee52feea4ec3cfe79217c55e70c86765fa4d25e71036290c1"]}, @typed={0x8, 0x8d, @fd=r0}, @nested={0x258, 0x7d, [@generic="4f9b03151d314ef016fb107b74fd072c38b4948b83ff83cd9a1cce933dbdca308e1648945dc123e86aceaea3b18e3d6ca14ebfd2c9fb95c6d49bd865f485d2da56db264709b1067ca56664a35d2409befd05507965902a946394b603ecf4d29bff8daf5cff8fa6fa7ae4fdea9019bfdbaae3ca511cd7f88a4380f95e18c8ee3a00e6a77d185eba0f37720f6cb15d01e79ec5178b277914e2eaecfebe7893f38405d22955326869da1f6d7913fd384c654615d4a6d366ca22f87122cd118ba39aad0230f8a51169ce277c72af06680228f44aa34b22b9dcf4f4ae", @typed={0x8, 0x78, @uid=r5}, @typed={0x8, 0x16, @u32=0x2}, @generic="8430928da5079ae5c6b7fa35a4829bd139180f308cb7d152aed1fdb10f5dc20b5c95eb67b89bf54d5822f8e5a2c8d8122f4e75583abd5fb0e3f634527d024f28874c5958adf56db2e997123b54e733a655bca9e14baa65466ab9560bf798426cea27d60aa4e5256aa6a1666920052cd00ef567dab38ec4d057cfb834e3e095b925c3be0f3894cd435a59875bc5f50af76c015628df867e6477a2db60a2dbb8", @typed={0x8, 0x6f, @ipv4=@empty}, @generic="aa5bff1c3cf6260e5f4cd9562b383c5da829257280b7546feb96b3a4bbe57aa26e1b777f2273f6a44ff2996bcb921a4fb320f4027648b4adfc18c4e00e6cae5fe3227ea0ae56c8feacc9ee237874ee04da324abf6414514794303406e4719a76ae09df9f482bb42dd20f59172bb757affbc505cabb923eaa31f0bf35df38ddbfa29d4c5c3c2cd8ead3743f1154f12b806ae904599ae2492964cde489c8d03699c737dafe0168e1dd42fb66afbd031b07ec8bf0eb48c3870a9af846bae1ba67c18343"]}, @typed={0x68, 0x67, @binary="6b96f7364dc02dd0195045813c6882e50d25d532a06782215984e4d36c3338df2b62b2a11c52011e08d3cd45eb21c19cab995ea82b3182ad636da970e53d06690a5da9e9ae793c86cd08d931d741bc51fc38520defc49c8f4df92f17ad02d4ae68dd6f02"}, @generic="d2b1b38764a8d77df01b3751e60c8d9dc1c88fe705c39f8700a2e4e9f4a8f6e0be32d9cb37673675ad3a6920481f66377b1b6a8da156d3f5fd3d", @typed={0x10, 0x94, @str='^-user}GPL\x00'}]}, 0x370}], 0x6, &(0x7f0000003b80)=[@rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}], 0x30, 0x80}, 0x4008000) 20:49:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r1 = dup2(r0, r0) connect$netlink(r1, &(0x7f0000000080)=@unspec, 0xc) write$P9_RLINK(r1, 0x0, 0x0) 20:49:25 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r2, 0x4001000000) sendfile(r0, r0, &(0x7f0000000100)=0xf10001, 0xeffffdec) close(r1) bind$alg(0xffffffffffffffff, &(0x7f0000000ac0)={0x26, 'aead\x00', 0x0, 0x0, 'ccm_base(ecb-aes-aesni,crc32-generic)\x00'}, 0x25e) setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000080)=0x64c5, 0x4) write$binfmt_aout(r2, &(0x7f0000000280)={{0x10b, 0x3, 0x7fffffff, 0x131, 0x355, 0xff, 0x11c, 0x54}, "063594d8dea7207c2b06fbe876f5d6b9d57d42cde30e", [[], [], [], [], [], [], [], []]}, 0x836) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) 20:49:25 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @remote}, &(0x7f0000000100)=0x10, 0x80800) getsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000140)=""/32, &(0x7f0000000180)=0x20) openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x66, 0x12d2c0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000200)={0x1, 0x7fffffff, 0x200, 0x800}, 0x10) memfd_create(&(0x7f0000000380)='security.SMACK64TRANSMUTE\x00', 0x3) kexec_load(0x0, 0x0, 0x0, 0x160000) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000000)={0x3, 0x4, 0x8000, 0xffff, 0x4, 0x40, 0x20, 0x2, 0x0}, &(0x7f0000000240)=0x20) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e23, @loopback}}, 0x5, 0x1f}, 0x90) 20:49:25 executing program 1: 20:49:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x410082) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000100)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000600)={0x6, "2009b051c9e01069870246c7d6ac8475f127262405b596a7490de1421a407c44", 0x1, 0x40, 0x3f, 0x5, 0x8, 0x1, 0x81, 0x80}) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getsig(0x4202, r2, 0x2, &(0x7f0000000500)) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000080)) syz_open_dev$dspn(0x0, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r4 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r5 = socket$inet6_sctp(0xa, 0x9, 0x84) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000580)=0x8, &(0x7f00000005c0)=0x4) ftruncate(r4, 0x1000000) sendfile(r3, r4, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r3) fcntl$setstatus(r5, 0x4, 0x800) 20:49:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:25 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0xfffffffffffffff7, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:25 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0xfffffffffffffffe, 0x2, {0x0, 0x7}}, 0x20) socket$inet_smc(0x2b, 0x1, 0x0) 20:49:25 executing program 1: 20:49:25 executing program 2: kexec_load(0xffff, 0xffffffffffffff44, 0x0, 0x2) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x8, 0x800) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'user.', ']:loGPL\x00'}, &(0x7f0000000080)='\x9c#keyring*\x00', 0xb, 0x1) [ 444.332110] hfs: unable to parse mount options 20:49:25 executing program 1: [ 444.450679] hfs: unable to parse mount options 20:49:26 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) 20:49:26 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x800, 0x0) write$P9_RWALK(r0, &(0x7f0000000800)={0xffffffffffffff5c, 0x6f, 0x2, {0x1}}, 0xfffffffffffffdfc) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x4f8, 0x328, 0x0, 0xf8, 0x0, 0x0, 0x460, 0x460, 0x460, 0x460, 0x460, 0x5, &(0x7f00000000c0), {[{{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x8, 0x401, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x2, @loopback, @broadcast, @port=0x4e22, @icmp_id=0x68}}}}, {{@ip={@local, @remote, 0xff, 0xffffffff, 'caif0\x00', 'syzkaller1\x00', {0xff}, {}, 0x3f, 0x1, 0x26}, 0x0, 0x98, 0xd0}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x1, @local, @multicast1, @gre_key=0x401, @gre_key=0x1f}}}}, {{@ip={@local, @multicast2, 0xffffffff, 0xff, 'bridge_slave_1\x00', 'rose0\x00', {}, {0xff}, 0x8, 0x1, 0x58}, 0x0, 0x100, 0x160, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x3, 0x2}}, @common=@set={0x40, 'set\x00', 0x0, {{0xfffffffffffffffd, [0x3ff, 0x40, 0x8, 0x80000001, 0x33, 0x7], 0x2, 0x9}}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x7, [0xc95, 0x7, 0x8, 0x1, 0x8000, 0x80000000], 0x498, 0x1}, {0x1, [0x1, 0x6, 0x6, 0x2, 0x1, 0x1], 0x3, 0x20}}}}, {{@uncond, 0x0, 0x100, 0x138, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x5, 0x6, 0x80000000, 0x1}}, @common=@set={0x40, 'set\x00', 0x0, {{0x7ff, [0x0, 0x80000000, 0x4, 0x8, 0x110000000000, 0x9], 0x4, 0x6}}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x19, @loopback, @dev={0xac, 0x14, 0x14, 0x14}, @port=0x4e21, @port=0x4e20}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x558) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000006c0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x53, @dev={0xac, 0x14, 0x14, 0x27}}, 0xc) recvfrom$inet(r0, &(0x7f0000000040)=""/39, 0x27, 0x0, &(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)=0x0) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f00000007c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r1}) 20:49:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:26 executing program 1: [ 444.726525] hfs: unable to parse mount options 20:49:26 executing program 2: ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000080)={0x7, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {0x0}]}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x400, 0x0) fstat(r2, &(0x7f0000000240)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x6a, 0x100000000, 0x100000001, 0x1000, 0x401, 0x9, 0x101}, r3}}, 0x120) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f00000001c0)=0x400) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000140)={r1, &(0x7f00000000c0)=""/108}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000005c0)={@local, @local, @local, 0x8, 0xb75, 0x40, 0x100, 0x8, 0x2480002, r4}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000200)) kexec_load(0x0, 0x0, 0x0, 0x0) [ 444.797502] hfs: unable to parse mount options [ 444.880061] QAT: Invalid ioctl [ 444.896883] QAT: Invalid ioctl [ 444.905383] QAT: Invalid ioctl [ 444.929257] QAT: Invalid ioctl [ 444.950075] QAT: Invalid ioctl [ 444.972657] QAT: Invalid ioctl 20:49:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e22, 0x1000, @loopback, 0x100000000}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0xfffffffffffff222, 0x7f, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x3}], 0x48) kexec_load(0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000240)={@local, 0x0}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="500000001807000000000000dfdadf251c0080010002ff00000400001400010000feffff00040000000e000000f0ff0001000000000000f0ffff0000000008000400", @ANYRES32=r1, @ANYBLOB="08001a00ff000000"], 0x50}, 0x1, 0x0, 0x0, 0x1}, 0x90) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r4 = msgget(0x2, 0x4) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000180)=""/127) r5 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r5, 0x1000000) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000080)={0x29, 0x3, 0xe, 0x14, 0x8, 0xfffffffffffffffc, 0x3, 0x145, 0xffffffffffffffff}) sendfile(r3, r5, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r3) 20:49:26 executing program 1: 20:49:26 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(r0, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:26 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000100)={0x10000, 'syz0\x00'}) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r3, 0x1000000) splice(r0, &(0x7f0000000140), r1, &(0x7f0000000200), 0x3, 0xb501c82eaf3a272e) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x3e) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f0000000040)={0x20, 0x100, 0x1, 0x9, 0x10, 0x100}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:26 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = userfaultfd(0x800) r1 = inotify_init() tee(r0, r1, 0xffff, 0x0) 20:49:26 executing program 1: 20:49:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000040)={'veth1_to_bridge\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080)=0x20, 0x4) r4 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000003) sendfile(r2, r4, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="200026bd7000fddbdf2501000000000000000b000000000c001473797a00"], 0x28}, 0x1, 0x0, 0x0, 0x5}, 0x8800) 20:49:26 executing program 2: kexec_load(0xfffffffffffffff7, 0x1ca, 0x0, 0x80000000004) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000040)="03b2537b17ef282ebe1bc693bacb564d749c84b233cc14e81e65fcf4d46c88ee3981398e829947110c13e6b8226b156a41dde7de7db95a7f2eea92f00c60f1390ca083d5f21d2ae0881ab97c7e8ecd84ca9e4a0db181ecb77729ea421297614cf04ebb046bd4d9bf3907a3c198227478c517f2d5b3cccb562d70bda827b1d85f0ac994599041ef019224bdca35ebc8a27cdb379827d77f8f4514ab2135d39778686560d350d07df8f858f763beae732d366ffdee102499d508a5a720c2db62dd442481ecfc9769855016ff6065ef610edc2ced7d5c96bf336e4a6b4d2e58998ffad6464a51d039482e") ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000140)={0x6, 0x6, 0xa, 0xb, 0x9, 0x81}) 20:49:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x10021, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc0445624, &(0x7f0000000100)={0x40980818}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 20:49:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:27 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x1a200, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000040)=0x4) socket$caif_stream(0x25, 0x1, 0x200000000000005) 20:49:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x10021, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc0445624, &(0x7f0000000100)={0x40980818}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 20:49:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5ad, 0x0, 0x0, 0x81, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000080)) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000040)=ANY=[@ANYBLOB="0151de0dd0366a6002811b62f16695f0645d"]) [ 445.659861] hfs: unable to parse mount options [ 445.715420] hfs: unable to parse mount options 20:49:27 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000040)=0x1) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) ioctl(r2, 0x1000, &(0x7f0000000100)="be192418acc7034eb24c3b62bab5162179836e3d9056a7d5a865d150bc74c8d2f53c6f4d52d42c183245ba11598da3c94f2546729f1fda908a2ac6435d206d9272a5cfd3cc3f546bd95c0fccb001ad35ed3d34228decc100c979a2f8228f895ec9f1c3202131cf6ebe276ce61a74cd9c08b9dd349587bbbcf7f47d1f2cfa200a328e2de305babb7d531dfe324d8ba8f10066ecdd83a3caf682e5a238595dbc18d8c1dd688ed82cdc5978b6a1754a82ac41feb68b987d605d702bb1df3be82decf76a94064374d7c570d1") bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:27 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:27 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) close(r0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_buf(r0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f00000003c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x4, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 20:49:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0xfffffffffffffffe, 0xc0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:27 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xfffffffffffffc01, 0x2600) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000080)=0x5) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f00000000c0)={0xb, {0xfff, 0x1, 0x1000, 0x445f}, {0x6, 0xfffffffffffff047, 0x1, 0xfff}, {0x4, 0x1}}) 20:49:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 446.067484] hfs: unable to parse mount options 20:49:27 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) r2 = dup2(r1, r1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000200)) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1a) ioctl$FICLONE(r3, 0x40049409, 0xffffffffffffffff) write$P9_RSTAT(r2, &(0x7f0000000180)={0x58, 0x7d, 0x0, {0x0, 0x51, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '/dev/full\x00', 0xa, '/dev/ptmx\x00', 0x0, '', 0xa, '/dev/ptmx\x00'}}, 0x58) tkill(r0, 0x1000000000016) 20:49:27 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000040)={0x4, 0x8, 0x2, 0x0, 0x0, [{r1, 0x0, 0x3}, {r0, 0x0, 0x3}]}) r4 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x80000, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r5, 0xc0585604, &(0x7f0000000140)={0x1, 0x0, {0x7, 0xcf, 0x0, 0xd, 0xa, 0x7, 0x1, 0x7}}) socket$inet6_sctp(0xa, 0x5, 0x84) r6 = getpgrp(0x0) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000380)=r7) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f00000001c0)) fcntl$setown(r3, 0x8, r6) ftruncate(r4, 0x1000000) sendfile(r3, r4, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r3) 20:49:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x2, 0x0) write$binfmt_aout(r1, &(0x7f0000000800)=ANY=[], 0xfffffd5b) [ 446.167542] hfs: unable to parse mount options 20:49:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000100)={{0x57ab, 0x6, 0x1000, 0xffffffff, 0x6, 0x3ff}, 0xfffffffffffffffc, 0x7, 0x7fff, 0x3ff, 0x1, "49b2bb6aa6d81feaa81e471348eb06f473f423a5f839e13704ebe6dfdad127db4b4802d240e9d343b131b8cc94753f32d8da4699acf19edc8d3084d4ef2ec4a40fb45037d9bf1288f8c88a4e38e62832ea34fb7cdba71e8e50b929eb31dff15d8b04da04963eef4e79b3c8420aa8e589b3d759c76a56bcbdead1afb8703f5369"}) 20:49:28 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) r2 = dup2(r1, r1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000200)) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1a) ioctl$FICLONE(r3, 0x40049409, 0xffffffffffffffff) write$P9_RSTAT(r2, &(0x7f0000000180)={0x58, 0x7d, 0x0, {0x0, 0x51, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '/dev/full\x00', 0xa, '/dev/ptmx\x00', 0x0, '', 0xa, '/dev/ptmx\x00'}}, 0x58) tkill(r0, 0x1000000000016) [ 446.619784] hfs: unable to parse mount options [ 446.728845] hfs: unable to parse mount options 20:49:28 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) socket$rds(0x15, 0x5, 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendto$rxrpc(r0, &(0x7f0000000100)="f658a12f237f7c7fa851b59ed314a7a74a0f238ae3f3cddf16b1ac94bfc413fee0dcaf437412bd168baecffdae244d22b3092c67a7c85cf11184bc72219251105152a553aac8f302b04d7c657a6ab397d5d7fbb122b903d0d179b9842674c216f905486c93cebe4708588fa777080c077d9b97a622f2fa02da8c15dc6f599ef095645588d4c87b480376c9dcae5b98b56b80489de4ce732bf60c09e72453d7e331be3ccac2082fe2280477be0ad31c", 0xaf, 0x40000, &(0x7f0000000040)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e23, @remote}}, 0x24) getgroups(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x113, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f00000001c0), r2, 0xffffffff}}, 0x18) 20:49:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) ioctl$KDDELIO(r0, 0x4b35, 0x3f) 20:49:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:28 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x2000000) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f0000000100), 0x405) close(r1) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:28 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) r2 = dup2(r1, r1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000200)) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1a) ioctl$FICLONE(r3, 0x40049409, 0xffffffffffffffff) write$P9_RSTAT(r2, &(0x7f0000000180)={0x58, 0x7d, 0x0, {0x0, 0x51, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '/dev/full\x00', 0xa, '/dev/ptmx\x00', 0x0, '', 0xa, '/dev/ptmx\x00'}}, 0x58) tkill(r0, 0x1000000000016) 20:49:28 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) fadvise64(r0, 0x0, 0x7fff, 0x4) 20:49:28 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x4, @empty, 'bridge_slave_0\x00'}}, 0x1e) 20:49:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 447.472971] hfs: unable to parse mount options [ 447.575284] hfs: unable to parse mount options 20:49:29 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000480), 0x7536aeb8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000100)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:49:29 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) r2 = dup2(r1, r1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000200)) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1a) ioctl$FICLONE(r3, 0x40049409, 0xffffffffffffffff) write$P9_RSTAT(r2, &(0x7f0000000180)={0x58, 0x7d, 0x0, {0x0, 0x51, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '/dev/full\x00', 0xa, '/dev/ptmx\x00', 0x0, '', 0xa, '/dev/ptmx\x00'}}, 0x58) tkill(r0, 0x1000000000016) 20:49:29 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) sysfs$3(0x3) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:29 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 447.852398] hfs: unable to parse mount options 20:49:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x404, 0x1000000000000) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000000) sendfile(r0, r1, &(0x7f0000000080), 0xeffffdef) close(r2) [ 447.932679] hfs: unable to parse mount options 20:49:29 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) dup2(r0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000040)=""/32) 20:49:29 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:29 executing program 2: gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) r1 = dup2(r0, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1a) ioctl$FICLONE(r2, 0x40049409, 0xffffffffffffffff) write$P9_RSTAT(r1, &(0x7f0000000180)={0x58, 0x7d, 0x0, {0x0, 0x51, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '/dev/full\x00', 0xa, '/dev/ptmx\x00', 0x0, '', 0xa, '/dev/ptmx\x00'}}, 0x58) [ 448.302735] hfs: unable to parse mount options [ 448.403653] hfs: unable to parse mount options 20:49:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x4040, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000080)={0x7, 0x33, 0x2}, 0x7) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e21, 0x3ff, @loopback, 0x9}}, 0x1000, 0x7ff}, &(0x7f00000001c0)=0x90) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x80001000004) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:49:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\xfd', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:30 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000140)=0x8, 0x4) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x179) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r4 = gettid() getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f0000000100)={r0, r2, 0x34d}) getgroups(0x0, 0x0) readahead(r1, 0x6970, 0x5) recvmmsg(r3, &(0x7f00000008c0)=[{{&(0x7f0000000180)=@isdn, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/87, 0x57}, {&(0x7f0000000280)=""/126, 0x7e}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000380)=""/229, 0xe5}], 0x4, &(0x7f00000004c0)=""/180, 0xb4}, 0x5}, {{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000580)=""/178, 0xb2}, {&(0x7f0000000640)=""/218, 0xda}, {&(0x7f0000000740)=""/20, 0x14}], 0x3, &(0x7f00000007c0)=""/217, 0xd9}, 0x20}], 0x2, 0x10040, &(0x7f0000000940)={0x0, 0x1c9c380}) 20:49:30 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000040)={0x4, 0x8, 0x2, 0x0, 0x0, [{r1, 0x0, 0x3}, {r0, 0x0, 0x3}]}) r4 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x80000, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r5, 0xc0585604, &(0x7f0000000140)={0x1, 0x0, {0x7, 0xcf, 0x0, 0xd, 0xa, 0x7, 0x1, 0x7}}) socket$inet6_sctp(0xa, 0x5, 0x84) r6 = getpgrp(0x0) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000380)=r7) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f00000001c0)) fcntl$setown(r3, 0x8, r6) ftruncate(r4, 0x1000000) sendfile(r3, r4, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r3) 20:49:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r4 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$DRM_IOCTL_SET_UNIQUE(r2, 0x40106410, &(0x7f0000000140)={0xaa, &(0x7f0000000080)="f560a3089c50e10b83af9cc1815236fe1ab5d25dfa83d1f856ea7847a6813b6475405f80fa1baf49b2269af080a59ddfe5945dd8da92867ac78e605ae27e6f47fa6dad162585f75a3301b6bfb9bd80c7cce50cbb7243e79a3212afa99cb5cb8d6ed371aa34e43223bc583a629432d64a3247bbd073fe12df4df1f965ab4d5235cb9fd7dc48fbe4622aa13522163cd70779190e6bae5f6160dbfe41adf16e128dc24e129c303babf1296d"}) ftruncate(r4, 0x1000000) sendfile(r2, r4, &(0x7f0000000040)=0xf10001, 0xeffffdef) close(r3) ioctl$TIOCSTI(r1, 0x5412, 0x2) fcntl$setstatus(r0, 0x4, 0x800) 20:49:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:30 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r2, 0x1000000) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000280)="6242df4c671c5ffb5a10bcde6d31c9b0dfb40749027c2817bdbd56546d4403d2efef8bad91d659f3271bc2239dc1494329993cb9c23efd8dc85ef866198445768994732d974a31880a7c5a19d74c18a20895c39c3ec17bd5e3967aaf88d67fd38af93090a7d73b5f1aad995215d370dcb7e9c7b75a8094815e78fc247a013792c22f08c486ccceeec747ea0a8dfa2225b681913c343b", 0x96}, {&(0x7f0000000340)="a375e757d4a2a53afe2ea49fcca015de29e2e94aae8c932d156dfda4f058daf7433b3eaabc5e896be80e14aef37a58ac75a8bae8cbb348f75f8fd59f3f372c65120e0706f6dfe28a73a5f89a34269652a2a31f6f98821dae7ff7ed7a5678ec212b43daecf99e0cc11206a836b65b013517185c495c56ee5d6bf3ba0107bf4d136b3d13035ccff51bca86be1c11e597a6ce0b7138d4b7d44e0fb7ce3ebe408c9db633ff8ed9ec37d117aa94992f758e6d00d3f0fae864bc23ee2d415fb270de2887d773947b35bf0419d93dd8d6f930fb10b993aedd24d4d5854eef90a9f4", 0xde}, {&(0x7f0000000040)="72c4a710aa8711912a2dcf70c83435c65877aabb37cccd19615bdae59567ffbc76ecdc850b214a350a870c", 0x2b}, {&(0x7f0000000100)="a8906af41ba0f8e333a9c203153daa959696481749ae571181f85ae75c9177f22efb41106f4196169b59b605645aecde33462445853db8d76f0235c2dd8fd9dc33db7b440a4b3f30a32b7d9c157309434d732812d54ca1e7d296826fa5bb88232d625b1ec1033037429612c1f6f858", 