x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:01 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 663.049428][T23158] gfs2: invalid mount option: hash [ 663.089972][T23158] gfs2: can't parse mount arguments 19:43:01 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 19:43:01 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 19:43:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:01 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) 19:43:01 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x6, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f00000004c0)="6eeba52fdf9cd7df83af10e214be763369d2f7ddb382912ac1c49e5dfadcf2cb97f68d692a9f1897bd71c0df89597e1a6431d9e8c776cbd757a7a25e433a90047c5c039045196d91ed53b96772d962ffe716dc91d0dd531d89c9509253f00667dc85c77c7effab58ba23d2ddacffee9de94f55af8e15f3d8d4c87fbfe5275eeb80102323fc2b6cd56cb7fb", 0x8b, 0x3}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4548a1dffe18d967cb5628b23f7dbc7d3d8ccb3dc3b6459c5e85f125189f5cdf4652c7e76ee4d845d3bcf3d9c29bf01e3ee01ad571486a3b46d801eb02d6178cea50ef6d2952923b017b73f0ad294095c44f5de61fc9e976b07c3c5c427fd4073f8db39911022b76ec67ceec04dab02e4dca17a77b574ff", 0xe0}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:01 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 19:43:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:01 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) [ 663.432986][T23291] gfs2: invalid mount option: hash 19:43:01 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) [ 663.503127][T23291] gfs2: can't parse mount arguments 19:43:01 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:01 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 19:43:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x6, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f00000004c0)="6eeba52fdf9cd7df83af10e214be763369d2f7ddb382912ac1c49e5dfadcf2cb97f68d692a9f1897bd71c0df89597e1a6431d9e8c776cbd757a7a25e433a90047c5c039045196d91ed53b96772d962ffe716dc91d0dd531d89c9509253f00667dc85c77c7effab58ba23d2ddacffee9de94f55af8e15f3d8d4c87fbfe5275eeb80102323fc2b6cd56cb7fb", 0x8b, 0x3}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4548a1dffe18d967cb5628b23f7dbc7d3d8ccb3dc3b6459c5e85f125189f5cdf4652c7e76ee4d845d3bcf3d9c29bf01e3ee01ad571486a3b46d801eb02d6178cea50ef6d2952923b017b73f0ad294095c44f5de61fc9e976b07c3c5c427fd4073f8db39911022b76ec67ceec04dab02e4dca17a77b574ff", 0xe0}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:01 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) 19:43:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 19:43:01 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:01 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 19:43:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x6, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f00000004c0)="6eeba52fdf9cd7df83af10e214be763369d2f7ddb382912ac1c49e5dfadcf2cb97f68d692a9f1897bd71c0df89597e1a6431d9e8c776cbd757a7a25e433a90047c5c039045196d91ed53b96772d962ffe716dc91d0dd531d89c9509253f00667dc85c77c7effab58ba23d2ddacffee9de94f55af8e15f3d8d4c87fbfe5275eeb80102323fc2b6cd56cb7fb", 0x8b, 0x3}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4548a1dffe18d967cb5628b23f7dbc7d3d8ccb3dc3b6459c5e85f125189f5cdf4652c7e76ee4d845d3bcf3d9c29bf01e3ee01ad571486a3b46d801eb02d6178cea50ef6d2952923b017b73f0ad294095c44f5de61fc9e976b07c3c5c427fd4073f8db39911022b76ec67ceec04dab02e4dca17a77b574ff", 0xe0}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) [ 663.916395][T23531] input: syz0 as /devices/virtual/input/input2897 19:43:01 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x801, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 19:43:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="e997357b59dfd3c591"], 0x1}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:43:02 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 664.120944][T23544] gfs2: invalid mount option: hash 19:43:02 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 664.152299][T23544] gfs2: can't parse mount arguments 19:43:02 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 19:43:02 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x801, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 19:43:02 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:02 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x6, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f00000004c0)="6eeba52fdf9cd7df83af10e214be763369d2f7ddb382912ac1c49e5dfadcf2cb97f68d692a9f1897bd71c0df89597e1a6431d9e8c776cbd757a7a25e433a90047c5c039045196d91ed53b96772d962ffe716dc91d0dd531d89c9509253f00667dc85c77c7effab58ba23d2ddacffee9de94f55af8e15f3d8d4c87fbfe5275eeb80102323fc2b6cd56cb7fb", 0x8b, 0x3}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4548a1dffe18d967cb5628b23f7dbc7d3d8ccb3dc3b6459c5e85f125189f5cdf4652c7e76ee4d845d3bcf3d9c29bf01e3ee01ad571486a3b46d801eb02d6178cea50ef6d2952923b017b73f0ad294095c44f5de61fc9e976b07c3c5c427fd4073f8db39911022b76ec67ceec04dab02e4dca17a77b574ff8bba82a1842be3", 0xe7}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="e997357b59dfd3c591"], 0x1}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:43:02 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 664.491766][T23674] gfs2: invalid mount option: hash 19:43:02 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 19:43:02 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 664.537425][T23674] gfs2: can't parse mount arguments 