0x6f}, {&(0x7f0000000080)="7b82b071c6ac93d44590ab1d02ef81ea1977faf176f5479a8ad6b4c0cd483ca4dc2331d836aad78151ff6347", 0x2c}, {&(0x7f0000000440)="9a431efc0fe90c7e3712d7b6dd2313f184924cda0f7ec7fe023b955ebfadcbeee46645a45d2b14730b63dbba00edb6ed516526d7b1af14c36132dfc5ea9d1c05e84e1086f054d4214d4aed6bcdfe90932e2c72fbef32c0604147f8a60c6ea0e359d64d39f52814b70dd1484987023e05223ff2ca9a7482dd633a69da509dc44330e85debba8b0ffb48b0b467f013d66b2b20bc11a6d35945a41d3dd13248b4251d50b23fa7636f58013e6afdbc72b87fa8c3d218acf17a2fd1cf1d68b688e86d2f5d73c062e0cefd3f942660fd95806668a006da1f8c9c2051aac1b47151049c9de7644e64b9be0b22aae4d0e3496802", 0xf0}, {&(0x7f0000000200)="6ddad30069ec92250ada561febdfc44cbcb4f6e52acf6ecc56dc34c8b533752f", 0x20}, {&(0x7f0000000540)="aa1f84e0488e11de582b0ae1dba831fedc33f2bd3c9c1d0cc1372c", 0x1b}], 0x8) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) r3 = shmget(0x0, 0x3000, 0x54000002, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/5) close(r1) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:30 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) dup2(r1, r1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1a) ioctl$FICLONE(r2, 0x40049409, 0xffffffffffffffff) tkill(r0, 0x1000000000016) 20:49:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000140)={0x3, 0x8, 0x9, 0x3, 0x0}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=r4, @ANYBLOB="38000000a2a260480f136379867299f0791b6317390bfdc365efddfa298a26a4bcee2542314e4465983e19cb21d1d985eb942e9588dc6519f001341a3d6ad80616672886cdfaeb48fbc6391abbdc5a4cda55bb807285bcd482f3798dd5009eccaf0325c28d0d3ac086237d66446f6faa7a51f8e67f0acbe1847de9fd705b035768e033bd7b75a52c0356076d1deb4ce72421850f4f3a97f2ed2389f1c5e37f4dd63afb28bffb5c756e14d358560182cb654f0e5fd31c9f1e1026ae208fcb725997aa5476c2f82a0c79"], &(0x7f0000000200)=0x40) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000040)={0x3, 0x2}) r5 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_SIOCGSKNS(r5, 0x894c, &(0x7f0000000100)=0x9) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) [ 449.123717] hfs: unable to parse mount options [ 449.199356] hfs: unable to parse mount options 20:49:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth0_to_bond\x00', 0x0}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)=@newsa={0x100, 0x10, 0x200, 0x70bd2b, 0x25dfdbff, {{@in6=@loopback, @in=@remote, 0x4e20, 0x2, 0x4e24, 0x1, 0xa, 0x20, 0x80, 0x3c, r4, r5}, {@in6=@mcast2, 0x4d2, 0x32}, @in6=@ipv4={[], [], @broadcast}, {0x6, 0x101, 0x5, 0x200, 0x7fff, 0x0, 0x27c8b959}, {0x5a968c0d, 0x100, 0x100000000, 0xff}, {0x1, 0xb3b, 0x1}, 0x70bd26, 0x3500, 0x2, 0x5, 0x2, 0x4}, [@ipv6_hthresh={0x8, 0x4, {0x3e, 0x1e}}, @proto={0x8, 0x19, 0x2b}]}, 0x100}, 0x1, 0x0, 0x0, 0x4000004}, 0x1) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) [ 449.507662] hfs: unable to parse mount options 20:49:31 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) dup2(r1, r1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1a) tkill(r0, 0x1000000000016) 20:49:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000000)=0x200) syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000080)='\xac\xfe\xad', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) r3 = msgget$private(0x0, 0x140) msgctl$MSG_STAT(r3, 0xb, &(0x7f0000000100)=""/208) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000200)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r4, 0x800, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) close(r1) [ 449.606462] hfs: unable to parse mount options 20:49:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:31 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f00000000c0)=0x4) ftruncate(r1, 0x8336) sendfile(r1, r2, &(0x7f0000000080)=0x100000f10001, 0xeffffdef) close(r1) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x2, @multicast2, 0x4e24, 0x0, 'rr\x00', 0x0, 0x1f, 0x76}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000140)={0x3, 0x8, 0x9, 0x3, 0x0}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=r4, @ANYBLOB="38000000a2a260480f136379867299f0791b6317390bfdc365efddfa298a26a4bcee2542314e4465983e19cb21d1d985eb942e9588dc6519f001341a3d6ad80616672886cdfaeb48fbc6391abbdc5a4cda55bb807285bcd482f3798dd5009eccaf0325c28d0d3ac086237d66446f6faa7a51f8e67f0acbe1847de9fd705b035768e033bd7b75a52c0356076d1deb4ce72421850f4f3a97f2ed2389f1c5e37f4dd63afb28bffb5c756e14d358560182cb654f0e5fd31c9f1e1026ae208fcb725997aa5476c2f82a0c79"], &(0x7f0000000200)=0x40) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000040)={0x3, 0x2}) r5 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_SIOCGSKNS(r5, 0x894c, &(0x7f0000000100)=0x9) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:49:31 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000280)) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) [ 449.995640] hfs: unable to parse mount options 20:49:31 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) dup2(r1, r1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(r0, 0x1000000000016) 20:49:31 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 450.103688] hfs: unable to parse mount options 20:49:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:31 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x20000000000, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 450.477210] hfs: unable to parse mount options 20:49:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x200) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:32 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) dup2(r1, r1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") tkill(r0, 0x1000000000016) [ 450.595447] hfs: unable to parse mount options 20:49:32 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000080)={0x42, 0x0, 0x2}, 0x10) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)=0x7) accept4$rose(r0, 0x0, &(0x7f0000000040), 0x800) 20:49:32 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) dup2(r1, r1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1a) tkill(r0, 0x1000000000016) 20:49:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:32 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x12000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fcntl$getflags(r0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x113, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x1, {0x2, 0x80, "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", 0x6f, 0x0, 0x10001, 0x0, 0x3, 0x8, 0x5}, r3}}, 0x128) 20:49:32 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) dup2(r1, r1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)) tkill(r0, 0x1000000000016) 20:49:32 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000040)=0x2) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(r1, 0x0, 0xffffffffffffff90) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5ad, 0x0, 0x0, 0x81, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000080)) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000040)=ANY=[@ANYBLOB="0151de0dd0366a6002811b62f16695f0645d"]) 20:49:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x121000, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000040)="5d81a053f8559e89da6a1d29fef877ed", 0x10) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) setsockopt(r2, 0xfffffffffffffffe, 0x7, &(0x7f00000002c0)="109a78c0b9d216fda9fdc8aa59d4cf4e86c81c0467482637068da0c038a51a53ad4823bd8144a353a1a2182c46277e93206f04e3a41821c4893580e5d0cfade95ba9f090be37c9021996cb9311bae72d4ab1ef927fb2dd956549b7ee8b038b5ee5a79e202ab861063028dfdfe6061e24b0a203025389477b3d1a7271e43789", 0x7f) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000200)="440f0766ba2100b000ee420f229f66baf80cb814ffb88def66bafc0c66b89d0066ef4d0fc79801000000c74424002a000000c7442402f25c0000ff2c24b9ee0800000f3264430fe357ee266567642e0f01cbc7442400f23f0000c744240267990000c7442406000000000f011424", 0x6e}], 0x1, 0x6, &(0x7f0000000280)=[@efer={0x2, 0x1100}], 0x1) ioctl$GIO_FONT(r3, 0x4b60, &(0x7f0000000100)=""/209) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x400, 0x0) ioctl$int_out(r4, 0x2, &(0x7f0000000400)) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000340)='{\x00') close(r2) fremovexattr(r1, &(0x7f0000000380)=@known='trusted.syz\x00') 20:49:33 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(r0, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x7fffffff) 20:49:33 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) dup2(r1, r1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/11, 0xb9) tkill(r0, 0x1000000000016) [ 451.736612] hfs: unable to parse mount options 20:49:33 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x80000000, 0x80002) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f00000002c0)={0x3, 0x1, [0x9, 0x3, 0x8, 0x3, 0x7, 0x5, 0x4, 0x1]}) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000001) sendfile(r1, r2, &(0x7f0000000300)=0xf10001, 0xeffffdef) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video0\x00', 0x2, 0x0) close(r1) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x10f, 0x1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) r3 = dup3(r2, r1, 0x80000) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000280)={0x0, 0x3, 0x1}) [ 451.854516] hfs: unable to parse mount options 20:49:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\xfe', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:33 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xfffffffffffffffe, 0xff99, 0x0, 0x0) fcntl$setownex(r1, 0xf, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) r3 = getgid() fchown(r0, r2, r3) r4 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r5 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r5, 0x1000000) sendfile(r4, r5, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r4) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:33 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x2, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000040)={0x1, 0x0, {0xfad, 0x1, 0x301a, 0x7, 0x0, 0x7, 0x1}}) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) mq_timedsend(r0, &(0x7f0000000100)="bea5163967924e931fbab7586a2d5155e314f80d3cfbda3cd9e7ffea0677e0572c334f7ef61f3b85b00b9e6ab578ea5690076a41630b153df8503776be2d536f9b8bc5c4181ac6c97e8cac3473734bc1df4b2f47d917b03758179587c957167e99bd77875287baf87157d8b7d6bcc010d3c59fd28ef1842aa4a20271aa6a9128fb4e4c152835f0333523c68b2551b60a0ce5906f1fa261a05b87ec228044ad4940a6571e1de0d93798932a17cb4391ce03e907", 0xb3, 0x1, 0x0) 20:49:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x200) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000100)={0x1, 0x0, [0x8, 0x5, 0x80, 0x7, 0x5, 0x5, 0x7, 0x2a78]}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000040)=""/89) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$KDSETLED(r1, 0x4b32, 0x5) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:49:34 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) dup2(r1, r1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) tkill(r0, 0x1000000000016) 20:49:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:34 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) faccessat(r1, &(0x7f0000000040)='./file0\x00', 0x190, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)=0x0) r4 = geteuid() r5 = getpgid(0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0) sendmsg$nl_generic(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f00000012c0)={0x19fc, 0x23, 0x2, 0x70bd26, 0x25dfdbfb, {0x1d}, [@typed={0x4, 0x3}, @nested={0xc, 0x59, [@typed={0x8, 0x86, @pid=r3}]}, @nested={0xb8, 0x1c, [@typed={0x8, 0x6d, @uid=r4}, @typed={0x8, 0x26, @ipv4=@local}, @typed={0xc, 0x28, @str='em1,--*\x00'}, @generic="13946c652fcbb652b44628deeea817c2c80ef3083bf708df579ddf904547050b6d78685e9f5c260fbdb352d2bbb0a4af07442055ee102dc2bdaee34e65904a1c10cd823cb07a81d13935615edf68fe45f9fe0c5d5fa7a5456fa76ff1188824c160c9480f7282145bdbd3968a6f350145198135b5495fd2b61dde49fc77bfb5dccb01dc91db39aedccbc7ffa7e9ec320b1ce29fc4ad192275"]}, @generic="86d4473f145b15c09f9693fe15764bf98e40d0aca4d05aa3c31d619c844b5e78253087309531bed1047d1543a36824da800e0f515fe509eccb03adc942a67aebe4d3e2d4ee37e210a9f5bb3b8f4dc34ff560fb9d61344c5f34394a48c8d61efa63e5acde3557c660d1b9b3d4ba91b9a8cfae1399fa481e33d61ba7b50ce3bcb16a42fabd55bb18", @typed={0x8, 0x25, @u32=0x3}, @nested={0x1358, 0x8, [@generic="9aabd361db071edaa71f4627ab5c7b266ba0ec4b428d67a63a126d3a91a4fed534ecd1ec28e99b017e07ca39ce40bef3841a4d7857f6848fd334c3381f68c06405a91196a2a0a06d58358e0d1bf7c435681a5799ec745e2bf45c1ecb7ddfb4ceee5dc4a5b6aaf7e2758db68ac80f6fc34d898eda929f7c05ef3bd63fd5b697e799222adc4f20b839828dc3a70033bdf04c6131a4a6cfa7cb0a5cc0aec5b030bc2cbe6704149458db22f152c00b1871c4d52f29eb90e6d311e371bb80a7cb821c697449a5f7b5c767944b1206f537ea21883bc5052a5820035f28f20094279c8d95592b", @generic="2d5632348bcabd3c809f29228164a716e6c57e77a2f767b036dbcdf377759f7665c942934406b2e944b1949ea551403ceed0159c82abac04ae321ac916855fd7facdd506c9bfefd8cdddc4dc0493b537dca43c7510aa906c204e39cc1f58e6d05ee22e2f5ad2f6d2bb921fb64ec19ee6c1f65c686351cacada139bf96473a9baf79adb6edef004b34113ae565c099eb5b755421c33fbfa707e61dbd5ad4f3a5be88b77714f321aa84c2257ce246ff5d0566e83e2607ac5de7cba670b160d6fa7ac38a6430a9c798cb0d8a618f17320f6341c893c13c88c4e9ff8991c6f3d46a5a673a87770d1f7f3c5115d3a20ed7551598a85f6e7965254b00f52106c5a37e92a2581746c9569b8011d9ca5ab8ab48f20f859dffece71372764730cf6709b8a2690ba39b232442b002b3bc890d9aaebd699038cdb0dddd1e3a897407cdaa9079cc08ac9703d3c65ac7de12e6311cd7e0ad0e87dbbd5a3ab8a371fbe995a4ecd7d466ba5bf882573cfc4f799daede1e0f5fbb441d742c1feb6563ef21829c8bcc06815a28f0ead45f045b48845a701106131ac48a96f95038875007f4385f23ab6355d0d55013cb864037b294e0545beeabbc03aaa6e9bdb0d52cc6865c610963eaea411f07c718914e5d4bfa50381cdd2a194c50e877c2d5b9f366abea71d18d9a9aa40c6dcd7fc12ed8127f601ddc3aa96ae7eb645878edb5e3487166f0e2e8bdc18489de8c91044fc7183b4122adfb434814123314699752ddc04a9bf1f0c6b42e9ab9f0ae7e3fcfd949df786566e9c0a0276ba5afec7476a9f856d888f71536ae41593d144c7f36ce45c46a733c90afbe87cc90464d9f342d70cfdea45fad43c0574487812234bb35aa02241703592fcbd0e9d27395b4f9cb76f0f7a6446aa378ff9478a2b05b04bf4e3445866b78dd604984d3c135c780b0fcb0da47efbde36387608984862e04c510412f8bdcfdef3ab6eb7e66e5d069dcf9b8234d5a4a119eb1a0da041566e2c091a2903acd18c9a170762bb464b9db0de39324ebd7967ae1072b5133abd4109f692745d5dd46e1bc6dd3cc04c565deec22f77315cc64f2208feb1d1eed4b0322d58f70b40659c0fbe78c262c746caac08879123bad6175b788bdd9cbef7711c46cd77cab65429f57efd742c5887db951903db3e2bfde244827247b14ec3d9a5a4bf73e3d9e8fcd860ccace625f4d7457c50b77e905dee8b70551133bd66f690e78297b17a65f32d1b0342b9b03988bec05111bdcc97c54d357040e2533a868b654749b9653ae0adc46b06255c0fae478c71beed600278179f75d689a1c0d95a3973dcdb2288ccc6b4f34bab44d29aff0aeb5e61c63a1549996bf7dd5a3e21fe37aa896314cba0565ac35cce9ff8adac1f2144f2c06d3aa23ca61610003691523823e1345f1fab14f7b9e24a16c332418839186797130acb291bdf7979b059d9171034bdf047810f5db26d4cacfb277c9b921e07a27e134020aef433ecdb2b9f6bad8b12f08d78ac2086135aca1996a787047595e28ffdd33545da4b286b745dbc1005b901d69490c239b7ce4029210e2cba2f811265c41421feb476f769f048c83063e15d45926fcd938757cc3394d3949141b6bde5a8ddd9bb0e299dac361d5cb7d7672c68a2c7c3f0ca3eaa9aa42510d3cfd82bb9a4c4c3583c4aec4f7c92a4d218f2b66bfe6093697a3b639403b167365d21d6f7c5d13afc6c5ecf8f86f49f2c2dcf965936d35836923038a9dbd86e4624edaabf032f4fa24d88d44f43a290637aaaaa4d433f3a8ae3296c7941a11d45c85f2f3d55e38aff522bacf60f84469b31d5367506b53ae0024ed6804e29749944096191606d2a6a53aea21a283097c496cbd92e182a4883693a7f8a8c0ad99efc498c573b881fd69a4e170b228c3afb62d26a51abc4b1720626a28659368c3441627f51f89c8f740aa6a3f15b4f6623c66fe6ae74838ce4607cbcc216f9d059541eb875a00afbab30454f3e4fdba00c5bf80ae6db26db4de766b17841502037f503650fac24390ba21801843f49e583b7a9c127920591703e623fc494f9e35b51a94fa4f76fb6a59c38a15a24ea33fee8d787c924e1d57db51d97574e4645b0eaf9675ca66c439818e56bbf344020b7008a278a6dc79a56c7aa988397cf134f50daad2265e2b5101484ea46d47b14f920ebe8fb0409d7d6ab96fd47f51970a5fcf70f4cbf9f2031be5c8cf77e86d3fdfd59d402e7bb318739f3a750c74751dbb7563813d155d15e946a7111dcc42dbad25c68376c33410220b0114a4cabc55262f9e6741cd4e091eb7fd7fb5f7047c0f131a90160554ffcc0b7a1ca6ef6e1852a68edfaef953281184d58e86181a65c6c44ab3022c1910f05fa5fe5e5d7e016a23e8708ba116cb59810d125d5fe6026f0f7daf9a06f5df1dae34223926c041405c90e863bb30346e636cb300d5d2a473daeeee214c4023dfd696b362db97b74b5a6bd2fa6fd9ce3a752c9ce74aafe1d18176209246a5c0ed7c3800fe54414f0902b44cc4f3120d7a1b4f915163ba22c410645ab83f94c304c7719edf73bb2711bf6e2aecd3f0644347a26843c95469d749350452017d6b361f70567cfedcdf8eaa818d831375e7f100e43eaf257aacb8662a47b530be0b48801e4b3b2f909f61a0199be1af633942dcda720cf9246f727996fed2a56b5e2dfc1ff2625d30a8cca53c30a6e8bc0a3ab63d1c9fb05bb78500397062437189bbb97d7e4f23b20a3a5f99ce7b841972b5d1d05817220d242e90c8f33cc6b8372dc3a962a5b6232a2886f48d3952fe368977dd49e72f88fca83ec788209c89864c2a3f8e229deb77e65f6248eec0f6f33824ca7bb11cec6d76cc08c9956814a844a58cb0a1f95e1f4217d270e2e5e75ff27d847c059cbc8cb995252d6d2e1a15f39e0798d0ff997f3d591ab3c1b399ee968edd23ed82a3a9a49a2c0078fa2bcbc61ccd174ca82463197dcf0f7b163b0ef99cdb73aa8efa4cd821233869fcc8d2629a991daba05a6fba633840a5e081cf4387248b82ec6f32ae103fc9ec8f1ccde2b2b149c3a3f3743ef37e62e8d4b88733e6bb87eacf9d007e59e55abc6a012fa9652b399114ce073cf8817685bf595ad062da8b3a820f6f2ff0d30081afa44b7db6f68522d3872353bd081ac07adfc6ef2b336f69ba32223d43171a929e52ca31f39484295547dba3371e667183b49b0b11a8c5a64d03a24c31027464f7d1f752de1328d92f1e56815f4c947aac237e3951c7da10880bbd2ebfc77c77e8b4f4fe269fcd92c5ddfcd95a8d88e8ad5278895051086eb3940d5a2c373c0001e779c52d424fff7549fef4007d267042b86640e2a9b461ec89f5f49f9e514610e7187b21adc9c7fbde035f8c6de82b7c0a42eda22bea7165d32e801ebdf0803aa38696c525f3ff4e1380e21c4b1cadece35015951af513281ddacd7407c064664feea6b44d3886b7af1bbaffe7687e2241f2208d93da5f1bc1866d574036a743baa1daeebe05aacb21611f499cb4aff4e8f7285829037e473309acfaabeac03bd8fdc2ff2da5cc9a52fec76983ce035ea88d706f103434751cdcebecb770a9f31d7054888fe7e958473df1d5ff8e088e6a87c923263a4ad6533ce75a52896b22d35131e2c47d9033a22434134cf0df661f3e7cdb7076fd2bc2863b90d2be1572239ea2c8de73a64a2b8a6ccc75260d07051f9e9f99035cebe2b0cb0cda028e84fb0d1bcda34badbffbcc1dd70081372d70e9960fada3668478879874b9db064581fdd0f54b0cea1ae510779ad27fa42a293a1563e90386a2e7c81b1e1cb406c9b8a97cd2bc579d379b37588c7382e69f65398b7227e7c78104774cde2841653704a48cc9ab4f8ab97b7be9a5a7e62739130e390f7a40f219fdcf714f137943ccc2cba9d9a1fca771cb720d2b5d94bf78b31cd47e87087559aad148bcc43028047e41f2aba8a149028c49c56d633d20035dede33f13ba79e8c7673ed4d6813dacc9e84ebfb8491dd209b6f9ff7522f43af9b27c75522e37c265ef675b3def8f22205132015f99dc350775cd4a075431da1d3eb04b8e74b0a9fc77bb6f30da1ddefe67edb1b872227b327410179154aea203345ed3a7c3d3a97d2a8bd5438869fc227f1025cd3079348141e225fd927868ce0b4e31fda9b07e283f4caec6d2818b93ee6757b3d888c0a1ebd888348d06cf3ff99c16871e44272d8fc6f6edc9a3ddb7d06b293befe395846403bac653cd6f79f256a8a41cb55dd7fb8a97963810dabfa9c35f03698f059aefebcc6bb166272cd860b4ceb524c55c88e604fbb1faff6759c121b70dc0147555d13025326269f6aecf968607bd0a88f9a105a40a80eab538dc9134ce859b59d6a0cb99867616a3f23077b3369050dbb6a1a5da355edd28bcb1aa1b1ec88ab13d58eb19313e27bfa0c04235941ee901e35274baa1474f5a61b7303367dd07e7fe4daafd39588866b79b13fc034885b829de7290fc7781f33527135137f785ddb14dd8d612fe893aaf4a80acba6c4bbabce2b4d41314ac0760c41cb593f3ebf8850bb1d4c3d9969b328e005b10b46b817ce8a28ab31201cc4bb74f6234de4ff34b66d77824f714b74de008cc92745c2d1cd8bd85cca94f6d5ae791b58e379a7e5f966d174a523a04c51dac528a1c66cda60df870627b1ec099bb1d1c6becbffca5156997d2516038e2cbe9197e8ed49bc233f9819a69671e73686ad600b1387672af58ebcb4393e8ee3846d226d8736adb15b444dd5348e24dcbd2746aa85bc2d8d1ff3a99ae11ea0d3b38b29078636c09fa1d2b3135bc79a24c68f38e96ab32d750b5b1eab4a52d3d90caeabd50946f16c3242c2ae62260b577436d09e5524ca2194395952771347faa7941890a6d75450c7bb865451eea6ca0aa2a78ff63b18806ea1905fd21dab7bc5281764de063a3f43c8be2a2c7fe88e446728d8bf6ef918479f7396515362b2f5f0335ee5b6a8f20aa5fe2111983d773ad4945d6f5ae0f42d6500e35675aab9ce54b660c5fd9bb0e6d3fa8d5e6287c2cc184eb5abe42963e42857731bb086ca0423b50931a4fb39bf3233bb01940a40c07d8fd0403389f7cfa5d4f09e369652c1c878b6e9934010a45810c96034dac3d4bb0613c636346978175ab04702143029a87992ff4e4b8edcda13589157bab3ee23672a4edc93d4a1f4f8dab2c5b4938d260b0891fa4e3dcf4c032d569de09ded5896048aa6b1fd26cbaa2318a14a13d3a79fd5ab108ee57e378e462502df619b5880a13cb9ace3015acf68cf4cfaabee63e4962015703fcc19b6055478391e7ffba6e7e25deb15ee175e47b198f899ce049bb134410be0425667ebb684a5d3e70970acbcc0ca857f6cd4e7b4bb8de582067b58191a280c416f964ba3cc82ec842893f5204d4d56cd321193f7118a67c77d23946dc3b2b48c9059788fdf6cfac128709a08655a69b04181a50776720bcc8aa4d492120114d02c6f69e674e50f6d1aabf25dce8da7e218fe336aad85b589fc5ccc80a19714f07e3f0b9d519dc501ef664591ca9fa1275a00295c1f837844860c55730a00d36dbb9b8f4b9afb3a41ed321f90f82443cc8c003d6be581640a10c61e3b38580d4174a1dfb23d7e073a19522592d99daed827d26f65c5d592ecc45f06d7fd584db5b56d2a306971c13a264c4f494d8a7c9aebc50058275245cd2ad1af2dd3ca1d58b0c6c16ebdef6dcf9fa3f0d5ff63a0199ba9defffd7f4c67ff9916831010914105c126d55b8697882a967193319b97add2ce68", @generic="47159b8d72fb5b8c901f8c5d3d13dfa0cecef056e30367dbfa540026abcbf19261eaf5865550b057650faf62933e44edacdf61e8132f73062f7ad00fc5de912eb364247a70eff97f", @typed={0xb8, 0x27, @binary="08b1aa057b3c48f25abb231ca2e8b7f898ea8d035fd45b1501bd665f44f5d3564c89fd02cf7941ab3ac6e2ecbc03baa41cb2d109c89cdc56607246a8552010238c5570a1d0249c24e8e1c66da7b0b3ac5274dd677a89eb8063c61f78c4b654efaee36bd1fa42ae9020efe4fdfee8462fde49978b5ac99e181c9e38c5409e642f5c55dfd1f0e903d4de63b8d0c2146f744e0163e4e1d8a8e2cfe1de5f1ba5e8a0d5d02ff312eb106e9073cf0774fb6cc0b687"}, @generic="b063d722e1a26cc743bb836fd0e6707ba87dd30fd50c786ed36aa18b240e471d51bcebdc3071c5796a5aa142161a35d6d2e496174fcb2970b35bb9012e577f489f101bb292617db2dcf7199bbe3c4f4ca68c709c6d205937d0f16c1fcb645f910c96c0813a271d", @typed={0x8, 0xa, @u32=0xffffffffffffff80}, @typed={0x14, 0xd, @ipv6=@dev={0xfe, 0x80, [], 0x1c}}, @generic="4078ece19a10c10df8fb32527ddda42eed84924f63a7c13a7f8c6f9717f93d1c147f8fd58915dd834a97bd4ac2aa63b9e33e3fb5dd3edcbaeb1f3eec1a65c0d76ddb58e7c9dc8401209dcf5064836a94adec12648ae2861ce1c00adc669506279f11bc09aa184794b7714ce005ef78d2297da9c8593b9efae491419b48bb0a0411810b537564304a34e83af1146ab1439a04c92c6e3f41ccc579480d765b768a87ae61b9fa9bebdaafbe2d780471245326ac77db930a6b73d563b19a49cc4d33c9ee2c1a6d798400daa9924e696a15f64bcd6fd803c9847b0def282727d46f86a75eb49232428c73cc8908"]}, @nested={0x524, 0x94, [@generic="3f6165dc518db7acd75c65bb8ca20bae8a23dd5f567d511f9bfb6ab3f3c986f7a6b37d4ac90a04868f4f3369c1db41bd63e4562175268fafe3cb207354ebeb8ad244e28f8d91a10f3360bbb3b781611704bea6a822f990371892e13678353d2a4ecbaa75bde074f1d9da357e11af8873c44d898871be88b909e48f199aa88a0edf670d7c28a1cfb4d2e3a423bf5858792b82f8e27988cb2604a28f6c4aaa6b9202680f74869e2071bf90148beecc004da2fa9d888db782c55cda6e69860a9cc97cc939cb641518da42544639978849247d3b7a4a5f1e5a005451a4319f8ff2905a266da2ec4dd1d93b", @typed={0x14, 0x3, @ipv6=@remote}, @generic="f97ecec5af707d0f73fe3945f4637393c5bce72c7deafa1b390b8bd590ac46b9da2fdbae5a9dbebe40eba0903b4e97edded84bb659803a2364c70db41bba762452f3aec575589cc3f88b0234eccf7891ad28c2d414aaec080202b50e5f27398b6ebf728db0a02cf3c7afb0007fd1a59222580bcd171245fe3846c7dcc83abe181fc65ec8cd74564aae43d9f82088b7c6d51d641eee24bd689129ffcbc6eb4b326db622e3d99d96353316a137cf94ed8cfe72", @typed={0x8, 0x88, @pid=r5}, @typed={0x100, 0x31, @binary="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"}, @generic="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", @generic="f2ee5e29adc008628f771d821b61ff7f51fcc1c403b8042dc39ab6aeeb2db51db48373d29a03ab9166d22b4b37774f72ad8b8e9635682edf8f9d050c4e14da323ecc51847c2530e2df3b1992cac781684078e491585166ab7b9a53a324528c4295eb4507d75ee65d00d2bd6ea8998b81678082bf1e27f1aa3a53d56fc63f75342fdf33b74159d38cdf33ff78d4518336339cc9a87ae200d429504f59d179b2b5e6320992a93eacdf3ea030e4d7c8034313b83140893661a89ac3dca631ab482e76bd525fcc4c9cb23239aa37e913f00dc1a1f9c093d3", @typed={0x8, 0x3, @uid=r6}, @generic="9cb384e8951c02bdf7214c1871691e3087a7db3eb804e6d5c94845205aaa57108717807b6a28445f124f412cae13022ec0ccb950f1e4a6c736e8f29f1bfd0bdceeb74578048aa4de5a221246e5d893df4af140b3f8709aa4e37a8277c4d17e74a6385cacfa7a9ab56fb89b7ab1568bff5d63a5b3cf202fcb531f508d5fd08a403a9803675a8eab5c265e4c3f6dd2"]}, @nested={0x14, 0x27, [@typed={0x8, 0x1c, @ipv4=@empty}, @typed={0x8, 0x19, @uid=r7}]}]}, 0x19fc}, 0x1, 0x0, 0x0, 0x10}, 0x4000800) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e20, 0x75b, @remote, 0x5}}, 0x41791653, 0x800}, &(0x7f00000003c0)=0x90) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000400)={r8, 0xe434, 0x20}, &(0x7f0000000440)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:34 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ff, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000100)="19d286738ed95897d9d4b4fcaedaa96d16632def42d170ed0e459a4a456f7f087e9e2b3d4730a9a0992057d0fe5b", 0x2e, 0x4}, {&(0x7f0000000140)="c0ff721a1a0674f8a2e51c3a6122011059a642a07e9f1252e01c267e27aedbaca91e2ceabd7b96", 0x27, 0x3c}, {&(0x7f0000000280)="30c3a98f511f97f090ff65ffb96265604bbdf0292e386fb2b1b3d78d8d12071fc9158b98e7f0f277ac56e8329b98db286e7f72bdc74544f880c9a44ac89620f632be06144a1f9265dcd42abc3d22cc0c388edcacc610acc9ac6edeb41bf7b54a423b7002ab29c3e6c3fd3a814c2c1ee25f04aa407a411c99a9ca6fdbf3f12e008a7601e2da0f43dc5f9c8de9d9c905fb0f9c9717379554d8ade23130ed2998e3d2fd0d204b8df19cddbfd7a545b90f1c26ed773c6de8a69647374536920f6b03cab0704f3856ec8178b75166bfd07115", 0xd0, 0x277f0000000000}, {&(0x7f0000000380)="d41e7e80600cffc66baa6752ba4eb61ccaf27f50138e17d9e0bd08c9125584ff9e2a6f65eeae93c0d3d27b08846c504554d0659171b7f67e74d392276a280f57a38647c6a3a0c9a5bd38e17aa536ffc51e7e0dc9d50e31e79bd580172c591bded6a3f4dd1f6b", 0x66, 0x97}, {&(0x7f0000000200)="35b4a90243567e", 0x7, 0x7}, {&(0x7f0000000400)="defe9ff7c27311ca955a4e0dfaf1ec0ccd5f7091a2881ddcd3a13f34062a5fac90a709a988ce1857dc3a90e2544ffb57f2df866afebde256255dd27674ce937b6608b5edde2d3d74f20cb9d30977edb358c55becd47b28b9604d4753ddde463ae712ee42bd017b47e903105e6f5892c164de3ea3e20a14e80fd618046e17d8399b4415abc46c5d", 0x87, 0x10001}], 0x400, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) [ 452.852362] hfs: unable to parse mount options 20:49:34 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) dup2(r1, r1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:49:34 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1458) kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x7fff, 0x100005) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r3, 0x1000000) write$P9_RXATTRCREATE(r0, &(0x7f0000000140)={0x7, 0x21, 0x2}, 0x7) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) accept$alg(r1, 0x0, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000440)=0x4728, 0x4) bind$alg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000380)=0x8, 0x4) getgroups(0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000240)=""/204, &(0x7f00000004c0)=0xcc) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000001c0)={0x8, 0x0, 0x0, 0x1}) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000200)={r4}) [ 452.955522] hfs: unable to parse mount options 20:49:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 453.121585] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop3. 20:49:34 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000040)=0x68) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x903fe, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) [ 453.362925] hfs: unable to parse mount options 20:49:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000040)) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r2, r1, &(0x7f0000000080), 0xeffffdef) close(r0) [ 453.467110] hfs: unable to parse mount options 20:49:35 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) dup2(r1, r1) tkill(r0, 0x1000000000016) 20:49:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0x7, 0x6, 0x1}) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) 20:49:35 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:35 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f0000000040)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x2000) write$P9_RLERROR(r1, &(0x7f0000000180)={0xb, 0x7, 0x1, {0x2, '\xac\x00'}}, 0xb) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xad63, 0x52000) flock(r0, 0x2) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000080)=0x5, 0x4) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r5 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ioctl$RTC_AIE_OFF(r3, 0x7002) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r5, 0x1000000) sendfile(r4, r5, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r4) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000100)="8b2ff9d147650962d93787885123cfe2cb3b3dc6116cced94bcd202b9c", 0x1d) [ 453.872357] hfs: unable to parse mount options [ 453.941013] hfs: unable to parse mount options 20:49:35 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs`', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000240), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x3, {{0xa, 0x4e24, 0x4, @ipv4={[], [], @local}, 0x10000}}}, 0x88) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000100)=""/29) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x16) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:49:35 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r0, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000100)={0x1, 0x0, [0x8, 0x5, 0x80, 0x7, 0x5, 0x5, 0x7, 0x2a78]}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000040)=""/89) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$KDSETLED(r1, 0x4b32, 0x5) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:49:36 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000040)={@initdev, @local, 0x0}, &(0x7f0000000080)=0xc) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, r4}, 0x14) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:36 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x2000, 0x31) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000100)={0x7fff, 0xc, [0x6, 0x8, 0x2a4]}) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) setsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f0000000200)={@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}, 0xc) close(r1) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000140)=0x100, 0x4) getgroups(0x1, &(0x7f0000000240)=[0xee01]) setsockopt$llc_int(r1, 0x10c, 0x5, &(0x7f0000000040)=0xffffffff, 0x4) [ 454.805423] hfs: unable to parse mount options [ 454.895746] hfs: unable to parse mount options 20:49:38 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) dup2(r1, r1) tkill(r0, 0x1000000000016) 20:49:38 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f0000000080)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:38 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000040)={0xffffffffffffffff, 0xa, 0x1, "bfe724343153c23584976612be2e2244837fa135c4b134a78eeee23dd6dc5df8", 0x32314d4e}) close(r2) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000080)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000100)={r4}) 20:49:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000240), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x3, {{0xa, 0x4e24, 0x4, @ipv4={[], [], @local}, 0x10000}}}, 0x88) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000100)=""/29) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x16) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:49:38 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000100)='eth1em0em0posix_acl_accessnodevwlan0%+\\\x00', 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000003c0)=0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x3, 0x70, 0xfffffffffffffeff, 0xffffffffffffffe0, 0x6fb, 0x828e503, 0x0, 0x8000, 0x82010, 0x0, 0x7e0, 0x4, 0x7fffffff, 0x0, 0x101, 0x53, 0x100, 0xfe, 0x4, 0x2, 0x7, 0x3f, 0x200, 0xe1ef, 0x4, 0x0, 0x0, 0xff, 0x3ff, 0x401, 0x81, 0x7ff, 0x4dd, 0x8dbe, 0x8, 0x1000, 0x7, 0x8, 0x0, 0x9, 0xd8b51c234dfe0e1d, @perf_bp={&(0x7f0000000400), 0x1}, 0x4000, 0x6, 0x80000000, 0x1, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x7, 0xffffffffffffff9c, 0x8) r1 = open(&(0x7f00000004c0)='./file0\x00', 0x80800, 0x100) perf_event_open(0x0, r0, 0x3, r1, 0x1) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) read$FUSE(r3, &(0x7f00000005c0), 0x1000) ioctl$int_in(r3, 0x800000c0045009, &(0x7f00000000c0)=0x800000000000009) ioctl$int_in(r3, 0x80000040045010, &(0x7f0000000080)) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(r2, 0xf, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r5 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r5, 0x1000000) sendfile(r4, r5, &(0x7f00000000c0)=0xf10001, 0xeffffdef) nanosleep(&(0x7f0000000500)={0x77359400}, &(0x7f0000000540)) close(r4) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) setsockopt$inet_group_source_req(r4, 0x0, 0x2f, &(0x7f0000000280)={0xffff, {{0x2, 0x200, @broadcast}}, {{0x2, 0x4e21, @rand_addr=0x800}}}, 0x108) [ 456.708522] hfs: unable to parse mount options [ 456.775594] hfs: unable to parse mount options 20:49:38 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000040)={0x100000000, 0x3, 0x1, 0x20}, 0x10) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:38 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:38 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000100)={0x9, 0xcba6, 0x0, 0x100, [], [], [], 0xffffffffffffff2c, 0xfd, 0x1d7, 0x6, "2fe32aed106b008eb468540c609e682d"}) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 457.252780] hfs: unable to parse mount options [ 457.386536] hfs: unable to parse mount options 20:49:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={'nr', 0x0}, 0x1ff, 'syz1\x00', @default, 0x3, 0x8, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @null, @default]}) close(r0) 20:49:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000040)=0x9, 0x8) 20:49:39 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000100)={r2, 0x0, 0x80000000, 0x14b7, 0x5}) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r0, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x100000000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='/dev/vbi#\x00') bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000080)=0x6) 20:49:41 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0xfffffffffffffff1, 0x0, 0xd161cab5ecc2dab2) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) connect$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x1, 0x7, 0xffff, 0x1000, "38ab57441d4f008b5d2f778631ecba20e26c81cb47437844d6dcdaf4fa6e926cc9861b88b6c5815f171ddcf4fc270cd415062e86c3fc4d5c0e9c50b6cb36fc", 0x3b}, 0x60) 20:49:41 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) dup2(r1, r1) tkill(r0, 0x1000000000016) 20:49:41 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={'nr', 0x0}, 0x1ff, 'syz1\x00', @default, 0x3, 0x8, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @null, @default]}) close(r0) 20:49:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000340)={0x9, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) kexec_load(0x200, 0xffffffffffffffec, 0x0, 0x3) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x40, 0x0) renameat2(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x6) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f0000000140)={0x6, 0x100000001, 0x4, 0xffffffff, [], [], [], 0x6, 0x295, 0x100000000, 0x4, "4bc00bf9ad1c00d5f58a36fe00def440"}) syz_open_dev$dspn(0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) sync() ioctl$VIDIOC_SUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f0000000040)={0x5, 0xffffffffffffffff, 0x3}) close(r2) 20:49:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:41 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x1, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) getgroups(0x0, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-'}, 0x28, 0xa62588baaecf5545) [ 459.966072] hfs: unable to parse mount options [ 460.082948] hfs: unable to parse mount options 20:49:41 executing program 5: r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000200)='/dev/vbi#\x00', 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000180)=@get={0x1, &(0x7f0000000140)=""/37, 0x8}) bind$alg(r1, 0x0, 0xff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000100)={0x4, &(0x7f0000000040)=[{}, {}, {}, {}]}) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8f1, 0x600801) 20:49:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\xc0', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:41 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r2, r3) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 460.545013] vivid-002: kernel_thread() failed 20:49:42 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:42 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000040)) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) [ 460.752793] hfs: unable to parse mount options [ 460.773530] hfs: unable to parse mount options [ 460.903772] hfs: unable to parse mount options 20:49:44 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:49:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x0, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000140)=0x18) close(r2) fcntl$setlease(r0, 0x400, 0x2) accept4$bt_l2cap(r1, &(0x7f0000000040), &(0x7f0000000080)=0xe, 0x80000) 20:49:44 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(r0, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(r0, 0x0, 0x2da) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) getgroups(0x0, 0x0) 20:49:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000040)={0xffffffffffffffff, 0xa, 0x1, "bfe724343153c23584976612be2e2244837fa135c4b134a78eeee23dd6dc5df8", 0x32314d4e}) close(r2) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000080)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000100)={r4}) 20:49:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:44 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r0, 0x9960) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000280)) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) accept4(r1, 0x0, &(0x7f0000000100), 0x80800) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x21) getgroups(0x1, &(0x7f0000000240)=[0xee01]) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000300)={0x0, 0x0, 0x13}) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000340)={r4, r5}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, r3}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f0000000140)={r6}) 20:49:44 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f0000000940)=0xc) perf_event_open(&(0x7f0000000880)={0x5, 0x70, 0x100000001, 0x81, 0x9, 0x4, 0x0, 0xffffffff, 0x4, 0x1, 0x7, 0x10000, 0x3, 0x0, 0x8, 0x7, 0x369, 0x0, 0x4a00000000000000, 0x7427, 0x2, 0xfffffffffffffb10, 0x1, 0x3, 0x6, 0x7, 0x3, 0x40, 0x3, 0x9, 0x8, 0x100000000, 0xd8, 0xffffffffffffffc1, 0x2, 0x1ff, 0x0, 0x9, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000840), 0xa}, 0x1400, 0x0, 0x1ff, 0xf, 0x1ff, 0x6, 0x5}, r2, 0x8, r1, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r3, 0x1000000) sendfile(r1, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000740)={0x53, 0xffffffffffffffff, 0x31, 0x1, @scatter={0x7, 0x0, &(0x7f0000000680)=[{&(0x7f0000000280)=""/252, 0xfc}, {&(0x7f0000000040)=""/118, 0x76}, {&(0x7f0000000380)=""/204, 0xcc}, {&(0x7f0000000100)=""/52, 0x34}, {&(0x7f0000000480)=""/118, 0x76}, {&(0x7f0000000500)=""/189, 0xbd}, {&(0x7f00000005c0)=""/174, 0xae}]}, &(0x7f0000000140)="e0a54506e4574d744488de4f90fb0867418ed0023ac46c8af2f9bd5fec60644679682a91e074aac640bc4e7db541c8a051", &(0x7f0000000200)=""/22, 0x1ff, 0x25, 0xffffffffffffffff, &(0x7f0000000700)}) ioctl$VIDIOC_QUERYCAP(r3, 0x80685600, &(0x7f00000007c0)) close(r1) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:44 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) write(0xffffffffffffffff, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:49:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000040)) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) [ 463.022679] hfs: unable to parse mount options [ 463.126232] hfs: unable to parse mount options 20:49:44 executing program 2: r0 = gettid() r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:49:44 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000080)={0xa5c, 0x9}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, r1) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r4 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0xfffffd) sendfile(r3, r4, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r3) 20:49:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs,', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 463.640923] vivid-001: kernel_thread() failed [ 463.655421] hfs: unable to parse mount options [ 463.784900] hfs: unable to parse mount options 20:49:45 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) get_thread_area(&(0x7f0000000040)={0x7ff, 0xffffffffffffffff, 0x2000, 0xffffffffffffff2e, 0x8001, 0x8001, 0x4, 0xecd1, 0x1fc000000000, 0x4}) getgroups(0x0, 0x0) 20:49:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000140)='\x1f\xc7l(x\xb3j\x01\xd7\xac\x01\x00\x00\x00\x00\x00\x00\x00\xca\xcfyN\x1f\xbd\xe87\x91|H?^c\xb5e \x03zU\xab\x06\x00\x14\x16\xc1\x12o\xf4n\x8c\xea', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x800, 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={'nr', 0x0}, 0x1ff, 'syz1\x00', @default, 0x3, 0x8, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @null, @default]}) close(r0) 20:49:45 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040), 0x4) getgroups(0x1, &(0x7f0000000240)=[0xee01]) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 20:49:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:45 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(r0, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) recvfrom$rxrpc(r1, &(0x7f0000000040)=""/4, 0x4, 0x2, &(0x7f0000000080)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}, 0x80}}, 0x24) [ 464.098707] hfs: unable to parse mount options [ 464.175950] hfs: unable to parse mount options 20:49:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 464.434172] hfs: unable to parse mount options [ 464.514793] hfs: unable to parse mount options 20:49:47 executing program 2: r0 = gettid() r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:49:47 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0xe7df28d, 0x800, 0x8, 0x4, 0x0, 0x1f, 0x10, 0x8, 0x7f, 0x2, 0x1000, 0x10001, 0x1, 0x1, 0x8000, 0xba, 0x6, 0x1000, 0x4, 0x180000000000000, 0xdc3d, 0x5, 0x400, 0xffff, 0x7, 0x2, 0x100000000, 0x200, 0x800, 0x4, 0x2, 0x3, 0x24, 0x200, 0xd7d, 0x0, 0x0, 0xffff, 0x4, @perf_bp={&(0x7f0000000040), 0xd}, 0x10000, 0x2241, 0x8000000000, 0x5, 0x8, 0x7ff, 0x13c5}, r0, 0x0, r0, 0x1) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000180)={"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"}) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:47 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000140)={0x3, 0xc, 0x1, "e6265872411ab39538f98a0d330041947d995db0aa1d5e6f2d6f4f6c0290445f", 0x32314d56}) close(r2) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000100)={0x7, {0x8, 0x5, 0x4, 0x9}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$RTC_UIE_OFF(r1, 0x7004) getgroups(0x1, &(0x7f0000000240)=[0xee01]) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f0000000040)={0x6, "c57556b9468664c65a2bb3008a17640c2299ee38e6d483b837cf0d22421e380e", 0x100, 0x33, 0xffffffffffffff80, 0x10, 0x7}) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000280)=""/154) 20:49:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x200000) getsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000100)=""/250, &(0x7f0000000080)=0xfa) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x3, 0x4) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) mq_timedreceive(r2, &(0x7f0000000200)=""/240, 0xf0, 0xffffffffffffff01, &(0x7f0000000300)={0x0, 0x989680}) r4 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) bind$x25(r3, &(0x7f0000000340)={0x9, @remote={[], 0x3}}, 0x12) r5 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0xffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000003c0)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000400)=0x24) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000440)={r6, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}}, [0x1, 0xbd, 0x7, 0x1000, 0x6d9b, 0x6, 0x5, 0x1, 0xde76d83, 0x5, 0x1f, 0x6e4, 0x2, 0x5, 0x1]}, &(0x7f0000000540)=0x100) sendfile(r5, r4, &(0x7f00000000c0)=0xf10001, 0x1) close(r4) 20:49:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000140)='\x1f\xc7l(x\xb3j\x01\xd7\xac\x01\x00\x00\x00\x00\x00\x00\x00\xca\xcfyN\x1f\xbd\xe87\x91|H?^c\xb5e \x03zU\xab\x06\x00\x14\x16\xc1\x12o\xf4n\x8c\xea', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x800, 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) [ 466.355057] hfs: unable to parse mount options 20:49:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) [ 466.464633] hfs: unable to parse mount options 20:49:48 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x1d0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:48 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) listen(r2, 0x3) r3 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x2000000, 0x0) r4 = syz_open_dev$dspn(0x0, 0x0, 0x0) getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000002c0)=""/51, &(0x7f0000000300)=0x33) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x5) r5 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$UI_GET_VERSION(r3, 0x8004552d, &(0x7f0000000240)) r6 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r6, 0x1000000) ioctl$DRM_IOCTL_ADD_BUFS(r5, 0xc0206416, &(0x7f0000000280)={0x4, 0x4, 0x3, 0x991, 0x10, 0x1000}) sendfile(r1, r0, &(0x7f00000000c0)=0xf10005, 0x4e) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) close(r5) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x8, 0x9, 0x0, 0x807, 0x400}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r7, @in={{0x2, 0x4e23, @multicast2}}, 0x7487, 0x0, 0x7, 0x7, 0x89}, &(0x7f0000000200)=0x98) 20:49:48 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfsL', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000040)=0x1) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:49:50 executing program 2: r0 = gettid() r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:49:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:49:50 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x3, 0xffffffffffffff9c}) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000380)={0x5}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000040)='/dev/vbi#\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x200000, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d78656e2c7365636c6162656c2c646f6e745f686173682c65ff01643c", @ANYRESDEC=r4, @ANYBLOB=',fowner>', @ANYRESDEC=r5, @ANYBLOB=',subj_type=&\\selinuxuser,fsname=@,\x00']) getgroups(0x0, 0x0) 20:49:50 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(r0, 0xf, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x2) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000040)={0x80000001, 0xc, 0x4, 0x0, {}, {0x2, 0xa, 0x7, 0xfffffffffffffff9, 0x0, 0x100000001, "57cdb0c0"}, 0x1, 0x4, @userptr=0x9, 0x4}) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000140)='\x1f\xc7l(x\xb3j\x01\xd7\xac\x01\x00\x00\x00\x00\x00\x00\x00\xca\xcfyN\x1f\xbd\xe87\x91|H?^c\xb5e \x03zU\xab\x06\x00\x14\x16\xc1\x12o\xf4n\x8c\xea', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x800, 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x01', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:51 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:51 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x4a8, 0xd0, 0x2c0, 0xd0, 0xd0, 0x1b0, 0x410, 0x410, 0x410, 0x410, 0x410, 0x5, &(0x7f0000000040), {[{{@uncond, 0x0, 0x98, 0xd0}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x1, @loopback, @loopback, @gre_key=0x100, @icmp_id=0x67}}}}, {{@ip={@loopback, @multicast2, 0xffffffff, 0xff, 'veth0_to_team\x00', 'bond_slave_0\x00', {0xff}, {}, 0x4, 0x0, 0x2a}, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x8, @ipv6=@mcast1, @ipv6=@mcast2, @icmp_id=0x66, @gre_key=0x7f}}}, {{@uncond, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x7, [0x7f43, 0x1ff, 0x0, 0x101, 0x4, 0x10000], 0x5, 0x5}}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @multicast1, @empty, @icmp_id=0x65, @icmp_id=0x80}}}}, {{@ip={@empty, @rand_addr=0x7f, 0xff000000, 0x0, 'veth1_to_hsr\x00', 'netdevsim0\x00', {0xff}, {}, 0xde, 0x3, 0x31}, 0x0, 0x118, 0x150, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x8, 0xff}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x5, 0x1, 0x0, 0x2}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x2, @multicast2, @dev={0xac, 0x14, 0x14, 0x29}, @port=0x4e23, @gre_key=0xe1}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x508) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x02', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:51 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) rt_sigprocmask(0x10000, &(0x7f0000000040)={0x9}, &(0x7f0000000080), 0x8) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000100)={{0x1, 0x81}, 'port0\x00', 0x41, 0x30000, 0x2, 0x101, 0xfff, 0x9, 0x4, 0x0, 0x6, 0xffffffff}) close(r0) r4 = fcntl$getown(r3, 0x9) ptrace$setsig(0x4203, r4, 0x6, &(0x7f00000001c0)={0x3a, 0x1, 0x401}) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000100)={0x81, 0x795f5b77, 0x3, @stepwise={0x0, 0x8000, 0x6, 0xfff, 0x3, 0x6}}) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x4, 0x100) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) r4 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r4, 0x1000000) write$binfmt_script(r0, &(0x7f0000000400)={'#! ', './file0', [{0x20, '/dev/btrfs-control\x00'}, {0x20, '\xac\x00'}, {0x20, 'bdev..!selfeth1@vmnet0userselinux'}, {0x20, ')vboxnet1'}], 0xa, "aa9ac8a6854716258bad02757ecb721206013657e75b70d032fa007de5400676f04d7f6867e6294d6fc76004e6909f6c6f32fcd4b1b714881992f28d6a4a1670aa05f7e7aef1fafe615567844f9c6ff0eacaf649268fce0f4b0085a28908b3e97de8f4dcd6c4dd7a2cfffed6e3fd693a414a769e88bc70b43ad3c19530bd2b6684c39b0c110181b8e78c4f53cd3f03891baa894ff4093207374d89aa358b032ef6790c3dc459e6948fabbb4fbfbcf967e8c8da84e4fbd04d2658589e22a32e3dbf5d42635ffcbca9b6e83bfb26b449cf3bf75a4eea702f3fc1107837f5106448ed5ac09bf741d5cbcc0a1846859475c7ba4882b1cf7141b34dade5f9ba17f74912a6b8c91e3dc913c9efdb4a924cdb6b8af118159339081bb137f147076667747b0e44cc1d6a9c71eb9a057d0731b0c59ac09c11ad0f08e2292ef8ab685157d5cad379b00d7bea57cf163d0729a6eab16f577652ce7b39b0cf978a601e0f64ff0acb4ecfa112eb3adb7ff8b8a0402fb550f655f3b45d8a36a33c6e36ccdda06a5a3950c1dcf2510bfd2dd8312d663223c7f27837ea2e8528dbe63a777d6d2f413b36e9be06875dc6394beafdf2488561716a23de796505247ceb381b68df9896a93c698693e3142ebdb63d4696c039d48570566155a4dfc5254a014f620741fa039412a40bd8f38f950e7794f443368b1662a85f85fc59c73ebd9a800a384d0e05ce0a0396efbab3eb07c0893451072c55876642620ee43ce962838a98a61a458f32582ebdb8a9d9ab13fabbb0a942775f7cfd8929c83786b60c2fcd2ec1df2c71532855423f74c4f9af823e3a6d0b498509f029a39badf7b870f018d0f4e9944b37fdfc99e4a0c55ed20c082c91226a004123362b11e31e35dcfdddf9a7b71f03d05fbcd9deabf9fe044155c76c490f9c560d0278f07b6b9ef0ba437b44d7dc29bed92629e52ce67d436b8a13ec5d1a0b3180104dd497a8c6beee7406a631024a6546faa256df32237ac21c19d219d9e020daf14203984e027e4c6d04c227bd98217c6863d75dc651759ece8e65905ca48de406ad3edf2bdc1fb9ad1ff7712d0422a06cb86c91e872fa0c5a3c039f36d7e052effe663ce10c43a5e32c628ec68a98eac53f1eb89a25255ea93fe176563ce981439eecf76aea244befcb14f12fd22018f4cafe930390cf53b562a4889a75f405f8c684f3c171dea83d5632b71def3dd30f666dae77e694ba8265ab5f7486644d9136a20051fd4f19146f93059e79450d40a0c883ceb93a59040eaa6c51dfa0e10dcce2c1d428f6b0a9a71e4114e316071b7d63484b82dcf7e4ea65f547339f11a8a16295fc7e07a4899a77eb68e55a012123390f7327bf778fb4355c82f99f58fb582c8c836f92b18ff9ba3c741331e1b6e4940e967cdab07ad436e5eeaf10586797e9ff39ad8cec1b3bbea7cb928e4cea8e0a041876c71cacf6a559e397270019d2be900dd3ab157539d49a49724066e5d31395fa97498a3ba365361436e0f9406a1ee3dde52675c0b080dc7aea4f8d8c1b917b8d7862b83f33019f07927a7f9ef123c6d2c02b4f5deeafb28e687ff79be78137dec93267dc8e5d5e0da45680351e4baa97d9691e53297ff1efa7de920a49df7cac64f70acabdb10a651a76ce3609d84e3adbe90888c6eed6dda508f5244d40a6ba84ab35ea17b268c71ed440abb62b5a00bb72f5c7d9d3fa417e319cab8c4228f4ce8b10d01bbde2eca908902d320658444f249c70366c545f53585c32da03268b88b0e779fb43cad9ca21335aa760ffad86361e2cbeac130ead8936824cc3cf7d7d1916000899d9b2fd139f9abf26b3cbd7653b235228a7a349de22a26fb1f0b38896c72f4753ae7b694d32a9e96b629778e3b78efdca23ce35b2495d17c8e5355383f5042641dd8107ce563bcafbbc57ad3210d836a42ea42933e7380a820b38cccd868b618de6896eba6ef502246243226e15933f1c23e8a58f1cbf54d6e5cfbc38135e359fd52ed8282230f6414966d0b0e7d6dfaee1dd85326b98359ddbdf092f9e6a2c4e894bd1aa00bca8400218982de88b1ccecf5805f1e3a71864a2419576f45a73384780a5cbc2d34d8c932543e89f7f63205b5c31b64931f6b5d5117ea929ab1aa3bd34ff356628149bd84f8138598e973d58adefd23cb1beefab81897d1b0892b3f346aebe31d8e5e2c04e8421a3b178f401bf0dff34c3d4ce99db8a4ef5f058afaba042a2d97acffc355f453a25c1e984c7c1ad4b04163ef701de72295e8bc5e3b9d3de8e1ae046170193c13f9f31c2cd0d701054b9e446cf13331fcade067d8f88c6cc2a4cb9f69b90dfe4e243bf60fcd759cad5a04108981ef98dacaab8f975305ac99ecf87dd38b3cbf532f8c4de1119c07e66b43dc272cfc2c988ef1ad87fb6745705d05cbcfb6f9c0a588d8c1adedcf1cbc946e73de01fcb4aff0a76e97bdb74ae852701f2c2fc7caab3c91dd96528ee5f37d60bb2c938f81d4eb25c316e8675d200ed520944f0b1fa8631ef99f180633df559b369bb555dfab623704100057681307df2dc18f067f47e45f4db8cf472774b69be1a0dd68ed995f1be6e5ae1aac79d2d67ca2c13e90027bf2b5cad0efef99fd4b37df687be0f2db32105b35e92e2e1a6ab763da5881490551c37d8f2665c151066a316947eacd840a8ca9c800a83afef780bfa9aea995aed302e2433d1a4eeccbc6be64e1975ab118a130e7741a6fc7e89ad6a2f97dd443ba8831c44650d12fce74fc26d074fea361f06bb93218fd4a27f387fca7cf4d96126bf0723e0a73e3ddbdfc8343c6a90e4ef1a00684bac39be480ca024413a609349920d638003cb447bd7d791b9b4be11ffbdaf9400178268cd4cfc3009a90524910b134b0ba83e9922efe523f9e199f15e3e223c520d3db202f46bd4ee8ae242403f10580a6764d795567f5a85dde9d8b92d230d9a3e3a1eb64aae331a76791455dec9b6136111ce231d9f3e92932ad2dace19e10e335fc7e94e564509f669bc4b5f5d604e641f92649a22bf2e062f98e7cf2b1fa1258eeef549646419a04f89b89dcc5b8d09b772c347a5d524398e4a45dfdac476737e689cb8a04594539b6dfb0fdad0258daa12bc81af48a2c03bd0008b3def23f427f242fe51562f47ef1bf8ec132ca37548b9e94f4cb3e946d2e0deb647cdef0af3f733766fa8181fad5044ebf15932204d7bc7e02a9ab1eee4188cbfc3672c1fd35222b48ba386ebad83f010d66f1267cbbf2b3f1cbff992981ffc10c287a310799b551e5f812e526e250b3c1b14081b5325f0e213371fed94582cbb1b85078f8e65c95753fb0439a707b21f55126dd21445d18083a7516829d646c3653f89134f63d7670d513919c5196ccb4f7c1f048d1230a5a4b340bf1ad9fd4b64d3e17ee1116f7d8b89b3ac4c247474c49d97ec8e4c090220f23eae920df7127e76232b371e3cef5b8ed64bf9baa6f2eed8be154831e693405e55c206bc72ae6d6cb306335589fa26375d33165808d97ea44c38048e965893d002078797e6946d1daf5264c1c4e3e9374c4334030f03ea1971ddd7b0621ac5891ec4303863526333002f9fd6283110c178f6298d9ca90329743e1cbaa2e52292f27121cc89aca4f8ffe70a4bf8aa0998b4d2f3bfdf0433a22fe14e547a1e529becbf365d3f0ba566c141da9b31900655727f81deeb391e9c88d2d40a3ca1e90dafc34ba6c461b35629ef3be192cdb08d50568dbbe2590f70e7c8ad7153bd8b0632d20a23588f08a28a5cb78f069c79923e22025a190ea36e3a45557768efd711669c85055198825fdcd10b4597b7363a69b8c3e7ecc0c992d834f95a3cdc2eed22001ed489c0d4fd0b1ddd32803cd84955be7e511ccf0fbcd0d29898f0acba553d8dccfd2733f81fc9db27f9d7fabdac7052903f35b2f0fa2766c5280969b90e71db8d7ae3e9c8608def467469035f5adcb9312c483d2388c0ab415c58d87ab382b4c62a18da99261d9c315eb9f33b51d9e18d1ab99cd8476d47a1f39a445df3df86b3d27626d123ad23d981cbeac66abb9a0f7b493165d8870ebda17c5c2bb84356980e9dafa14bbc5c25f6bec74470f85d463cb79bd0c6bdf5af6621ae8ca91fe8758acba4e1b2816063028fb33fba59a1f7156073a311bddd82a7721ad49980d27b2e153493abfec9ab1fcebbeadc4a0ea33725a6aaf031f016dcc61b5e87a2938e0aab51ff53a62798d1c2492e6707e71a8a9fd83cf401982f0ed725f018096f987c9d80a2f03ab2e308167c356d0189b14072ecd18f0c582830fcf8edfc5b025f8852b32913265e85021764f88f5a6a96346dd2c18675d5212c07a962b41ce276a4dab6aad68ef301cb577f0fd7e6980cce03977ee65f212ac7b74dc43d59607973af26ba879ad20966d6847caa36148ac2d56040430085d33c9b9073e42eebd273cead64660726e5e5d38c1ea3ae6de435b7a1d8158ad817c8dbe05a37e11a29d0e85b93cfaec741a7102a46417c13a8558eff461194cfb5de21e24f2b798fff372105d965529879b438786f461801b1676834d11c7ed2d3e7c0b7c99aa096b46898d9fcd4df6cd2a9aa76a8aedd2f4e7064bac2e71b5399eb8e4e506039110a721aa87bc651b92836aa51b72e3b0ccab18a41efdd3690294cf7ee8d9c0a878f02d9f44bad60179ebfe7323257b41fea4c491b46014720b9c1df46521a8f783e1ff442cfcda35208a269e0f3b7739b349273e9727ba8278cf27711d44d65b2963302fbb647c1861b02c275fa358feaa0ae269f21e2ee60fa12d08f92ed85c48e6eab9dc0cd3346f93c40fbeb4f9d60181ab1f135251149833dbd4e3fa0577597fd0f50c8f5b2bb37d1bc163133196f35e26cc1a300174fbbdcec6d1e26c730e51e7c5f22f4346d5180c8e74c0ac5880b486987de60730f39f6106331b29db10f4f16097f8d78a4c891af0527c1f7e6d26b0369a0baca8fd2f3573720c89753b91a14466c43487f56299ecd08a90231276ae5beb938a4d3609a507fea3801b63ae0e61deceda6e2aff808e2cad8aaaebeb5a984e47d9d77f464db46bad4ea4229969e496fec29dff17b0b0dad5902aa03def83036d166d360e0c759f9fc270b17d11316daac2d8c30a26eac7fd6d716f30820d38bc29fe9b617faaf715538ef72f2624fb2474174631277c81fed581cf8fb406d2436a3547300e6a2b007321404f2d05bc7c4191214dabdcd26263963439b948d372717dd83ee1e80548b9493e3e40927493dd321b591606918553a52f2bb7ebca2237908aaec113ccc7bf698fbd9f6ceede58759f50d822f06df2081e6c7f0ee1f0a658f6ca471093d09dc21b6bbc796384e820b37e31e9e789ddb3fa947195b570013fd5d770bedf9813801694970be230cd11e889913bfc50339b21ea314b7396ac079c970b0d17d6a6e5f16568ea658c4e970209eda83f4980438b38d5060308b3fc3ca80c95b6ee66b0c1c1d8773f7878a8e090b317f873408f1bda11202f4113c56d82790fc49895d6618ccfd6b80ecda3da99e4a2c062574223bbb0ea851f967fa364258cae3af65963bed3d103ac788abf7dce1d95a23a366a678dc42d670eca5058ceb911b8bd8cf9745974ad4f8ae33df456418b5e475344109832b0a379dce348521f3569e19c8c09d593f8ad56a7245eae7fc8c6adc0eb2adca2bf3ff2f0a97b35bc2cf5e54b77ef617b8e4d1c59d6029baa33d56781103237c6a97509d3de723513cc440cdc15e25a73c4f8c6e647e265e58f7be09444ad2d04e1f971c"}, 0x104e) sendfile(r3, r4, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r3) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000003c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000140), r5, 0x1}}, 0x18) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000001480)={0x4fe, "40cb1abf2e602254bc6378d5fb4c8becbd52c7d3bda4780a95ec694ed1047118", 0x7, 0x20, 0x8b, 0x1, 0x8, 0x2, 0x7, 0x4e}) 20:49:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:49:53 executing program 2: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x1000000000016) 20:49:53 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000280)) fcntl$setownex(r0, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$FICLONE(r3, 0x40049409, r2) read(r3, &(0x7f0000000140)=""/209, 0xd1) close(r1) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000080)=ANY=[@ANYBLOB="9e5f21a41736c33a0024"], &(0x7f0000000100)=0xa) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000240)=0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x48081) 20:49:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:53 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) syz_execute_func(&(0x7f0000000040)="c401fd6f6e073e3e36470f100845d1cc263ef2450fa947d9e1c48199d47988d9f8c441fe1163ec4270486536442d93000000") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:53 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x11954516, 0x8, 0x1ff, 0x9, 0x2, 0x3, 0x5, 0x369, 0x40, 0x53, 0x0, 0x101, 0x38, 0x1, 0x7, 0x7, 0x8}, [{0x3, 0xfffffffffffffffd, 0x100000001, 0x2, 0x2, 0x0, 0xc960211, 0x4}, {0x6474e553, 0x2, 0x80000001, 0x7, 0x7, 0x7, 0x0, 0x40}], "cc9eaa417b2d7c83b2e16f9508fb92b0f87ce32e8b9f81164e9927cb95056c232abeb7", [[], [], [], [], [], [], [], [], [], []]}, 0xad3) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:49:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x1d0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:54 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x7f) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r2) 20:49:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x1, 0x1200) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:54 executing program 2: r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) [ 472.713451] hfs: unable to parse mount options 20:49:54 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xfffffbfffffffffc, 0x228, 0x0, 0xa0000) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r2, 0x1000000) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x1, 0x3, 0x1000}, 0x4) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(r2, &(0x7f0000000300)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x9a) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) getgroups(0x1, &(0x7f0000000240)=[0xee01]) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x5, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) 20:49:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) recvmsg$kcm(r0, &(0x7f0000000680)={&(0x7f0000000040)=@nl, 0x80, &(0x7f0000000600)=[{&(0x7f0000000100)=""/157, 0x9d}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/58, 0x3a}, {&(0x7f0000000240)=""/212, 0xd4}, {&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f0000000440)=""/191, 0xbf}, {&(0x7f0000000500)=""/242, 0xf2}], 0x7, &(0x7f00000012c0)=""/4096, 0x1000}, 0x2000) [ 472.810621] hfs: unable to parse mount options 20:49:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfsb', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:54 executing program 2: r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:49:54 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(r0, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(r1, 0x0, 0xf4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x0, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) fsetxattr$security_smack_transmute(r0, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000040), 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f0000000080)=0xf10001, 0xebfffdef) inotify_init() close(r1) 20:49:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:54 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x11954516, 0x8, 0x1ff, 0x9, 0x2, 0x3, 0x5, 0x369, 0x40, 0x53, 0x0, 0x101, 0x38, 0x1, 0x7, 0x7, 0x8}, [{0x3, 0xfffffffffffffffd, 0x100000001, 0x2, 0x2, 0x0, 0xc960211, 0x4}, {0x6474e553, 0x2, 0x80000001, 0x7, 0x7, 0x7, 0x0, 0x40}], "cc9eaa417b2d7c83b2e16f9508fb92b0f87ce32e8b9f81164e9927cb95056c232abeb7", [[], [], [], [], [], [], [], [], [], []]}, 0xad3) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) [ 473.457836] hfs: unable to parse mount options 20:49:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000081, 0x122, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000000000, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000040)={'team0\x00', 0x8}) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f0000000100)="d0e69c0dc2d858dde95d58488e2f8e8ef0975ff3a3052b65793855fd4539a6d8f13ce307abc8535dd51b6b1fca3cd903388cef94b0fb09b2e76c93bd64b287c6745a9862784a629228aa089d6447a2a4e820c0095a80992c77fd48491a2115aff0bedb8e66e929baaca973b62c1bf48f6b514e065c81bd53ac36e0966a88cf7c82808cb2d53a3d3e937ba0aa78391f36d2d745fb17821d6932d9c8ccfb8ef2fc427855648ac37ce3ffc6deae146a2b0d2811a23005226976623e53b2555758fe7fdaf647fb21458f1b4aac1dbc18aab6") sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) [ 473.537908] hfs: unable to parse mount options 20:49:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = getpid() capget(&(0x7f0000000040)={0x200f1526, r1}, &(0x7f0000000080)={0x0, 0x200, 0x40, 0x7, 0x1c3f, 0x400}) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r0, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:55 executing program 2: r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:49:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x7f', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:55 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000000c0)=0x0) r2 = perf_event_open(0x0, r1, 0x0, r0, 0x0) kexec_load(0x10000000000000, 0x0, 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x9) fcntl$setownex(r2, 0xf, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r4 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r5 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1ff, 0x101000) sendfile(r3, r4, &(0x7f0000000080), 0xeffffdef) close(r3) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sync_file_range(r5, 0x0, 0x0, 0x2) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000040)={0x3f, 0x3}) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:49:55 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L+', 0x130b}, 0x28, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:55 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={r4, 0x8000, 0x9, [0x100, 0x80000000, 0x5, 0x101, 0x4, 0x45, 0x200, 0x1, 0xbfa]}, &(0x7f0000000180)=0x1a) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) 20:49:55 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) [ 474.404882] hfs: unable to parse mount options 20:49:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) recvfrom$rose(r0, &(0x7f0000000100)=""/212, 0xd4, 0x40000002, &(0x7f0000000040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @null}, 0x1c) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) [ 474.478993] hfs: unable to parse mount options 20:49:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\xf0', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:56 executing program 5: r0 = accept(0xffffffffffffffff, &(0x7f0000000100)=@ethernet={0x0, @link_local}, &(0x7f0000000080)=0x80) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x4e24, @remote}, 0x10) kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x3074, 0x101000) listen(r3, 0x2) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:56 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x10000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x6, {0x4, 0x3dc, 0x4, 0x7}}) 20:49:56 executing program 5: kexec_load(0x201ef1c5, 0x0, 0x0, 0x80000080000000) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:56 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000140)='\xac\x00\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f0000000040)=0xf50001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xa) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000280)="46ce3abb1c031f2281ed4ee698db9fe0ce0830ebcf13f4dfb69196ad8b785b7ffe8ec8a95cf7f820485b347a271a7e394fea89d68411286d218caa0823cb04aa993b6b02c9edd3eff1cbf104c2d00a8fea20e30d8c8ddd601067b93531ca4fe3e32582517cd10baf4ab3d551a18767e3b9ec51c57d103529d7c8cc12ce818b812fc2f364f52ca1db4242f98ce745201e499767ee4be8150b966bdfdbdc4002e11cd21e7deecbf33d39422f1080d760b7a97fa0b6f98136c756f26070253e24579d5bfd3cf60907ce9fd402875c", 0xcd}, {&(0x7f00000012c0)="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", 0x1000}, {&(0x7f0000000380)="ab8f08732ddd2d5330fc016730ba9b610d5220efd5e1dab2594f84ae1e2e75e4e69e624ff0418ed83c5167674f8971535fda21178ba544b17e82b3cea6d9ff6a92ff88118b0b04acad40042e9246ab2865173db831b4bc4e76cfae274e87d553fd5355e14b143192779afcf9d8cc75002558aaec562cf7f9ccf8cfe39f6f3e3ec6414dace81d183356432e2808ccad85dd66d76fb0c987a04fabe67a704f341c35934694825d8008088c55cd08bf5fe471f7e3043185735dbf04ac4432430c9f48cc653490577f101a2da6d6b236fd9278e7ccb2fd8a98c973859ed593d0160909b7b45e9f4e", 0xe6}], 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) finit_module(r1, &(0x7f0000000000)='+mime_type*\x00', 0x1) 20:49:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x4, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000940)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000a40)=0xe8) sendmsg$nl_route_sched(r1, &(0x7f0000000b40)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a80)=@newtclass={0x74, 0x28, 0x8, 0x70bd26, 0x25dfdbfb, {0x0, r2, {0x8, 0xfff1}, {0x1a, 0x5}, {0x2, 0xfff2}}, [@tclass_kind_options=@c_hfsc={{0xc, 0x1, 'hfsc\x00'}, {0x44, 0x2, [@TCA_HFSC_FSC={0x10, 0x2, {0x6, 0x2, 0x7}}, @TCA_HFSC_USC={0x10, 0x3, {0x7fffffff, 0xcd81, 0x2}}, @TCA_HFSC_RSC={0x10, 0x1, {0x7f800, 0x17, 0x1}}, @TCA_HFSC_RSC={0x10, 0x1, {0x0, 0x80000000, 0x2}}]}}]}, 0x74}, 0x1, 0x0, 0x0, 0x40001}, 0x4044890) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x9b, 0x0, 0x8}) kexec_load(0x0, 0x0, 0x0, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r5 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r5, 0x1000000) sendfile(r4, r5, &(0x7f00000000c0)=0xf10001, 0xeffffdef) setsockopt$TIPC_IMPORTANCE(r3, 0x10f, 0x7f, &(0x7f0000000040)=0x80000001, 0x4) close(r6) 20:49:56 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(r0, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r3 = socket$inet6_sctp(0xa, 0x4, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r3) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) recvfrom$rose(r0, &(0x7f0000000100)=""/212, 0xd4, 0x40000002, &(0x7f0000000040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @null}, 0x1c) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) [ 475.463394] hfs: unable to parse mount options [ 475.555107] hfs: unable to parse mount options 20:49:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r1, 0x110, 0x5, &(0x7f0000000140)=[0x3], 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x4, 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 20:49:59 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:49:59 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:49:59 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x7) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'speck64\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:49:59 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) sendto(r0, &(0x7f0000000040)="a661bd9a2249a5dcfa26a3eec247bfb38ff3", 0x12, 0x4000, &(0x7f0000000100)=@l2={0x1f, 0x5, {0xb0, 0x8, 0x7, 0x15, 0x1, 0x3}, 0xd3bf, 0x5245}, 0x80) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:59 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x4, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000940)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000a40)=0xe8) sendmsg$nl_route_sched(r1, &(0x7f0000000b40)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a80)=@newtclass={0x74, 0x28, 0x8, 0x70bd26, 0x25dfdbfb, {0x0, r2, {0x8, 0xfff1}, {0x1a, 0x5}, {0x2, 0xfff2}}, [@tclass_kind_options=@c_hfsc={{0xc, 0x1, 'hfsc\x00'}, {0x44, 0x2, [@TCA_HFSC_FSC={0x10, 0x2, {0x6, 0x2, 0x7}}, @TCA_HFSC_USC={0x10, 0x3, {0x7fffffff, 0xcd81, 0x2}}, @TCA_HFSC_RSC={0x10, 0x1, {0x7f800, 0x17, 0x1}}, @TCA_HFSC_RSC={0x10, 0x1, {0x0, 0x80000000, 0x2}}]}}]}, 0x74}, 0x1, 0x0, 0x0, 0x40001}, 0x4044890) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x9b, 0x0, 0x8}) kexec_load(0x0, 0x0, 0x0, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r5 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r5, 0x1000000) sendfile(r4, r5, &(0x7f00000000c0)=0xf10001, 0xeffffdef) setsockopt$TIPC_IMPORTANCE(r3, 0x10f, 0x7f, &(0x7f0000000040)=0x80000001, 0x4) close(r6) [ 477.527863] hfs: unable to parse mount options 20:49:59 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L+', 0x101}, 0x28, 0x2) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) [ 477.610659] hfs: unable to parse mount options 20:49:59 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:59 executing program 5: kexec_load(0x201ef1c0, 0xffffffffffffff2a, 0x0, 0xfffffffffffffffe) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x4, 0x4) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 477.845999] hfs: unable to parse mount options [ 477.914128] hfs: unable to parse mount options 20:49:59 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x1, 0x84) ftruncate(r1, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:49:59 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:49:59 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000240)=""/254) fcntl$setownex(r0, 0xf, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000080)={r1}) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000640)='\xac\x00', 0x2) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f0000000140), 0xeffffdf1) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000340)={0x0, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e24, @local}, {0x2, 0x4e24, @broadcast}, 0x80, 0x0, 0x0, 0x0, 0x17c0000000, &(0x7f00000000c0)='vcan0\x00', 0xf0b, 0xffffffffffffff0a, 0x7}) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000ec0)={'veth0_to_bond\x00', 0x0}) bind$xdp(r0, &(0x7f0000000f00)={0x2c, 0x4, r5, 0x3d, r0}, 0x10) ioctl$PIO_UNISCRNMAP(r4, 0x4b6a, &(0x7f0000000180)="de859b666257d343f19efdb8d99011e1b8c8b2e092e3b149d60f1d7a2e299162194051a21351ae7e0ca50dd1dc05a69855675de4fd2fed21be3bc2a9223990e162a788c5eb05c9920f5c328a8ee0af0b2d0bb45c0cfd36ddff5490e67e374adc3f728781b6d308340f77c53cb4e0fd6476e324f43cfa6df25b3124125a210edc6579cf392543214c016bbe27cc373c6e13b9158ca4cc1f16bf0d94d21c75b87f269f12f1a434d3d80ee9485839f8a1c3f1caed7e4aae756e832a0c107b774f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x3f, 0x6}, &(0x7f00000003c0)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000400)={0x1, 0x90, 0x8001, 0x3, 0x4fd, 0x80000001, 0x5, 0x9, r6}, &(0x7f0000000440)=0x20) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000480)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f0000000580)=0xe8) bind$xdp(r2, &(0x7f00000005c0)={0x2c, 0x4, r7, 0x23, r2}, 0x10) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000600)={0x7, 0x2}) 20:50:02 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:50:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x2, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) getsockopt$inet6_int(r1, 0x29, 0xdf, &(0x7f0000000080), &(0x7f0000000100)=0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x7f0d, 0x80001) close(r1) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000180)={0xff, "b27dc4eedca08a6ee33108b36d15b7b222ba30c9ee8eb3a1607c292ad876a38f", 0x210, 0x3, 0x1f, 0x1e, 0x4}) write$FUSE_INTERRUPT(r1, &(0x7f0000000140)={0x10, 0xfffffffffffffffe, 0x3}, 0x10) ioctl$RTC_AIE_ON(r1, 0x7001) 20:50:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) 20:50:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:02 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) fcntl$lock(r1, 0x5, &(0x7f0000000100)={0x2, 0x3, 0x0, 0xfffffffffffffff7, r2}) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f0000000280)=0xf10001, 0xeffffded) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='bridge0\x00', 0x10) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:50:02 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = signalfd(0xffffffffffffff9c, &(0x7f0000000040)={0x907}, 0x8) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x8, 0x2e2f01) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000140)=0x0) fcntl$setown(r0, 0x8, r2) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r4 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r4, 0x1000000) sendfile(r3, r4, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 480.793575] hfs: unable to parse mount options 20:50:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f0000000080)=0xf10001, 0xeffffdef) close(r0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000040)={0x2, 0x9, 0x1}) [ 480.876098] hfs: unable to parse mount options 20:50:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0xbff, 0x0, 0x5}]}) close(r0) 20:50:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$RTC_UIE_ON(r0, 0x7003) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) [ 481.340019] hfs: unable to parse mount options [ 481.501754] hfs: unable to parse mount options 20:50:03 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(r0, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x7, 0x80000000, 0x2400000000000, 0x8}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000280)={r3, @in6={{0xa, 0x4e20, 0x1ffe0000, @dev={0xfe, 0x80, [], 0x19}}}, 0xffffffffffffffe0, 0x2}, 0x90) write$P9_RLERRORu(r1, &(0x7f0000000100)={0x1e, 0x7, 0x2, {{0x11, 'cbc-serpent-avx2\x00'}, 0x100}}, 0x1e) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:50:03 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000040), 0x101) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:50:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:05 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:50:05 executing program 1: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040), &(0x7f0000000080)=0x4) getgroups(0x0, 0x0) 20:50:05 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@loopback, @dev, @remote}, &(0x7f0000000100)=0xc) kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:50:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:50:05 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000040)={0xd6e6, 0x5}) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:50:05 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 483.985421] hfs: unable to parse mount options [ 484.060624] hfs: unable to parse mount options 20:50:05 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000040)) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) poll(&(0x7f0000000100)=[{r3, 0x20}, {r0, 0x200}, {r2, 0x200}, {r0, 0x30}, {r3, 0x6600}, {r3, 0xa001}, {r1, 0x228}, {r1, 0x400}, {r0, 0x2}], 0x9, 0x7ff) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:50:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\a', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x200000003ff, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000400)='\xac\x00\x00\xae\x89\x9a\xc9\xa0\xe4tYfH\x7f\xd6\xa1e\x19_S\x0e\x05*\xab\xae?\xb9\xdf#\xe2\xf3T\xd1\x16@\xc5Mr\xf8[P\xd0pe\xf8\x90\xcb\xf5\xc9h\xd02\x15\xe7\xc8\x80\b\xbc\xac3\xc6u25\x0e\xfc\x90RA\x19\xd2\xd9\x8c\x12\xab\x12\xf5\x82]^\xf6\xb12\xf2\xd2mq\xcd\xaf\xa5\xfe\xbf\x90\r\x93\xfdA\x06\x88\xf4\b\"\xa8\xda\x88+\xd5\x9a\xe8\xd3\n\xed\ni% \xb8\xf2z\xf2]\x1e\xb2n\xaa\xe2\xeb\x15\x10\x98\xa8\'\xef\x06\x93\x9a\xaa\xb7\xc6.\xa2\xaa\xf9|3G \x9e\v^\xf7\x80\xf9\x81\xc9\x89\x82\xf4\xae(\xe4@\f3\x90,I\xa2\x00S\xc8\xc0\xda\xcdH\xf7\xcdZ0\x10\xd0\xbbdW\xf3\xfedW\xa2V\x01p\x8b \xa1)<\x12\x9bV\xda\xd4m&\xc4\x0f>+\xee\x15\x1es\x1d\xa4wZ\xfcE\xb5\x82\n\x80\xecx{\xe1\x91\x8e7\xc5M\xaa\x1c9\"*T\xaeo\xd9\x8er\xe6\x1ef\xb5\x9bN\xed', 0x1) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e21, @loopback}}, 0x98}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}}, [0x8000, 0xbc, 0x101, 0x6, 0x8, 0x0, 0x7, 0x0, 0x3, 0x80, 0x4, 0x200, 0x7, 0xfffffffffffffff9, 0x1]}, &(0x7f0000000080)=0x100) 20:50:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="793fe34c4eeea6a5ba946e92f56003c5cbd7497cc6a59d1d918529a5e49fe48780a317f9e4b4d1b4f798c89d7274c48d7a2c494bb21173b7adfb54fa6e01749dba4a5bdab33dcdecbc52701f6c0ed0255a1abcb1be77ae8fbaa203bfb33c4aa75a88ac260a478110556fbc5d7bc6381b8bda79be2e9d264214cdde2e344f02dd62765310486b7e0179dcf037ab6f100bfa871c8e4288aa7da425662a699631fca3a0e79bb1926d3d029125a10991da7e6db62408827d8171315140c4b0dfa37128393887c9563bc2d88ab81067d8cdd62e1346e1cb10f93e673bba4ca9e45a4e978e7f7d456126bf256a16bbe1f516d453afbb100fe5b7d04ac9597829", 0xfd}, {&(0x7f0000000040)="a58994f44c85f07a4f93b4f21940b0c7203a837ff3d9aed33b0b45b514a33116ceb1bcd0747205f78bcc798eef53c4a759", 0x31}, {&(0x7f0000000200)="92e63fa2d48754ffaad6f9f7d9ed63e141d7f8396e1c7db1f784f7ae78dbaf36cdfbc5e8e6a5dffb27ab102c1ab7feceeffdc13c978e6be16a2ca76e128149833b09d86ccaf81fdcf4df36a52e1ebb56c287339db9eb1b3063192d787a948e257f53e9fb34c54e72d9bbe2c29f251302227fc3958a536924b32893e37a678fc43c3c00506f0a4592b7c044fd389d801296361fe2ed5a7b193b546ee1d95e2d0989907e323aa873431d6c58d90436835fcc30804369ceeca293b3f0dd18436144b0977756", 0xc4}], 0x3, 0x2) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:50:06 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x28100, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x3, 0x6d, [], 0x4, &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000280)=""/109}, &(0x7f0000000140)=0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) getsockopt$netlink(r1, 0x10e, 0x2, &(0x7f0000000040), &(0x7f0000000080)) 20:50:08 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) msgget$private(0x0, 0x12) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000040)={{0x0, 0x1, 0x10001, 0x3, 0x4}, 0x100000001, 0x4}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000100)={0x8, @tick=0x9, 0x6, {0x7, 0x342cfae1}, 0x4, 0x1, 0x6}) getgroups(0x0, 0x0) 20:50:08 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:50:08 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x200000003ff, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000400)='\xac\x00\x00\xae\x89\x9a\xc9\xa0\xe4tYfH\x7f\xd6\xa1e\x19_S\x0e\x05*\xab\xae?\xb9\xdf#\xe2\xf3T\xd1\x16@\xc5Mr\xf8[P\xd0pe\xf8\x90\xcb\xf5\xc9h\xd02\x15\xe7\xc8\x80\b\xbc\xac3\xc6u25\x0e\xfc\x90RA\x19\xd2\xd9\x8c\x12\xab\x12\xf5\x82]^\xf6\xb12\xf2\xd2mq\xcd\xaf\xa5\xfe\xbf\x90\r\x93\xfdA\x06\x88\xf4\b\"\xa8\xda\x88+\xd5\x9a\xe8\xd3\n\xed\ni% \xb8\xf2z\xf2]\x1e\xb2n\xaa\xe2\xeb\x15\x10\x98\xa8\'\xef\x06\x93\x9a\xaa\xb7\xc6.\xa2\xaa\xf9|3G \x9e\v^\xf7\x80\xf9\x81\xc9\x89\x82\xf4\xae(\xe4@\f3\x90,I\xa2\x00S\xc8\xc0\xda\xcdH\xf7\xcdZ0\x10\xd0\xbbdW\xf3\xfedW\xa2V\x01p\x8b \xa1)<\x12\x9bV\xda\xd4m&\xc4\x0f>+\xee\x15\x1es\x1d\xa4wZ\xfcE\xb5\x82\n\x80\xecx{\xe1\x91\x8e7\xc5M\xaa\x1c9\"*T\xaeo\xd9\x8er\xe6\x1ef\xb5\x9bN\xed', 0x1) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e21, @loopback}}, 0x98}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}}, [0x8000, 0xbc, 0x101, 0x6, 0x8, 0x0, 0x7, 0x0, 0x3, 0x80, 0x4, 0x200, 0x7, 0xfffffffffffffff9, 0x1]}, &(0x7f0000000080)=0x100) 20:50:08 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r0, &(0x7f0000000080), 0x5) close(r1) 20:50:08 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = getpid() ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) rt_tgsigqueueinfo(r1, r2, 0x2d, &(0x7f0000000280)={0x3f, 0x8, 0x1f}) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r3, 0x1000000) socket$inet_udp(0x2, 0x2, 0x0) sendfile(r0, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='system.advise\x00') close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) [ 486.855521] hfs: unable to parse mount options 20:50:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x9, 0x800000000003) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000100)={0x3, 0x5c, "2b70db036433c5748c1b53c2c1334f804fb32812297a2d370dbdcf0493959150b86cb1d2776a6d67363ee0980de68932d7b6e8c3d56f41634d3fa64ea4e5bb80aae03cdd5cd6d179d00f7e378d131d60fdd0ed6c268d990bbd4c56bf"}) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000040)={0x6, 0x6, 0x3, 0x7, 0x8001}) close(r1) [ 486.982609] hfs: unable to parse mount options 20:50:08 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\xc6', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000100)="2468d0f85539c5b0937d00de12d61dd57ae8c387e11a0ee12c0e982792affd1ece35082e18369434ed278d2eb1b94402fcf9a75a9f88a6aa33de506ff73a74f21595ae86a294dc9c9d23c9d28e1da882f0c9efe35c759b1f94c945049f565280c9b84ae46549c04cbfab4618ff56cb3e1ce1ecf53a598fb6a2ac72da1ad7d348dc8cc20b4c778e413e8dbf34a8387a84a61f3b4f23a345f60c3b18ed0d1376b092575992406749b0459f3659ac44", 0xae) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f00000001c0)='(\\*systemvmnet0\x00', 0x4) socket$inet6_sctp(0xa, 0x1, 0x84) ftruncate(r3, 0x1000000) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000000)={0x4, {0x4ad, 0x8, 0x4, 0x10000, 0x280ae777, 0x1}}) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) socket$rds(0x15, 0x5, 0x0) ftruncate(r3, 0x1) 20:50:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000100)=""/83) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000200)={r4, @in6={{0xa, 0x4e22, 0x1, @empty, 0x9}}, [0x1a4, 0x8001, 0x3, 0x2596, 0xfff, 0xffffffffffff2c11, 0x1, 0x81, 0x200, 0x5, 0x2, 0x6, 0x9, 0x9, 0xfffffffffffffff9]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000380)={r4, 0x10, &(0x7f0000000340)=[@in={0x2, 0x4e21, @loopback}]}, &(0x7f00000003c0)=0x10) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) 20:50:09 executing program 3: r0 = creat(&(0x7f0000000300)='./file0\x00', 0xca) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x642d734a807d853b, 0x1) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x20000, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="997eff2c8e66647aaf27abbaffcb1a0cfde37dc1732aa15d837e290b193c07a1a50252019301b83e5d58e65eda675a76a02fe50b2314ce6b9fee2cc361", @ANYRESHEX=r1, @ANYBLOB=',cache=fscache,fsname=self^,defcontext=staff_u,mask=^MAY_READ,fscontext=sysadm_u,subj_role=cbc-serpent-avx2\x00,obj_user=cbc-serpent-avx2\x00,appraise,\x00']) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000100)) r3 = gettid() perf_event_open(0x0, r3, 0x0, r2, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000440)=0xf10001, 0xeffffdef) close(r4) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) setsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000000)=0x5, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x117, 0xb}}, 0x20) getgroups(0x1, &(0x7f0000000240)=[0xee01]) write$RDMA_USER_CM_CMD_MIGRATE_ID(r4, &(0x7f0000000200)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r5, r4}}, 0x18) 20:50:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000001c0)={&(0x7f0000000040)=@alg, 0x80, &(0x7f0000000180)=[{&(0x7f0000000100)=""/67, 0x43}], 0x1}, 0x100) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x1) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0x0, 0x92200) r4 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={0x0, 0xfffffffffffffffc, 0x5, [0x3, 0xfffffffffffffff8, 0x1f, 0x6, 0x9]}, &(0x7f0000000240)=0x12) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000280)={r5, 0x400}, 0x8) socket$inet6_sctp(0xa, 0x5, 0x84) socket$rxrpc(0x21, 0x2, 0xa) ftruncate(r4, 0x1000000) socket$inet6_sctp(0xa, 0x1, 0x84) sendfile(r3, r4, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r3) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000300)) 20:50:09 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0xfffffffffffffffd, 0x329480) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000100)=""/191) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000001c0)=@req3={0x100000001, 0x9, 0x8, 0x1, 0x400, 0x5f940c55, 0x80000001}, 0x1c) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x6, 0x1) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) getgroups(0xfba96d5b0e191277, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000200)={0x0, 0x2}) 20:50:11 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:50:11 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x200000003ff, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000400)='\xac\x00\x00\xae\x89\x9a\xc9\xa0\xe4tYfH\x7f\xd6\xa1e\x19_S\x0e\x05*\xab\xae?\xb9\xdf#\xe2\xf3T\xd1\x16@\xc5Mr\xf8[P\xd0pe\xf8\x90\xcb\xf5\xc9h\xd02\x15\xe7\xc8\x80\b\xbc\xac3\xc6u25\x0e\xfc\x90RA\x19\xd2\xd9\x8c\x12\xab\x12\xf5\x82]^\xf6\xb12\xf2\xd2mq\xcd\xaf\xa5\xfe\xbf\x90\r\x93\xfdA\x06\x88\xf4\b\"\xa8\xda\x88+\xd5\x9a\xe8\xd3\n\xed\ni% \xb8\xf2z\xf2]\x1e\xb2n\xaa\xe2\xeb\x15\x10\x98\xa8\'\xef\x06\x93\x9a\xaa\xb7\xc6.\xa2\xaa\xf9|3G \x9e\v^\xf7\x80\xf9\x81\xc9\x89\x82\xf4\xae(\xe4@\f3\x90,I\xa2\x00S\xc8\xc0\xda\xcdH\xf7\xcdZ0\x10\xd0\xbbdW\xf3\xfedW\xa2V\x01p\x8b \xa1)<\x12\x9bV\xda\xd4m&\xc4\x0f>+\xee\x15\x1es\x1d\xa4wZ\xfcE\xb5\x82\n\x80\xecx{\xe1\x91\x8e7\xc5M\xaa\x1c9\"*T\xaeo\xd9\x8er\xe6\x1ef\xb5\x9bN\xed', 0x1) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e21, @loopback}}, 0x98}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}}, [0x8000, 0xbc, 0x101, 0x6, 0x8, 0x0, 0x7, 0x0, 0x3, 0x80, 0x4, 0x200, 0x7, 0xfffffffffffffff9, 0x1]}, &(0x7f0000000080)=0x100) 20:50:11 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000040)='\xac\x00\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:50:11 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)={0x8, 0x1, 0x3, 0x100000001}) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 20:50:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x100, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) connect$unix(r1, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e) [ 489.952182] hfs: unable to parse mount options [ 490.040447] hfs: unable to parse mount options 20:50:11 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x4e21, @rand_addr=0x2}, @in={0x2, 0x4e21, @multicast2}], 0x20) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) semget(0x0, 0x5, 0x200) close(r1) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:50:11 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 490.307220] hfs: unable to parse mount options 20:50:11 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r0, 0x1000004) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 490.402867] hfs: unable to parse mount options 20:50:12 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 490.657112] vivid-002: kernel_thread() failed 20:50:12 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x5, 0x70, 0x1, 0x4, 0x1, 0x2b, 0x0, 0x3, 0x140, 0xf, 0x101, 0x85, 0x10000, 0x400, 0x1fc5, 0x6, 0x5, 0xed, 0x0, 0x6, 0x6, 0x3ff, 0x3, 0x4, 0x100000001, 0x80, 0x101, 0xfffffffffffffffb, 0x81, 0x2, 0x4, 0xf62, 0x7, 0x7f73, 0x3, 0x4, 0x6, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x9}, 0x0, 0x1, 0x100000001, 0x7, 0x0, 0x9, 0xfffc}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:50:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) clock_adjtime(0x4, &(0x7f0000000100)={0x3, 0x3, 0x6, 0x100000001, 0x5, 0x6, 0x880, 0x7ff, 0x4, 0x7198e7f9, 0xffffffffffff7fff, 0xffffffffffff8000, 0x3, 0x4, 0x8, 0x1, 0x7000, 0x3, 0x500000000000, 0x4, 0x3f, 0x9, 0xbc, 0x2, 0x401, 0x1}) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000040)=r0) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:50:14 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:50:14 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) tee(r0, r1, 0x0, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:50:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x5a6af000, 0x1000000}], 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000002c0)={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80}, {0xa, 0x4e21, 0x0, @local, 0x4}, 0x0, [0x0, 0x0, 0x0, 0x2be, 0x0, 0x100, 0x5]}, 0x5c) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r0, 0x1000000) close(0xffffffffffffffff) 20:50:14 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x67c4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:50:14 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000100)={0x100000000, 0x1000, 0x9a}) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000040)={0x100000000, "7ea312f5581135afaa2bd19681103df7fc5ff2be0a0fa1005cf3e6db12d3986d", 0x1, 0x1}) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000080)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) 20:50:14 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:50:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0xfffffffffffffffe, 0x0, 0x0, 0x4) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) dup3(r1, r0, 0x80000) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) 20:50:14 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(0xffffffffffffffff, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:50:14 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') flock(r0, 0x1) preadv(r1, &(0x7f0000000480), 0x10000000000001cf, 0x0) 20:50:15 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:50:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x442) write$UHID_DESTROY(r0, &(0x7f0000000080), 0x4) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:50:15 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x9, 0xffff}) 20:50:15 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:50:15 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x20) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x2001, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) rt_sigqueueinfo(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc032100", 0x22, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) write$binfmt_elf32(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000000000000020000000000000000000000000000000001000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717189dbf40ed1491b54efa55cbce7a7793017082f0370bb7e345cedde6cc6b8ce5bc7968f592194552a3af78adaf3d81f87d9d3d0ac5156ff01b95fc3fbc23c92483bf7b74f5c70062e57d1ba5b57eb0f2c70e5aa10fe4ca893e656f6b6e5a65c41f"], 0x139) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 20:50:15 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x9, 0x100) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), 0x0) memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r1, 0xfffffffffffff800) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f00000000c0)=0x8) close(0xffffffffffffffff) getsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000200)=""/232, &(0x7f0000000300)=0xe8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340), 0x4) bind$alg(0xffffffffffffffff, 0x0, 0x0) connect$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @default, 0x7}, [@null, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x7d) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f0000000080)={0x4000, 0x40, 0x7, 0x7}) getgroups(0x0, 0x0) 20:50:15 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 493.988221] hfs: unable to parse mount options 20:50:15 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) [ 494.087060] hfs: unable to parse mount options 20:50:15 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$rose(r0, 0x104, 0x7, &(0x7f0000000040)=0x7f, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) 20:50:15 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:15 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, 0x0, &(0x7f0000040000)) tkill(r0, 0x1000000000016) [ 494.544249] hfs: unable to parse mount options 20:50:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000100)={{0x0, 0x1, 0x80, 0x2, 0x8}, 0x1, 0xfffffffffffff575, 'id0\x00', 'timer0\x00', 0x0, 0x7, 0x16, 0x9, 0x7fff}) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000080)=']$\x00'], &(0x7f0000000440)=[&(0x7f0000000240)='\xac\x00', &(0x7f0000000280)='timer0\x00', &(0x7f00000002c0)=';\x00', &(0x7f0000000300)='id0\x00', &(0x7f0000000340)=')selinuxsecurity%&&user\x00', &(0x7f0000000380)='nodev\x00', &(0x7f00000003c0)='security\x00', &(0x7f0000000400)='\xac\x00']) close(r1) 20:50:16 executing program 5: kexec_load(0x201ef1c0, 0x0, 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) sendmsg$nl_crypto(r0, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="e0000000150008002abd7000fedbdf256d64342d67656e6572696300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b544ddaec68235000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002400000020000000"], 0xe0}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000005, 0x50, r1, 0x0) shutdown(r1, 0x1) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000040)) close(r2) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000080)=0x0) fcntl$setownex(r4, 0xf, &(0x7f0000000100)={0x1, r5}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) [ 494.678964] hfs: unable to parse mount options 20:50:16 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3ff, 0x400000) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000080)={0x1, 0x1, {0x2b, 0x36, 0x1, 0x4, 0x0, 0x4, 0x0, 0x7e, 0x1}}) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r0, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:50:16 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x01', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000ac5000), 0x4) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000340)="3666440f50f564ff0941c30f0f441e04a4c4c27d794e0066420fe2e33e0f1110c442019dcc6f") clone(0xb102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_aout(r1, 0x0, 0x0) write$binfmt_misc(r0, 0x0, 0x0) ioctl$KDGKBTYPE(r2, 0x4b33, 0x0) close(r0) 20:50:16 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000040)='/dev/vbi#\x00', 0x2) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:50:16 executing program 5: fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:50:16 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x8200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:50:16 executing program 5: r0 = syz_open_dev$mouse(&(0x7f00000004c0)='/dev/input/mouse#\x00', 0x0, 0x0) close(r0) 20:50:16 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 495.535904] hfs: unable to parse mount options 20:50:17 executing program 5: r0 = userfaultfd(0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x2}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000400)={r6, @in={{0x2, 0x4e21, @local}}, 0x3, 0x7ff}, 0x90) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000380)={0x0, 0x3}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, &(0x7f0000000100), &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000500)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x6) [ 495.655121] hfs: unable to parse mount options 20:50:18 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, 0x0, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:50:18 executing program 1: r0 = eventfd2(0xfffffffffffffffe, 0x80800) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) write$P9_RSYMLINK(r0, &(0x7f00000010c0)={0x14}, 0x14) 20:50:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x50c80, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000000100)={0x4}, 0x8) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) 20:50:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\xec', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:18 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x1, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000080)) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ftruncate(r0, 0x5) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:50:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x5a6af000, 0x1000000}], 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000002c0)={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80}, {0xa, 0x4e21, 0x0, @local, 0x4}, 0x0, [0x0, 0x0, 0x0, 0x2be, 0x0, 0x100, 0x5]}, 0x5c) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r0, 0x1000000) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(0xffffffffffffffff) 20:50:19 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="230000001e0081ae00060c74000f0000020000006c0000f28701086fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) [ 497.843030] netlink: 7 bytes leftover after parsing attributes in process `syz-executor1'. 20:50:19 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x06', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 497.888039] netlink: 7 bytes leftover after parsing attributes in process `syz-executor1'. 20:50:19 executing program 1: syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) 20:50:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x5a6af000, 0x1000000}], 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000002c0)={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80}, {0xa, 0x4e21, 0x0, @local, 0x4}, 0x0, [0x0, 0x0, 0x0, 0x2be, 0x0, 0x100, 0x5]}, 0x5c) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r0, 0x1000000) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(0xffffffffffffffff) 20:50:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) faccessat(r0, &(0x7f0000000040)='.\x00', 0x0, 0xe00) 20:50:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000000) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000040)={0x2, 0x0, [0xffff, 0x4, 0x810000000, 0x8, 0x4, 0x0, 0x8dc9]}) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$VT_ACTIVATE(r1, 0x5606, 0x8000) close(r2) 20:50:22 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, 0x0, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 20:50:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x5a6af000, 0x1000000}], 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000002c0)={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80}, {0xa, 0x4e21, 0x0, @local, 0x4}, 0x0, [0x0, 0x0, 0x0, 0x2be, 0x0, 0x100, 0x5]}, 0x5c) syz_open_dev$dspn(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r0, 0x1000000) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(0xffffffffffffffff) 20:50:22 executing program 1: 20:50:22 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x7, 0x4000) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000280)={'nat\x00', 0x0, 0x0, 0x0, [], 0x6, &(0x7f0000000200)=[{}], 0x0, [{}, {}, {}, {}, {}, {}]}, 0xd8) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000080)='\x19i\xae\xc7iu\x88\xb8-1\x97\xe2\xcf\x81\x16#\x84\x1bH0`*i\xe8\xde?y@\x1fp7\xebw', 0x0) ftruncate(r3, 0x1000003) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f00000003c0)={0x0, 0x4000000000000, 0x3, &(0x7f0000000380)=0x7fffffff}) bind$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000100)=0x81) lsetxattr$trusted_overlay_origin(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='trusted.overlay.origin\x00', &(0x7f0000000480)='y\x00', 0x2, 0x0) close(r2) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:50:22 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x8001, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:50:22 executing program 1: 20:50:22 executing program 1: 20:50:22 executing program 1: 20:50:22 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x8c', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:22 executing program 5: 20:50:22 executing program 1: [ 501.355847] vivid-001: kernel_thread() failed 20:50:25 executing program 1: socket$caif_stream(0x25, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$caif_stream(0x25, 0x1, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:50:25 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 20:50:25 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x10, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="852a6273000000006b"], @ANYPTR=&(0x7f0000000240)=ANY=[]], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) 20:50:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x01', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{}, {}, {}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000140)=""/218) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:50:25 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:50:25 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000040)=0x6) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) [ 503.691501] binder: 23185:23195 unknown command 536872128 [ 503.716428] binder: 23185:23195 ioctl c0306201 20000440 returned -22 [ 503.777683] binder_alloc: binder_alloc_mmap_handler: 23185 20001000-20004000 already mapped failed -16 [ 503.821969] binder: BINDER_SET_CONTEXT_MGR already set [ 503.848156] binder: 23185:23195 ioctl 40046207 0 returned -16 [ 503.902987] binder: 23185:23216 unknown command 536872128 [ 503.945021] binder: 23185:23216 ioctl c0306201 20000440 returned -22 [ 503.948876] binder: undelivered transaction 5, process died. [ 503.968554] binder: undelivered TRANSACTION_COMPLETE 20:50:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:25 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x10, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="852a6273000000006b"], @ANYPTR=&(0x7f0000000240)=ANY=[]], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) 20:50:25 executing program 2: gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1000000000016) [ 504.192459] hfs: unable to parse mount options [ 504.206226] binder: 23221:23228 unknown command 536872128 [ 504.220495] binder: 23221:23228 ioctl c0306201 20000440 returned -22 [ 504.234135] binder: unexpected work type, 4, not freed [ 504.239745] binder: undelivered TRANSACTION_COMPLETE [ 504.268012] hfs: unable to parse mount options 20:50:25 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x10, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="852a6273000000006b"], @ANYPTR=&(0x7f0000000240)=ANY=[]], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 504.308622] binder: undelivered transaction 9, process died. 20:50:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 504.539894] binder: 23236:23241 unknown command 536872128 [ 504.578866] binder: 23236:23241 ioctl c0306201 20000440 returned -22 20:50:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') faccessat(r0, &(0x7f0000000040)='.\x00', 0x3, 0xe00) 20:50:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000100)={0x2, 0x5}) r3 = gettid() perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x5, 0x5, 0x3, 0x4, 0x0, 0x268e, 0x2040, 0x1, 0x8001, 0x2, 0x8, 0x6b4, 0x3449, 0xfffffffffffffffa, 0x8000, 0x7, 0x8000, 0x7bb1, 0x3ff, 0x8, 0x8000, 0x8000, 0x5, 0x9, 0x81, 0x4380000000, 0x7, 0xc6, 0x8, 0x7, 0x7ff, 0x3, 0x0, 0x2, 0x6, 0x0, 0x0, 0x100000000, 0x6, @perf_config_ext={0x55380000000000, 0x3f}, 0x4404, 0x2, 0x81, 0x5, 0x81, 0xff, 0xfffffffffffffffb}, r3, 0xb, r1, 0x8) 20:50:26 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x80, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:50:26 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x10, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="852a6273000000006b"], @ANYPTR=&(0x7f0000000240)=ANY=[]], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 504.694124] binder: unexpected work type, 4, not freed [ 504.721202] hfs: unable to parse mount options [ 504.726346] binder: undelivered TRANSACTION_COMPLETE [ 504.790907] binder: undelivered transaction 13, process died. [ 504.823600] hfs: unable to parse mount options [ 504.895583] binder: 23252:23258 unknown command 536872128 20:50:26 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000440)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0xffff0000, 0x18, 0x1700, {0x0, 0x0}}, 0x20) 20:50:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 504.960202] binder: 23252:23258 ioctl c0306201 20000440 returned -22 [ 505.053487] binder: unexpected work type, 4, not freed [ 505.089025] binder: undelivered TRANSACTION_COMPLETE 20:50:26 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 505.119228] binder: undelivered transaction 17, process died. 20:50:26 executing program 1: syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@hopopts={0x0, 0x1, [], [@jumbo, @ra]}, 0x18) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f0000000000)=""/11, 0xb) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000001300)) open$dir(&(0x7f00000003c0)='./file0\x00', 0x841, 0x0) ioctl$sock_inet_SIOCDARP(r3, 0x8953, 0x0) write(r0, 0x0, 0x0) [ 505.226417] binder: unexpected work type, 4, not freed [ 505.232252] binder: undelivered TRANSACTION_COMPLETE 20:50:26 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 505.333259] binder: undelivered transaction 21, process died. [ 505.489111] binder: 23287:23290 transaction failed 29189/-22, size 24-8 line 2896 [ 505.515161] binder: undelivered TRANSACTION_ERROR: 29189 20:50:27 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x0) 20:50:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:27 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) 20:50:27 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400000, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:50:27 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000040)=0x6) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:50:27 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) perf_event_open$cgroup(&(0x7f0000000040)={0x7, 0x70, 0x5, 0x581, 0xfffffffffffffe00, 0x10001, 0x0, 0x8, 0x2002, 0x2, 0xfffffffffffeffff, 0x100, 0xd2, 0x4, 0x3, 0x400, 0x1, 0xfff, 0x9, 0x5, 0xfffffffffffffff7, 0x6, 0xffffffffffffff80, 0x8, 0x7ff, 0x1, 0x3fdd, 0x6, 0x40, 0xfff, 0x9, 0x7, 0xc5f, 0x3ff, 0x6, 0xff, 0x3, 0xb0, 0x0, 0x9, 0x1, @perf_config_ext={0xffffffff}, 0x20, 0x2900000000000000, 0x7, 0x5, 0xffffffff00000001, 0x8, 0x7}, r0, 0x3, r1, 0x4) close(r2) [ 505.729702] binder: 23295:23304 transaction failed 29189/-22, size 24-8 line 2896 [ 505.773030] binder: undelivered TRANSACTION_ERROR: 29189 [ 505.805966] hfs: unable to parse mount options 20:50:27 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 505.905111] hfs: unable to parse mount options 20:50:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 506.016867] binder: 23323:23325 transaction failed 29189/-22, size 24-8 line 2896 [ 506.046879] binder: undelivered TRANSACTION_ERROR: 29189 20:50:27 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 506.216505] hfs: unable to parse mount options [ 506.296195] binder_alloc: 23332: binder_alloc_buf, no vma [ 506.328219] binder: 23332:23333 transaction failed 29189/-3, size 24-8 line 3035 [ 506.342790] hfs: unable to parse mount options 20:50:28 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 506.431841] binder: undelivered TRANSACTION_ERROR: 29189 20:50:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:28 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x200, 0x0) openat$zero(0xffffffffffffff9c, 0xfffffffffffffffd, 0x200, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x38f5, 0x800) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0xa) r2 = getpid() perf_event_open(0x0, r2, 0x0, r1, 0x8) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xba3a, 0x40000) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x1200000000000}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x101}, 0x8) r5 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r6 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r6, 0x1000000) sendfile(r5, r6, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f00000002c0)) close(r5) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) [ 506.602975] vivid-001: kernel_thread() failed 20:50:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{}, {}, {}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000140)=""/218) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:50:28 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000040)=0x6) close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) [ 506.658668] binder_alloc: 23341: binder_alloc_buf, no vma [ 506.674806] hfs: unable to parse mount options [ 506.679604] binder: 23341:23347 transaction failed 29189/-3, size 24-8 line 3035 [ 506.698114] binder: undelivered TRANSACTION_ERROR: 29189 20:50:28 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) 20:50:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) getsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f0000000040)=""/10, &(0x7f0000000080)=0xa) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) [ 506.756035] hfs: unable to parse mount options 20:50:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x02', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 506.886163] binder_alloc: 23364: binder_alloc_buf, no vma [ 506.908230] binder: 23364:23369 transaction failed 29189/-3, size 24-8 line 3035 [ 506.929866] binder: undelivered TRANSACTION_ERROR: 29189 20:50:28 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) 20:50:28 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 507.092523] binder: 23380:23382 transaction failed 29189/-22, size 24-8 line 2896 [ 507.112699] binder: undelivered TRANSACTION_ERROR: 29189 [ 507.236322] binder: 23388:23389 transaction failed 29189/-22, size 24-8 line 2896 [ 507.246042] binder: undelivered TRANSACTION_ERROR: 29189 20:50:28 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) 20:50:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:28 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') close(r0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) [ 507.400778] binder: 23392:23394 transaction failed 29189/-22, size 24-8 line 2896 [ 507.444179] binder: undelivered TRANSACTION_ERROR: 29189 [ 507.491188] hfs: unable to parse mount options 20:50:29 executing program 5: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) 20:50:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) perf_event_open$cgroup(&(0x7f0000000040)={0x7, 0x70, 0x5, 0x581, 0xfffffffffffffe00, 0x10001, 0x0, 0x8, 0x2002, 0x2, 0xfffffffffffeffff, 0x100, 0xd2, 0x4, 0x3, 0x400, 0x1, 0xfff, 0x9, 0x5, 0xfffffffffffffff7, 0x6, 0xffffffffffffff80, 0x8, 0x7ff, 0x1, 0x3fdd, 0x6, 0x40, 0xfff, 0x9, 0x7, 0xc5f, 0x3ff, 0x6, 0xff, 0x3, 0xb0, 0x0, 0x9, 0x1, @perf_config_ext={0xffffffff}, 0x20, 0x2900000000000000, 0x7, 0x5, 0xffffffff00000001, 0x8, 0x7}, r0, 0x3, r1, 0x4) close(r2) 20:50:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x8001, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) [ 507.634531] hfs: unable to parse mount options 20:50:29 executing program 0: socket$packet(0x11, 0x2, 0x300) socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002180)=[{{&(0x7f0000000400)=@generic, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000640)=""/91, 0x5b}, {0x0}, {&(0x7f0000000380)=""/15, 0xf}, {0x0}, {&(0x7f0000000c40)=""/154, 0x9a}, {&(0x7f00000009c0)=""/52, 0x34}, {&(0x7f0000000d00)=""/189, 0xbd}], 0x7, &(0x7f0000000a00)=""/9, 0x9}}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000580)=[{{0x77359400}}, {{0x0, 0x2710}}], 0x30) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000040)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000800)=""/179) clock_gettime(0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r3, &(0x7f0000001600)=ANY=[@ANYBLOB="0b00000073797a3100000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d1b36b430e3a110000000000000000000000000000000000000000220000000000000000000000000000000000000000000000000000000073797a3100000000000000000021be69af1400400000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000073797a300000000000000000000000000083000000060000000000000000000000000000000000000000000000000000000000000000007eeed61f0000000000000000000e000000000000000000000000000000000000003f2fa83a3968374c11f5ab2f1ea57dc252518f1e0fa11c076dd1e84d1f807841ff01000000000000d0569c7ed4cca12c49e2e443e102cf3a8b7abf375fa6ecaff9c18f32fd8455ed78e283ac77f4191f26794bcfdd609d0871488b4015bdf129af55c17e24ef0cb87d10502cd6e0c6e0ebe81e52271a32a1e632e2"], 0x126) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000980)="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", 0xc78}], 0x1) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10}, 0xc, 0x0}, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000340)={0x200000000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) kexec_load(0x0, 0x0, 0x0, 0x0) 20:50:29 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:29 executing program 5: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 507.991463] protocol 88fb is buggy, dev hsr_slave_0 [ 507.996637] protocol 88fb is buggy, dev hsr_slave_1 [ 508.001812] protocol 88fb is buggy, dev hsr_slave_0 [ 508.006897] protocol 88fb is buggy, dev hsr_slave_1 20:50:29 executing program 5: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 508.046319] hfs: unable to parse mount options [ 508.140956] hfs: unable to parse mount options 20:50:29 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(r0, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:50:29 executing program 5: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) 20:50:29 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:29 executing program 5: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) 20:50:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:50:30 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x06', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x50c80, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000000100)={0x4}, 0x8) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) [ 508.608106] hfs: unable to parse mount options 20:50:30 executing program 5: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 508.734183] hfs: unable to parse mount options 20:50:30 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) 20:50:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:30 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 508.909183] binder_alloc: 23481: binder_alloc_buf, no vma [ 508.916255] binder: 23481:23482 transaction failed 29189/-3, size 24-8 line 3035 [ 508.925524] binder: undelivered TRANSACTION_ERROR: 29189 20:50:30 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) setsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f0000000040)=0xffffffffffffffc0, 0x4) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:50:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x442) write$UHID_DESTROY(r0, &(0x7f0000000080), 0x4) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) [ 509.087292] binder_alloc: 23488: binder_alloc_buf, no vma 20:50:30 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) 20:50:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x18) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) 20:50:30 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 509.301650] binder_alloc: 23507: binder_alloc_buf, no vma 20:50:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 509.481090] binder_alloc: 23515: binder_alloc_buf, no vma 20:50:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:50:31 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 509.627434] hfs: unable to parse mount options [ 509.735801] binder_alloc: 23530: binder_alloc_buf, no vma [ 509.743185] hfs: unable to parse mount options 20:50:31 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) 20:50:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x1c', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 509.873510] binder_alloc: 23539: binder_alloc_buf, no vma 20:50:31 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) 20:50:31 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000080)={0x9, 0x1, 0x8, 0x7, 0x1, 0x3}) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000040)={0xf05, 0x10000, 0x0, 0x1}) 20:50:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x100, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) connect$unix(r1, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e) 20:50:31 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) 20:50:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfsz', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x3a0000) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:50:31 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 510.522725] binder_transaction: 7 callbacks suppressed [ 510.522743] binder: 23580:23582 transaction failed 29189/-22, size 24-8 line 2896 20:50:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r0, &(0x7f0000000080), 0x5) close(r1) [ 510.571839] binder_release_work: 7 callbacks suppressed [ 510.571846] binder: undelivered TRANSACTION_ERROR: 29189 20:50:32 executing program 5: syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) 20:50:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:32 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 20:50:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:50:32 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2040, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) open(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0xfffffcad) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) [ 510.872078] binder: 23598:23602 ioctl c0306201 0 returned -14 20:50:32 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)}) 20:50:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:50:32 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)}) 20:50:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:32 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000240)={r0, 0x0, 0xcde1, 0x8, 0x80000001}) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="0ebfd4e2", @ANYRES16=r4, @ANYBLOB="02042dbd7000fcdbdf2502000000640003000800030000000000080007004e2400000800030001000000140002006970365f76746930000000000000000008000300020000000800080002000000080008000700000014000200626373663000000000000000000000000800080007000000080005000100000008000400d00e000008000600020000000c0002000800070005000000"], 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x40) socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r3) 20:50:32 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)}) 20:50:32 executing program 1 (fault-call:3 fault-nth:0): r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) [ 511.467805] hfs: unable to parse mount options 20:50:33 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000700), 0x0, 0x0, &(0x7f00000007c0)}) [ 511.524148] FAULT_INJECTION: forcing a failure. [ 511.524148] name failslab, interval 1, probability 0, space 0, times 0 [ 511.551850] CPU: 1 PID: 23641 Comm: syz-executor1 Not tainted 4.20.0+ #1 [ 511.558728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.568088] Call Trace: [ 511.570741] dump_stack+0x1db/0x2d0 20:50:33 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000700), 0x0, 0x0, &(0x7f00000007c0)}) [ 511.574411] ? dump_stack_print_info.cold+0x20/0x20 [ 511.579463] should_fail.cold+0xa/0x15 [ 511.583381] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 511.588511] ? ___might_sleep+0x1e7/0x310 [ 511.592688] ? arch_local_save_flags+0x50/0x50 [ 511.597326] ? ___might_sleep+0x1e7/0x310 [ 511.601518] __should_failslab+0x121/0x190 [ 511.605777] should_failslab+0x9/0x14 [ 511.609589] __kmalloc+0x2dc/0x740 [ 511.613213] ? tty_write+0x545/0x7a0 [ 511.616944] tty_write+0x545/0x7a0 [ 511.620503] ? lock_downgrade+0x910/0x910 [ 511.624664] ? process_echoes+0x170/0x170 [ 511.628837] __vfs_write+0x116/0xb40 [ 511.632569] ? tty_read+0x2a0/0x2a0 [ 511.636214] ? kernel_read+0x120/0x120 [ 511.640135] ? fget_raw+0x20/0x20 [ 511.643605] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 511.649206] ? apparmor_file_permission+0x25/0x30 [ 511.654058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 511.659608] ? security_file_permission+0x94/0x320 [ 511.664553] ? rw_verify_area+0x118/0x360 [ 511.668709] vfs_write+0x20c/0x580 [ 511.672261] ksys_write+0x105/0x260 [ 511.675906] ? __ia32_sys_read+0xb0/0xb0 [ 511.679976] ? syscall_get_arguments.part.0+0x10/0x10 [ 511.685191] ? trace_hardirqs_off_caller+0x300/0x300 [ 511.690299] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 511.695067] __x64_sys_write+0x73/0xb0 [ 511.698980] do_syscall_64+0x1a3/0x800 [ 511.702900] ? syscall_return_slowpath+0x5f0/0x5f0 [ 511.707852] ? prepare_exit_to_usermode+0x232/0x3b0 [ 511.712888] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 511.717757] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 511.722964] RIP: 0033:0x457ec9 [ 511.726165] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 511.745066] RSP: 002b:00007f2c73e1ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 511.752775] RAX: ffffffffffffffda RBX: 00007f2c73e1ac90 RCX: 0000000000457ec9 [ 511.760148] RDX: 00000000ffffff0b RSI: 0000000020c34fff RDI: 0000000000000003 [ 511.767420] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 20:50:33 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r1, 0x101, 0x19, &(0x7f0000000080)=@rose={'rose', 0x0}, 0x10) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x4e20, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}, {0xa, 0x4e22, 0x1, @loopback, 0x1ff}, 0x521f, [0x8, 0x1f, 0x8, 0xffff, 0x8001, 0x8, 0x7fffffff, 0x7]}, 0x5c) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) mlockall(0x800000001) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r5 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r5, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r5, 0x9) r6 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r6, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r6) r7 = accept4(r5, 0x0, 0x0, 0x0) recvmmsg(r7, &(0x7f000000afc0)=[{{0x0, 0x0, &(0x7f0000006940)=[{0x0}], 0x37c, 0x0, 0x8}}], 0x400000000000293, 0xe803, 0x0) ftruncate(r0, 0x400001000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) close(r2) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) [ 511.774693] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c73e1b6d4 [ 511.781963] R13: 00000000004c3a3c R14: 00000000004dbbc0 R15: 0000000000000004 20:50:33 executing program 1 (fault-call:3 fault-nth:1): r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 20:50:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000080)=0x8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1000000}) syz_open_dev$amidi(0x0, 0x9, 0x4000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) execve(0x0, 0x0, 0x0) 20:50:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0xf503000000000000, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 511.992357] FAULT_INJECTION: forcing a failure. [ 511.992357] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 512.055709] CPU: 1 PID: 23664 Comm: syz-executor1 Not tainted 4.20.0+ #1 [ 512.062574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.071938] Call Trace: [ 512.074549] dump_stack+0x1db/0x2d0 [ 512.078212] ? dump_stack_print_info.cold+0x20/0x20 [ 512.083262] ? print_usage_bug+0xd0/0xd0 [ 512.087346] should_fail.cold+0xa/0x15 [ 512.091264] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 512.096395] ? arch_local_save_flags+0x50/0x50 [ 512.100989] ? lock_release+0xc40/0xc40 20:50:33 executing program 2: unshare(0x20000040000) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000780)) semget(0xffffffffffffffff, 0x7, 0x0) semop(0x0, &(0x7f0000000080), 0x0) getpgrp(0x0) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x2, 0x200) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000600)=ANY=[@ANYBLOB="010000574e539423c391a499b67ac2ccbb98bcbd6ac3150b4bcf0eaccb645da74e2251d85b4cc6a25fa00baefcb24eba77b0a2a80f3299d89962ffc14e80891a5daa27003bc8395ab3e70c248a3c78f648570e6c506c37411bf6725d1792193cae68470c366ab23055538c8745c78dfedd30c4f4aa826478ba8da8a01381a9f74eb1fd262bb3e5a6e1e2b12a7e34b895f80fde67db8c90313b35142a5a691b5321c27c51f0d8bd4a09bed30576d364ddf71d07dd7f91f387428f99aad6"], &(0x7f0000000340)=0x1) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020400) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)={r0, 0x1}, &(0x7f0000000040)=0x8) [ 512.104999] should_fail_alloc_page+0x50/0x60 [ 512.109511] __alloc_pages_nodemask+0x323/0xdc0 [ 512.114205] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 512.119253] ? __lock_acquire+0x572/0x4a30 [ 512.123505] ? print_usage_bug+0xd0/0xd0 [ 512.127582] ? rcu_read_unlock_special+0x380/0x380 [ 512.132523] ? print_usage_bug+0xd0/0xd0 [ 512.136630] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 512.142192] alloc_pages_current+0x107/0x210 [ 512.146687] pte_alloc_one+0x1b/0x1a0 [ 512.146709] do_huge_pmd_anonymous_page+0xbf2/0x1840 [ 512.155600] ? check_preemption_disabled+0x48/0x290 [ 512.160627] ? check_preemption_disabled+0x48/0x290 [ 512.165665] ? __thp_get_unmapped_area+0x190/0x190 [ 512.170610] ? mark_held_locks+0x100/0x100 [ 512.174863] ? mark_held_locks+0x100/0x100 [ 512.179144] ? perf_trace_lock+0x750/0x750 [ 512.183400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 512.188993] ? pud_val+0x85/0x100 [ 512.192466] ? pmd_val+0x100/0x100 [ 512.196023] ? debug_smp_processor_id+0x1c/0x20 [ 512.200714] __handle_mm_fault+0x38e7/0x5690 [ 512.205177] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 512.210027] ? check_preemption_disabled+0x48/0x290 [ 512.215054] ? handle_mm_fault+0x3cc/0xc80 [ 512.219322] ? lock_downgrade+0x910/0x910 [ 512.223493] ? kasan_check_read+0x11/0x20 [ 512.227657] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 512.232950] ? rcu_read_unlock_special+0x380/0x380 [ 512.237905] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 512.243453] ? check_preemption_disabled+0x48/0x290 [ 512.248492] handle_mm_fault+0x4ec/0xc80 [ 512.252571] ? __handle_mm_fault+0x5690/0x5690 [ 512.257172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 512.262726] ? vmacache_update+0x114/0x140 [ 512.266988] __do_page_fault+0x5da/0xd60 [ 512.271092] do_page_fault+0xe6/0x7d8 [ 512.274917] ? vmalloc_sync_all+0x30/0x30 [ 512.279077] ? find_held_lock+0x35/0x120 [ 512.283158] ? __might_fault+0x12b/0x1e0 [ 512.287247] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 512.292114] page_fault+0x1e/0x30 [ 512.295584] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 512.301484] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 512.320404] RSP: 0018:ffff88808e09fb00 EFLAGS: 00010206 [ 512.325782] RAX: 0000000000000000 RBX: 0000000000000800 RCX: 0000000000000800 [ 512.333062] RDX: 0000000000000800 RSI: 0000000020c34fff RDI: ffff888086a6b3c0 [ 512.340337] RBP: ffff88808e09fb38 R08: ffffed1010d4d778 R09: 0000000000000000 [ 512.347626] R10: ffffed1010d4d777 R11: ffff888086a6bbbf R12: 0000000020c34fff [ 512.354914] R13: 0000000020c357ff R14: ffff888086a6b3c0 R15: 00007ffffffff000 [ 512.362238] ? _copy_from_user+0x10b/0x150 [ 512.366492] tty_write+0x409/0x7a0 [ 512.370055] ? process_echoes+0x170/0x170 [ 512.374218] __vfs_write+0x116/0xb40 [ 512.378161] ? tty_read+0x2a0/0x2a0 [ 512.381801] ? kernel_read+0x120/0x120 [ 512.385697] ? fget_raw+0x20/0x20 [ 512.389160] ? __mutex_unlock_slowpath+0x195/0x870 [ 512.394125] ? apparmor_file_permission+0x25/0x30 [ 512.398984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 512.404532] ? security_file_permission+0x94/0x320 [ 512.409486] ? rw_verify_area+0x118/0x360 [ 512.413650] vfs_write+0x20c/0x580 [ 512.417212] ksys_write+0x105/0x260 [ 512.420855] ? __ia32_sys_read+0xb0/0xb0 [ 512.424937] ? trace_hardirqs_off_caller+0x300/0x300 [ 512.430053] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 512.434824] __x64_sys_write+0x73/0xb0 [ 512.438727] do_syscall_64+0x1a3/0x800 [ 512.442635] ? syscall_return_slowpath+0x5f0/0x5f0 [ 512.447577] ? prepare_exit_to_usermode+0x232/0x3b0 [ 512.452616] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 512.457488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 512.462698] RIP: 0033:0x457ec9 [ 512.465926] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 512.485333] RSP: 002b:00007f2c73e1ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 512.493066] RAX: ffffffffffffffda RBX: 00007f2c73e1ac90 RCX: 0000000000457ec9 [ 512.500343] RDX: 00000000ffffff0b RSI: 0000000020c34fff RDI: 0000000000000003 20:50:34 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000700), 0x0, 0x0, &(0x7f00000007c0)}) [ 512.508125] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 512.515418] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c73e1b6d4 [ 512.522693] R13: 00000000004c3a3c R14: 00000000004dbbc0 R15: 0000000000000004 20:50:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000100)) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) ftruncate(r2, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) 20:50:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00007e5000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000bc000)=@abs, 0x6e) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L-', 0x80000001}, 0x28, 0x2) r3 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x8, 0x480000) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="881ed232a31afa73b856e7dd2f38080e000000", @ANYRES16=r4, @ANYBLOB="00012cbd7000fddbdf250700000014000900080002000500000008000100d400000004000100240004000c00070008000400070000001400010062726f6164636173742d6c696e6b00000c00060008000100090000002c0006000400020004000200080001000100008008000100000000000800010001800000080001004f000000"], 0x88}, 0x1, 0x0, 0x0, 0x40004}, 0x800) fcntl$setstatus(r2, 0x4, 0x800) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f00000001c0)="c7e97e6c71d9144c03be998067f51e6b053b4eb70e63e52e1499e605b7eaf88d25c2c3c0ab42bebc4f3e523a096959619b66fdcc7ab1330743c09c120e188ad06f89bac5b75826ab073a912468a33ee21c979341cdf7566d15d7c4baa262b66dc4cba30159522f57", 0x68}, {&(0x7f00000003c0)="29b0629dff70b4433b9d52acab39d8038447d7c62b8a38bdada7c96cd0734067c814dd8fba78e81d010e728377736bf3fa094ab99275b9f9675fdb0bf4eb6993fe25f1517e74b1f782f7bd84868e47d8e53a8a52edf421c17efaef0fd34252e085b75f187128956c4ff57e95fc4af2dc7df02a0f4e3af2834ba51771939a282fef6fac5e8fb7a87bb395e404df397f6f3d25603f0ce0e6f07a1b437f2b81268fcb8f917ee661dcd31a856980bcbcf072246ff92af7e710554dd9dbb0bd692ecb65e7c6b996e408c39040030791fbb944b6cf0f857accf14504c36716b644e9d8e2d843", 0xe3}, {&(0x7f00000004c0)="8ecc3a4074620efe3d50b7098a7bfd91dcacf32abef46a502423db941ad5b5f0ab86b87df8255937b93e5cbccf5e7dd9ee0e4faec50e09982e03606600dae0dc79e7ecd8dfd250bae454bd71e3c0f3b3dfad5e07b7cafe50734ecef8736dff2dec3e2ae74c365d1b06288d222bc64eb5bc6a76d46755ad4420ffdb50d0ec6f3743e7ce7b7d76ed182facc2d0dd6e302190837591152aac95dfd915fdfb0ffc388d7a6e4650cffaa92ca2ca72a26b47134822da1bff646aa6d14f78fbe3c1163ef12cde7648e584da3ea496437b3d675b0612f28a37da90cb8eb07781dc8456295a7f2c", 0xe3}, {&(0x7f00000005c0)="3305a2360f0963a991dae20c873922391189bc1046b1cd9cf0b335a78afb1b6357656f0c4cbd5eab391361fa3d1354c065cc97beb7ac27f68138df94bb560fed09033729dbc58da8fb78b36b32fb3cb4759789f447c61531f9e3d6bb8900e1cc52ca35411178f1d0496a963f9f45fe8ad98a4c08bd61b0c6dc8a46217b565e25dfd6142df031afe032cbd0ed977d16a36476ff30d9f0c02a3702f8f808c980128e8648a447b216fb76a8f4f08f97e74dea2d7ff7c1a05f98e7183e9192e7158c9d1789d9e360b68e85b631f5d9495245ba633d2ac8bb", 0xd6}], 0x4, 0x41) close(r0) [ 512.715789] hfs: unable to parse mount options 20:50:34 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) 20:50:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x81, 0x1) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000080)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x800000000005, 0x84) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x0, [@default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast]}) setsockopt$inet6_buf(r0, 0x29, 0x2b, &(0x7f0000000180)="bf1e4528ff5b59e042e07fa7840420a1bc497a135234a5e7ecfdeff21e40ae7ac9b196247cb94ba0f94039b35babc5df08f16fb782eb1f7c141557f8d946fa56c20baca21a7b25819d201154847f9996e9611f483fff6ca56fd10d", 0x5b) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000040)={0x0, 0x0, 0x101, 0x5, 0x100, 0x903, 0x7}) [ 512.780613] hfs: unable to parse mount options 20:50:34 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x3fffffffffffffc, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="00080000ec0500006d8a2b00120000008d000000b90200000001000284811f4ce10077a1907aaae6313400000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x0, 0x0) semget(0x2, 0x0, 0x400) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x81) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="580000002500000428bd7900fcdbdf2500000000", @ANYRES32=r1, @ANYBLOB="0200060004000c000a001b000400080008000d00060000000c000100626669666f00000008000200000000000c00010068667363000000000800020001000000"], 0x58}, 0x1, 0x0, 0x0, 0x40080}, 0x4) [ 512.885965] binder: release 23695:23698 transaction 60 out, still active [ 512.897091] binder: unexpected work type, 4, not freed 20:50:34 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 512.927587] binder: undelivered TRANSACTION_COMPLETE [ 512.964994] binder: send failed reply for transaction 60, target dead 20:50:34 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x3, r0, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(r1, 0xf, 0x0) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0xffffffffffffffff) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ubi_ctrl\x00', 0x10000, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) r4 = dup(r0) ioctl$KDADDIO(r4, 0x4b34, 0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40, 0x0) ftruncate(r2, 0x1000000) sendfile(0xffffffffffffffff, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(0xffffffffffffffff) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) socket$l2tp(0x18, 0x1, 0x1) r5 = add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)="a07259ded8d4e495f8c8b82043a5a6c097fc35dd118d41ceb81731e51559c11a6c7b3bab1d874980fc46dfb074dbf9c8ea292ad56eef8becf10ff4893bad55951ce1242561f16c0102fbb70fe6e9e2c4d5f01bc3c2181f16f1392210af38496fc4f0f83f836914265fc6ca8c58d370b1039f39023e4469612277", 0x7a, 0xfffffffffffffffc) r6 = syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x9, 0x80) ioctl$TIOCSLCKTRMIOS(r6, 0x5457, &(0x7f00000003c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) r8 = getgid() keyctl$chown(0x4, r5, r7, r8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) [ 513.095932] binder: release 23703:23709 transaction 64 out, still active [ 513.111988] binder: unexpected work type, 4, not freed [ 513.122969] REISERFS (device loop2): found reiserfs format "3.5" with non-standard journal [ 513.163782] binder: undelivered TRANSACTION_COMPLETE [ 513.202357] binder: send failed reply for transaction 64, target dead [ 513.220664] REISERFS (device loop2): using ordered data mode [ 513.243769] reiserfs: using flush barriers 20:50:34 executing program 1 (fault-call:3 fault-nth:2): r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 20:50:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2000000, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) 20:50:34 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 513.268612] REISERFS warning (device loop2): sh-458 journal_init_dev: cannot init journal device 'unknown-block(0,141)': -6 [ 513.321540] REISERFS warning (device loop2): sh-462 journal_init: unable to initialize journal device [ 513.344009] binder: release 23718:23722 transaction 68 out, still active [ 513.356350] hfs: unable to parse mount options [ 513.370057] REISERFS warning (device loop2): sh-2022 reiserfs_fill_super: unable to initialize journal space [ 513.382451] binder: unexpected work type, 4, not freed [ 513.406590] binder: undelivered TRANSACTION_COMPLETE 20:50:34 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000580)=0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x70, 0x3, 0x8, 0x2, 0x20, 0x0, 0x7ff, 0x40902, 0x2, 0x5, 0x8, 0x1, 0x1, 0x0, 0x5, 0xff, 0x0, 0x80000001, 0x100000001, 0x14, 0x5, 0x40, 0x3, 0x6, 0x0, 0x2, 0x47695c98, 0x74c, 0x8, 0x10001, 0x8a, 0xb6cf, 0x80, 0x3f, 0x9, 0x10001, 0x6, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000540), 0xb}, 0x8, 0x2d, 0x5, 0x4, 0x0, 0xffffffff, 0x2}, r3, 0x6, r0, 0x8) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'ip6erspan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000500)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getsockname$packet(r1, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000740)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000940)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000980)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000bc0)={@local, @multicast2, 0x0}, &(0x7f0000000c00)=0xc) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000c40)={@loopback, 0x0}, &(0x7f0000000c80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xffffffffffffff7a) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000e00)={{{@in6=@ipv4={[], [], @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000f00)=0xe8) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000f80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x802}, 0xc, &(0x7f0000000f40)={&(0x7f0000001900)=ANY=[@ANYBLOB="38050000", @ANYRES16=r4, @ANYBLOB="000027bd7000fddbdf2500000000080901000a35b58a25a0067f9c85b6825b70a79030f010521b82960af1d932d65c8d7e4979b958238f47fde4983a9d9e228e5aa7e535ec", @ANYRES32=r5, @ANYBLOB="a401020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB="080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400090000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r7, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080020000180000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040053f40000080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400fd000000080007000000000038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000008000300030000000800040007000000080001006367d385b27cc8f634a34de1d6eecc1506610f948bcb72beb6c61a358a058700f080cd01e35ae1255c5711d04996769926cd3abe321cfb33bc19fdaafd3c70c95f6314a74663d8c7ec40c7106ede163caf2e08ae94f29cba3cce6e086ede4f09663d701985f5c5c988dacd5e2bd248e93fd33020b5c8d185c06e8519d93e85043f702450cae9725f872c6e02e0274b416a7e9fe25f582d8b372ab092adef0e86412e4ba702baa02adc93707f7eb4754dddcf", @ANYRES32=r8, @ANYBLOB="6401020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400020000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r10, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000700000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f61646361737400000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400c1ffffff08000100", @ANYRES32=r11, @ANYBLOB="4800020044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b75700000000008000100", @ANYRES32=r12, @ANYBLOB="4400020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000008000600", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="6801020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004001f00000008000600", @ANYRES32=r15, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r16, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400fbffffff38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004003591ffff38000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000008000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000400000008000600", @ANYRES32=r17], 0x538}, 0x1, 0x0, 0x0, 0x20000010}, 0x844) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) connect$bt_rfcomm(r1, &(0x7f0000000ac0)={0x1f, {0x20, 0x7, 0xf3, 0x80, 0x5, 0x3}, 0x1ba3}, 0xa) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee01]) 20:50:35 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 513.423014] binder: send failed reply for transaction 68, target dead [ 513.442828] FAULT_INJECTION: forcing a failure. [ 513.442828] name failslab, interval 1, probability 0, space 0, times 0 [ 513.457767] CPU: 1 PID: 23726 Comm: syz-executor1 Not tainted 4.20.0+ #1 [ 513.464650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.474002] Call Trace: [ 513.476587] dump_stack+0x1db/0x2d0 [ 513.480232] ? dump_stack_print_info.cold+0x20/0x20 [ 513.485262] should_fail.cold+0xa/0x15 [ 513.489142] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 513.494257] ? ___might_sleep+0x1e7/0x310 [ 513.498418] ? arch_local_save_flags+0x50/0x50 [ 513.503001] __should_failslab+0x121/0x190 [ 513.507228] should_failslab+0x9/0x14 [ 513.511019] kmem_cache_alloc+0x2be/0x710 [ 513.515187] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 513.520734] ptlock_alloc+0x20/0x70 [ 513.524374] pte_alloc_one+0x6d/0x1a0 [ 513.528184] do_huge_pmd_anonymous_page+0xbf2/0x1840 [ 513.533292] ? check_preemption_disabled+0x48/0x290 [ 513.538308] ? check_preemption_disabled+0x48/0x290 [ 513.543344] ? __thp_get_unmapped_area+0x190/0x190 [ 513.548301] ? mark_held_locks+0x100/0x100 [ 513.552539] ? mark_held_locks+0x100/0x100 [ 513.556794] ? perf_trace_lock+0x750/0x750 [ 513.561037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 513.566578] ? pud_val+0x85/0x100 [ 513.570043] ? pmd_val+0x100/0x100 [ 513.573588] ? debug_smp_processor_id+0x1c/0x20 [ 513.578281] __handle_mm_fault+0x38e7/0x5690 [ 513.582710] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 513.587557] ? check_preemption_disabled+0x48/0x290 [ 513.592590] ? handle_mm_fault+0x3cc/0xc80 [ 513.596906] ? lock_downgrade+0x910/0x910 [ 513.601063] ? kasan_check_read+0x11/0x20 [ 513.605220] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 513.610506] ? rcu_read_unlock_special+0x380/0x380 [ 513.615446] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 513.620984] ? check_preemption_disabled+0x48/0x290 [ 513.626036] handle_mm_fault+0x4ec/0xc80 [ 513.630118] ? __handle_mm_fault+0x5690/0x5690 [ 513.634705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 513.640245] ? vmacache_update+0x114/0x140 [ 513.644504] __do_page_fault+0x5da/0xd60 [ 513.648584] do_page_fault+0xe6/0x7d8 [ 513.652408] ? vmalloc_sync_all+0x30/0x30 [ 513.656563] ? find_held_lock+0x35/0x120 [ 513.660628] ? __might_fault+0x12b/0x1e0 [ 513.664737] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 513.669596] page_fault+0x1e/0x30 [ 513.673055] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 513.678944] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 513.697874] RSP: 0018:ffff88804f6a7b00 EFLAGS: 00010206 [ 513.703247] RAX: 0000000000000000 RBX: 0000000000000800 RCX: 0000000000000800 [ 513.710516] RDX: 0000000000000800 RSI: 0000000020c34fff RDI: ffff888059282b40 [ 513.717828] RBP: ffff88804f6a7b38 R08: ffffed100b250668 R09: 0000000000000000 [ 513.725115] R10: ffffed100b250667 R11: ffff88805928333f R12: 0000000020c34fff [ 513.732390] R13: 0000000020c357ff R14: ffff888059282b40 R15: 00007ffffffff000 [ 513.739692] ? _copy_from_user+0x10b/0x150 [ 513.743937] tty_write+0x409/0x7a0 [ 513.747491] ? process_echoes+0x170/0x170 [ 513.751650] __vfs_write+0x116/0xb40 [ 513.755379] ? tty_read+0x2a0/0x2a0 [ 513.759011] ? kernel_read+0x120/0x120 [ 513.762909] ? fget_raw+0x20/0x20 [ 513.766377] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 513.771934] ? apparmor_file_permission+0x25/0x30 [ 513.776787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 513.782335] ? security_file_permission+0x94/0x320 [ 513.787287] ? rw_verify_area+0x118/0x360 [ 513.791447] vfs_write+0x20c/0x580 [ 513.795001] ksys_write+0x105/0x260 [ 513.798640] ? __ia32_sys_read+0xb0/0xb0 [ 513.802709] ? syscall_get_arguments.part.0+0x10/0x10 [ 513.807932] ? trace_hardirqs_off_caller+0x300/0x300 [ 513.813045] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 513.817811] __x64_sys_write+0x73/0xb0 [ 513.821709] do_syscall_64+0x1a3/0x800 [ 513.825603] ? syscall_return_slowpath+0x5f0/0x5f0 [ 513.830539] ? prepare_exit_to_usermode+0x232/0x3b0 [ 513.835569] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 513.840430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 513.845619] RIP: 0033:0x457ec9 [ 513.848817] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 513.867732] RSP: 002b:00007f2c73e1ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 513.875440] RAX: ffffffffffffffda RBX: 00007f2c73e1ac90 RCX: 0000000000457ec9 [ 513.882708] RDX: 00000000ffffff0b RSI: 0000000020c34fff RDI: 0000000000000003 [ 513.889980] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 513.897248] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c73e1b6d4 [ 513.904520] R13: 00000000004c3a3c R14: 00000000004dbbc0 R15: 0000000000000004 [ 513.952300] hfs: unable to parse mount options 20:50:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x20, 0x53}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r0, 0x32, 0x9}, 0xfffffffffffffe3b) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x2004, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0xe800) r4 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x3, 0x2) r5 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) socket$inet6_sctp(0xa, 0x8, 0x84) ftruncate(r5, 0x1000000) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f0000000140)={0xf, 0x2e, 0x12, 0x6, 0x3, 0xe348, 0x5, 0x9c, 0x1}) sendfile(r4, r5, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000040)={0x9, 0x3, 0xff, 0x0, '\x00', 0x8}) close(r4) setsockopt$inet_int(r2, 0x0, 0x32, &(0x7f0000000080)=0xffd, 0x4) r6 = gettid() syz_open_procfs(r6, &(0x7f0000000180)='net/dev_snmp6\x00') 20:50:35 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4c00, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="300f07bb730bc371fd8173570b335aaebc66884763ed686058fe85279b106c4f2f67917b954e6c28b5be3dfced4c1238e1a88bdaf46673406b408118f4e4c42627ff305ad69c097044f92243efe19344ea129a9a8afc60049204678e51cdf314d31b53c47dc25a086db0493100cebbf64c40a5e3552e7a1bdcd97db9d9ebfd9904db5cf1200e9ad6f842fed25963c5d1674e38d8addf6603fe08c670bcfb486495313c879d30112315e316e51aba7cc04e774596bb0b1f7f7745728f476b52d74a1249c5f3373f8e664f1aeb723a68890dabda98ac0ff77f100c532d9bb00468cd1f7be89d3f51d32e38dcdb5d890aee76a2"]) [ 514.022876] binder: 23734:23738 got transaction with invalid offset (0, min 0 max 0) or object. [ 514.032117] binder: 23734:23738 transaction failed 29201/-22, size 0-8 line 3097 [ 514.056326] REISERFS (device loop2): found reiserfs format "3.5" with non-standard journal [ 514.057223] binder: undelivered TRANSACTION_ERROR: 29201 20:50:35 executing program 1 (fault-call:3 fault-nth:3): r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 20:50:35 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) [ 514.103723] REISERFS (device loop2): using ordered data mode [ 514.115039] reiserfs: using flush barriers [ 514.121211] REISERFS warning (device loop2): sh-458 journal_init_dev: cannot init journal device 'unknown-block(0,141)': -6 [ 514.134081] REISERFS warning (device loop2): sh-462 journal_init: unable to initialize journal device [ 514.145868] REISERFS warning (device loop2): sh-2022 reiserfs_fill_super: unable to initialize journal space 20:50:35 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x3fffffffffffffc, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="00080000ec0500006d8a2b00120000008d000000b90200000001000284811f4ce10077a1907aaae6313400000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x0, 0x0) semget(0x2, 0x0, 0x400) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x81) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="580000002500000428bd7900fcdbdf2500000000", @ANYRES32=r1, @ANYBLOB="0200060004000c000a001b000400080008000d00060000000c000100626669666f00000008000200000000000c00010068667363000000000800020001000000"], 0x58}, 0x1, 0x0, 0x0, 0x40080}, 0x4) [ 514.284574] FAULT_INJECTION: forcing a failure. [ 514.284574] name failslab, interval 1, probability 0, space 0, times 0 [ 514.289322] ------------[ cut here ]------------ [ 514.298690] CPU: 1 PID: 23748 Comm: syz-executor1 Not tainted 4.20.0+ #1 [ 514.303430] downgrading a read lock [ 514.303520] WARNING: CPU: 0 PID: 23751 at kernel/locking/lockdep.c:3553 lock_downgrade+0x4d2/0x910 [ 514.310258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.313864] Kernel panic - not syncing: panic_on_warn set ... [ 514.322944] Call Trace: [ 514.340731] dump_stack+0x1db/0x2d0 [ 514.344376] ? dump_stack_print_info.cold+0x20/0x20 [ 514.349396] ? __lock_acquire+0x572/0x4a30 [ 514.353642] should_fail.cold+0xa/0x15 [ 514.357546] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 514.362659] ? mark_held_locks+0x100/0x100 [ 514.366908] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.372450] ? check_preemption_disabled+0x48/0x290 [ 514.377589] ? debug_smp_processor_id+0x1c/0x20 [ 514.382264] __should_failslab+0x121/0x190 [ 514.386518] should_failslab+0x9/0x14 [ 514.390334] __kmalloc+0x71/0x740 [ 514.393796] ? mutex_trylock+0x2d0/0x2d0 [ 514.397862] ? __tty_buffer_request_room+0x2bf/0x7e0 [ 514.402977] __tty_buffer_request_room+0x2bf/0x7e0 [ 514.407918] ? tty_buffer_free+0x160/0x160 [ 514.412163] ? kasan_check_read+0x11/0x20 [ 514.416317] ? do_raw_spin_lock+0x156/0x360 [ 514.420636] ? lock_release+0xc40/0xc40 [ 514.424618] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 514.430158] ? add_wait_queue+0x1bc/0x300 [ 514.434313] pty_write+0x133/0x200 [ 514.437861] n_tty_write+0xb9e/0x1220 [ 514.441679] ? __do_page_fault+0x3f1/0xd60 [ 514.445919] ? retint_kernel+0x2d/0x2d [ 514.449814] ? process_echoes+0x170/0x170 [ 514.453967] ? __init_waitqueue_head+0x150/0x150 [ 514.458728] ? copy_user_enhanced_fast_string+0xe/0x20 [ 514.464014] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 514.469554] ? _copy_from_user+0xdd/0x150 [ 514.473735] tty_write+0x45b/0x7a0 [ 514.477283] ? process_echoes+0x170/0x170 [ 514.481439] __vfs_write+0x116/0xb40 [ 514.485156] ? tty_read+0x2a0/0x2a0 [ 514.488782] ? kernel_read+0x120/0x120 [ 514.492672] ? fget_raw+0x20/0x20 [ 514.496158] ? __mutex_unlock_slowpath+0x195/0x870 [ 514.501098] ? apparmor_file_permission+0x25/0x30 [ 514.505942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.511956] ? security_file_permission+0x94/0x320 [ 514.516896] ? rw_verify_area+0x118/0x360 [ 514.521067] vfs_write+0x20c/0x580 [ 514.524624] ksys_write+0x105/0x260 [ 514.528305] ? __ia32_sys_read+0xb0/0xb0 [ 514.532383] ? trace_hardirqs_off_caller+0x300/0x300 [ 514.537494] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 514.542254] __x64_sys_write+0x73/0xb0 [ 514.546156] do_syscall_64+0x1a3/0x800 [ 514.550055] ? syscall_return_slowpath+0x5f0/0x5f0 [ 514.554988] ? prepare_exit_to_usermode+0x232/0x3b0 [ 514.560015] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 514.564890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.570076] RIP: 0033:0x457ec9 [ 514.573273] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 514.592172] RSP: 002b:00007f2c73e1ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 514.599877] RAX: ffffffffffffffda RBX: 00007f2c73e1ac90 RCX: 0000000000457ec9 [ 514.607149] RDX: 00000000ffffff0b RSI: 0000000020c34fff RDI: 0000000000000003 [ 514.614418] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 514.621685] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c73e1b6d4 [ 514.628969] R13: 00000000004c3a3c R14: 00000000004dbbc0 R15: 0000000000000004 [ 514.636259] CPU: 0 PID: 23751 Comm: modprobe Not tainted 4.20.0+ #1 [ 514.636262] [ 514.636270] ====================================================== [ 514.636275] WARNING: possible circular locking dependency detected [ 514.636278] 4.20.0+ #1 Not tainted [ 514.636282] ------------------------------------------------------ [ 514.636287] syz-executor1/23748 is trying to acquire lock: [ 514.636290] 00000000d21e0417 (console_owner){-.-.}, at: console_unlock+0x4d3/0x11e0 [ 514.636305] [ 514.636309] but task is already holding lock: [ 514.636312] 000000005d373c58 (&(&port->lock)->rlock){-.-.}, at: pty_write+0xff/0x200 [ 514.636327] [ 514.636332] which lock already depends on the new lock. [ 514.636334] [ 514.636337] [ 514.636342] the existing dependency chain (in reverse order) is: [ 514.636344] [ 514.636347] -> #2 (&(&port->lock)->rlock){-.-.}: [ 514.636372] _raw_spin_lock_irqsave+0x95/0xcd [ 514.636376] tty_port_tty_get+0x22/0x80 [ 514.636380] tty_port_default_wakeup+0x16/0x40 [ 514.636385] tty_port_tty_wakeup+0x5d/0x70 [ 514.636388] uart_write_wakeup+0x46/0x70 [ 514.636392] serial8250_tx_chars+0x4a4/0xb20 [ 514.636397] serial8250_handle_irq.part.0+0x1be/0x2e0 [ 514.636401] serial8250_default_handle_irq+0xc5/0x150 [ 514.636406] serial8250_interrupt+0xfb/0x1a0 [ 514.636410] __handle_irq_event_percpu+0x1c6/0xb10 [ 514.636415] handle_irq_event_percpu+0xa0/0x1d0 [ 514.636419] handle_irq_event+0xa7/0x134 [ 514.636423] handle_edge_irq+0x232/0x8a0 [ 514.636427] handle_irq+0x252/0x3d8 [ 514.636430] do_IRQ+0x99/0x1d0 [ 514.636434] ret_from_intr+0x0/0x1e [ 514.636438] native_safe_halt+0x2/0x10 [ 514.636442] arch_cpu_idle+0x10/0x20 [ 514.636446] default_idle_call+0x36/0x90 [ 514.636450] do_idle+0x386/0x5d0 [ 514.636454] cpu_startup_entry+0x1b/0x20 [ 514.636458] start_secondary+0x435/0x620 [ 514.636463] secondary_startup_64+0xa4/0xb0 [ 514.636466] [ 514.636468] -> #1 (&port_lock_key){-.-.}: [ 514.636483] _raw_spin_lock_irqsave+0x95/0xcd [ 514.636487] serial8250_console_write+0x253/0xab0 [ 514.636491] univ8250_console_write+0x5f/0x70 [ 514.636495] console_unlock+0xcff/0x11e0 [ 514.636499] vprintk_emit+0x370/0x960 [ 514.636503] vprintk_default+0x28/0x30 [ 514.636507] vprintk_func+0x7e/0x189 [ 514.636511] printk+0xba/0xed [ 514.636515] register_console+0x74d/0xb50 [ 514.636519] univ8250_console_init+0x3e/0x4b [ 514.636523] console_init+0x6b7/0x9fe [ 514.636527] start_kernel+0x5df/0x8bd [ 514.636532] x86_64_start_reservations+0x29/0x2b [ 514.636536] x86_64_start_kernel+0x77/0x7b [ 514.636540] secondary_startup_64+0xa4/0xb0 [ 514.636542] [ 514.636545] -> #0 (console_owner){-.-.}: [ 514.636560] lock_acquire+0x1db/0x570 [ 514.636564] console_unlock+0x53d/0x11e0 [ 514.636568] vprintk_emit+0x370/0x960 [ 514.636572] vprintk_default+0x28/0x30 [ 514.636575] vprintk_func+0x7e/0x189 [ 514.636579] printk+0xba/0xed [ 514.636583] should_fail+0xa59/0xd22 [ 514.636587] __should_failslab+0x121/0x190 [ 514.636591] should_failslab+0x9/0x14 [ 514.636594] __kmalloc+0x71/0x740 [ 514.636599] __tty_buffer_request_room+0x2bf/0x7e0 [ 514.636604] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 514.636608] pty_write+0x133/0x200 [ 514.636612] n_tty_write+0xb9e/0x1220 [ 514.636616] tty_write+0x45b/0x7a0 [ 514.636619] __vfs_write+0x116/0xb40 [ 514.636623] vfs_write+0x20c/0x580 [ 514.636627] ksys_write+0x105/0x260 [ 514.636631] __x64_sys_write+0x73/0xb0 [ 514.636635] do_syscall_64+0x1a3/0x800 [ 514.636640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.636642] [ 514.636647] other info that might help us debug this: [ 514.636649] [ 514.636652] Chain exists of: [ 514.636655] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 514.636673] [ 514.636677] Possible unsafe locking scenario: [ 514.636680] [ 514.636684] CPU0 CPU1 [ 514.636688] ---- ---- [ 514.636691] lock(&(&port->lock)->rlock); [ 514.636701] lock(&port_lock_key); [ 514.636710] lock(&(&port->lock)->rlock); [ 514.636719] lock(console_owner); [ 514.636727] [ 514.636730] *** DEADLOCK *** [ 514.636732] [ 514.636736] 6 locks held by syz-executor1/23748: [ 514.636739] #0: 000000003242d5b6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 514.636756] #1: 00000000b944a46b (&tty->atomic_write_lock){+.+.}, at: tty_write_lock+0x23/0x90 [ 514.636773] #2: 0000000041a97d53 (&tty->termios_rwsem){++++}, at: n_tty_write+0x246/0x1220 [ 514.636791] #3: 00000000b723cb7f (&ldata->output_lock){+.+.}, at: n_tty_write+0xb59/0x1220 [ 514.636808] #4: 000000005d373c58 (&(&port->lock)->rlock){-.-.}, at: pty_write+0xff/0x200 [ 514.636825] #5: 0000000028f85a27 (console_lock){+.+.}, at: vprintk_emit+0x351/0x960 [ 514.636842] [ 514.636845] stack backtrace: [ 514.636851] CPU: 1 PID: 23748 Comm: syz-executor1 Not tainted 4.20.0+ #1 [ 514.636858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.636861] Call Trace: [ 514.636865] dump_stack+0x1db/0x2d0 [ 514.636869] ? dump_stack_print_info.cold+0x20/0x20 [ 514.636873] ? print_stack_trace+0x77/0xb0 [ 514.636877] ? vprintk_func+0x86/0x189 [ 514.636882] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 514.636892] __lock_acquire+0x3014/0x4a30 [ 514.636896] ? mark_held_locks+0x100/0x100 [ 514.636901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.636905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.636910] ? check_preemption_disabled+0x48/0x290 [ 514.636914] ? perf_trace_lock+0x750/0x750 [ 514.636918] ? scnprintf+0x140/0x140 [ 514.636922] ? perf_trace_lock_acquire+0x138/0x7d0 [ 514.636926] ? console_unlock+0x518/0x11e0 [ 514.636930] lock_acquire+0x1db/0x570 [ 514.636934] ? console_unlock+0x4d3/0x11e0 [ 514.636938] ? lock_release+0xc40/0xc40 [ 514.636942] ? do_raw_spin_trylock+0x270/0x270 [ 514.636946] ? lock_acquire+0x1db/0x570 [ 514.636950] console_unlock+0x53d/0x11e0 [ 514.636954] ? console_unlock+0x4d3/0x11e0 [ 514.636958] ? devkmsg_read+0xbc0/0xbc0 [ 514.636963] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 514.636967] ? vprintk_emit+0x351/0x960 [ 514.636971] ? __down_trylock_console_sem+0x148/0x210 [ 514.636975] vprintk_emit+0x370/0x960 [ 514.636979] ? wake_up_klogd+0x180/0x180 [ 514.636983] ? _raw_spin_unlock+0x2d/0x50 [ 514.636988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.636993] ? check_preemption_disabled+0x48/0x290 [ 514.636997] vprintk_default+0x28/0x30 [ 514.637000] vprintk_func+0x7e/0x189 [ 514.637004] printk+0xba/0xed [ 514.637008] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 514.637012] ? ___ratelimit+0xac/0x686 [ 514.637016] ? idr_get_free+0xee0/0xee0 [ 514.637020] ? __lock_acquire+0x572/0x4a30 [ 514.637024] should_fail+0xa59/0xd22 [ 514.637029] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 514.637033] ? mark_held_locks+0x100/0x100 [ 514.637038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.637042] ? check_preemption_disabled+0x48/0x290 [ 514.637046] ? debug_smp_processor_id+0x1c/0x20 [ 514.637051] __should_failslab+0x121/0x190 [ 514.637054] should_failslab+0x9/0x14 [ 514.637059] __kmalloc+0x71/0x740 [ 514.637063] ? mutex_trylock+0x2d0/0x2d0 [ 514.637068] ? __tty_buffer_request_room+0x2bf/0x7e0 [ 514.637078] __tty_buffer_request_room+0x2bf/0x7e0 [ 514.637082] ? tty_buffer_free+0x160/0x160 [ 514.637086] ? kasan_check_read+0x11/0x20 [ 514.637091] ? do_raw_spin_lock+0x156/0x360 [ 514.637094] ? lock_release+0xc40/0xc40 [ 514.637099] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 514.637103] ? add_wait_queue+0x1bc/0x300 [ 514.637107] pty_write+0x133/0x200 [ 514.637111] n_tty_write+0xb9e/0x1220 [ 514.637115] ? __do_page_fault+0x3f1/0xd60 [ 514.637119] ? retint_kernel+0x2d/0x2d [ 514.637123] ? process_echoes+0x170/0x170 [ 514.637127] ? __init_waitqueue_head+0x150/0x150 [ 514.637132] ? copy_user_enhanced_fast_string+0xe/0x20 [ 514.637137] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 514.637141] ? _copy_from_user+0xdd/0x150 [ 514.637145] tty_write+0x45b/0x7a0 [ 514.637149] ? process_echoes+0x170/0x170 [ 514.637152] __vfs_write+0x116/0xb40 [ 514.637156] ? tty_read+0x2a0/0x2a0 [ 514.637160] ? kernel_read+0x120/0x120 [ 514.637164] ? fget_raw+0x20/0x20 [ 514.637168] ? __mutex_unlock_slowpath+0x195/0x870 [ 514.637172] ? apparmor_file_permission+0x25/0x30 [ 514.637177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.637182] ? security_file_permission+0x94/0x320 [ 514.637186] ? rw_verify_area+0x118/0x360 [ 514.637189] vfs_write+0x20c/0x580 [ 514.637193] ksys_write+0x105/0x260 [ 514.637197] ? __ia32_sys_read+0xb0/0xb0 [ 514.637202] ? trace_hardirqs_off_caller+0x300/0x300 [ 514.637206] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 514.637210] __x64_sys_write+0x73/0xb0 [ 514.637214] do_syscall_64+0x1a3/0x800 [ 514.637218] ? syscall_return_slowpath+0x5f0/0x5f0 [ 514.637223] ? prepare_exit_to_usermode+0x232/0x3b0 [ 514.637227] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 514.637232] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.637235] RIP: 0033:0x457ec9 [ 514.637248] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 514.637252] RSP: 002b:00007f2c73e1ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 514.637262] RAX: ffffffffffffffda RBX: 00007f2c73e1ac90 RCX: 0000000000457ec9 [ 514.637267] RDX: 00000000ffffff0b RSI: 0000000020c34fff RDI: 0000000000000003 [ 514.637273] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 514.637279] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c73e1b6d4 [ 514.637284] R13: 00000000004c3a3c R14: 00000000004dbbc0 R15: 0000000000000004 [ 514.655246] binder: 23753:23757 got transaction with invalid offset (0, min 0 max 0) or object. [ 514.656888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.656893] Call Trace: [ 514.656913] dump_stack+0x1db/0x2d0 [ 514.656930] ? dump_stack_print_info.cold+0x20/0x20 [ 514.656947] ? lock_downgrade+0x4b0/0x910 [ 514.660579] binder: 23753:23757 transaction failed 29201/-22, size 0-8 line 3097 [ 514.666838] panic+0x2cb/0x589 [ 514.666855] ? add_taint.cold+0x16/0x16 [ 514.675232] binder: undelivered TRANSACTION_ERROR: 29201 [ 514.680258] ? lock_downgrade+0x4d2/0x910 [ 514.680273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.680288] ? __probe_kernel_read+0x1f4/0x250 [ 514.680303] ? __warn.cold+0x5/0x4b [ 515.651329] ? __warn+0xe8/0x1d0 [ 515.654704] ? lock_downgrade+0x4d2/0x910 [ 515.658849] __warn.cold+0x20/0x4b [ 515.662400] ? lock_downgrade+0x4d2/0x910 [ 515.666546] report_bug+0x263/0x2b0 [ 515.670187] do_error_trap+0x11b/0x200 [ 515.674076] do_invalid_op+0x37/0x50 [ 515.677786] ? lock_downgrade+0x4d2/0x910 [ 515.681928] invalid_op+0x14/0x20 [ 515.685391] RIP: 0010:lock_downgrade+0x4d2/0x910 [ 515.690143] Code: 00 00 00 fc ff df 41 c6 04 06 f8 e9 1f ff ff ff 48 c7 c7 20 9e 4b 88 4c 89 8d 58 ff ff ff 48 89 85 60 ff ff ff e8 2e 1b e7 ff <0f> 0b 48 8b 85 60 ff ff ff 4c 8d 5d d8 4c 89 f1 48 ba 00 00 00 00 [ 515.709040] RSP: 0018:ffff88804dd07bb8 EFLAGS: 00010082 [ 515.714402] RAX: 0000000000000000 RBX: 1ffff11009ba0f7d RCX: 0000000000000000 [ 515.721663] RDX: 0000000000000000 RSI: ffffffff8167dbb6 RDI: 0000000000000006 [ 515.728928] RBP: ffff88804dd07c70 R08: ffff8880586445c0 R09: fffffbfff1332979 [ 515.736189] R10: fffffbfff1332978 R11: ffffffff89994bc3 R12: ffff8880586445c0 [ 515.743471] R13: ffffffff8b55b960 R14: ffff88804dd07c08 R15: 0000000000000001 [ 515.750752] ? vprintk_func+0x86/0x189 [ 515.754640] ? lock_downgrade+0x4d2/0x910 [ 515.758782] ? __do_munmap+0xc33/0xed0 [ 515.762671] ? lock_set_class+0x820/0x820 [ 515.766821] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 515.772137] ? userfaultfd_unmap_prep+0x456/0x5e0 [ 515.776997] downgrade_write+0x76/0x270 [ 515.780968] ? up_read+0x2b0/0x2b0 [ 515.784505] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 515.789517] ? vma_compute_subtree_gap+0x158/0x230 [ 515.794464] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 515.799508] __do_munmap+0xc33/0xed0 [ 515.803238] __vm_munmap+0x139/0x1f0 [ 515.806980] ? __do_munmap+0xed0/0xed0 [ 515.810863] ? trace_hardirqs_off_caller+0x300/0x300 [ 515.816069] __x64_sys_munmap+0x67/0x80 [ 515.820042] do_syscall_64+0x1a3/0x800 [ 515.823925] ? syscall_return_slowpath+0x5f0/0x5f0 [ 515.828877] ? lockdep_sys_exit+0x49/0x5c [ 515.833021] ? prepare_exit_to_usermode+0x232/0x3b0 [ 515.838037] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 515.842885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 515.848068] RIP: 0033:0x7feb4db49d37 [ 515.851809] Code: f0 ff ff 73 01 c3 48 8b 0d fe c0 2a 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d d1 c0 2a 00 31 d2 48 29 c2 64 [ 515.870701] RSP: 002b:00007ffe70f40a18 EFLAGS: 00000206 ORIG_RAX: 000000000000000b [ 515.878404] RAX: ffffffffffffffda RBX: 000055712e92d250 RCX: 00007feb4db49d37 [ 515.885668] RDX: 0000000000000000 RSI: 0000000000001000 RDI: 00007feb4e22e000 [ 515.892927] RBP: 0000000000000000 R08: 00007feb4e229700 R09: 00007feb4db94090 [ 515.900196] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 515.907460] R13: 000055712e935200 R14: 000055712e92d200 R15: 00007ffe70f40ca0 [ 515.915896] Kernel Offset: disabled [ 515.919517] Rebooting in 86400 seconds..