19:43:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x801, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 19:43:02 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:02 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:02 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x6, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f00000004c0)="6eeba52fdf9cd7df83af10e214be763369d2f7ddb382912ac1c49e5dfadcf2cb97f68d692a9f1897bd71c0df89597e1a6431d9e8c776cbd757a7a25e433a90047c5c039045196d91ed53b96772d962ffe716dc91d0dd531d89c9509253f00667dc85c77c7effab58ba23d2ddacffee9de94f55af8e15f3d8d4c87fbfe5275eeb80102323fc2b6cd56cb7fb", 0x8b, 0x3}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4548a1dffe18d967cb5628b23f7dbc7d3d8ccb3dc3b6459c5e85f125189f5cdf4652c7e76ee4d845d3bcf3d9c29bf01e3ee01ad571486a3b46d801eb02d6178cea50ef6d2952923b017b73f0ad294095c44f5de61fc9e976b07c3c5c427fd4073f8db39911022b76ec67ceec04dab02e4dca17a77b574ff8bba82a1842be3", 0xe7}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:02 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 19:43:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 19:43:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2}) 19:43:02 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 664.939985][T23803] gfs2: invalid mount option: hash 19:43:02 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 664.968958][T23803] gfs2: can't parse mount arguments 19:43:02 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 19:43:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 19:43:03 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:03 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0}, 0x120) 19:43:03 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:03 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x6, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f00000004c0)="6eeba52fdf9cd7df83af10e214be763369d2f7ddb382912ac1c49e5dfadcf2cb97f68d692a9f1897bd71c0df89597e1a6431d9e8c776cbd757a7a25e433a90047c5c039045196d91ed53b96772d962ffe716dc91d0dd531d89c9509253f00667dc85c77c7effab58ba23d2ddacffee9de94f55af8e15f3d8d4c87fbfe5275eeb80102323fc2b6cd56cb7fb", 0x8b, 0x3}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4548a1dffe18d967cb5628b23f7dbc7d3d8ccb3dc3b6459c5e85f125189f5cdf4652c7e76ee4d845d3bcf3d9c29bf01e3ee01ad571486a3b46d801eb02d6178cea50ef6d2952923b017b73f0ad294095c44f5de61fc9e976b07c3c5c427fd4073f8db39911022b76ec67ceec04dab02e4dca17a77b574ff8bba82a1842be3", 0xe7}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040)=0xfff, 0x4) bind$inet(r0, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) sendto$inet(r0, &(0x7f0000000300)='\r', 0x1, 0x0, 0x0, 0x0) sendto(r0, &(0x7f00000012c0)="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", 0x400, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) 19:43:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 19:43:03 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 19:43:03 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 665.358198][T23940] gfs2: invalid mount option: hash 19:43:03 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 665.415238][T23940] gfs2: can't parse mount arguments 19:43:03 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 19:43:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) sendto$inet(r0, &(0x7f0000000300)='\r', 0x1, 0x0, 0x0, 0x0) sendto(r0, &(0x7f00000012c0)="862e2f66792f889eff93bedf6dc14fbb5a2b270209382521cf00bd5dd192f45ebb2d3656aa7d2db118c1c5a23f3a048d3eb30f0822434274f4b162e1474c3914fb732bdca1055334420dcab57de08c4c698b17959534b91556dbbd89f09ab0dcf026e395133d98bfcefb71ade9b5bc3504247948cead01382cfd9cba102d4bedbb0b2ba22bd411c8c4f6be2e8823e353e1042674ca22cc9417c8b3d08e4e2d5b9637022963ce5fc28072dbab19ec0e569fa1c0c3a4e9337423dfee462a64fa0752ab0db772f78af4bb11a7fbef3252df49cb64de572eac1dc2c2aa3ba98c3c0f455b211c00c1393d660ed41470aa789655f8a6f785f30b077a467eadbc34af99dd8ba4030f792f80c741b7e2b005806debc35c70dfa5b41b45923da7efbbeda51003af18201b882a657459962342fe18a68e15874344515010358b1234889cb683b8050a2b1d222e209e68b7748863854419ff3815c8ea99574a7e5049ba18714e7197a136bf39d95ffa39fa2824a1ab51a447abfe7bbee785a65378e9a90960272ff919cf9db83de033949e63e3cf34db98901f1a9c9ba12f4e1e38a609830baf4d6b188408305600e32bbdc4fcf86f67df43c6a84f7abe5e7408932206116c02b63f4ad51e1c3e3f7a2f04f7f92fd3a3b200280b00243d142033522214ed5f025cbc8164cd9781388d0ef067de46c756f272ea611209d74ee770f073615965307e3fa5a7469cb5a68eef95fb036b7767360e2299fd3d67a850089c533244a5a94941a52a1097284be1da86d3c9169cfb6a17384f8983fc0237d35cf1ca19084dda4e1d3cbd0520fd7a45be921c49460ce366847f812ac53693bc85d75c40a1c2a19f2e677b421921f549110f2827d9c10acbc3c939c971fe80ca39b786f634a0b05f74e155253c1437bf143e8ce84365b46ead29d7bffc7f55274601452a1c6ef093044af63da0f464902b025c866498c7e3004d3d1e8731bd6d1b5774d8e8954a745604400f49b9d022f249de3c15907bff0ef7d757483cdc353f3143e7ebdece542cfc1dc8e933d24ebb760567cf6429d186a43162af49eb5e9d3e943addff581bd5b9c0d589492a938add82b8f806f141e38edbbbc09494d419f9f60bbd2374ed801923f2f8784f4cf8ce729e73410e2899d4d62d59ebf51d831210d85cf71c8617f989c6e90bd74c44076a606f01f4d1d31148c47f667c2702f242b526d1b0e775feaf021d0678326c8a58c92b651e117fd31c9687ac5e9d39cdfcce38dd7122ebde51632fe55817ee7cb59f9cc2b637a3b932a63571a049f39cda426cfc6abf9aca4c06df9ae80d9c40000000356e28a9cd348f94ea73b4d9e61bcdd5d52f6919c086167d816bb79640f8202a8ddcf573d2c22894ef0c480b9b523f63458a95ceabb014387bd07a98220177c3836fed6ec898bef837510bf5c5fa11171ccf42558ed487639274a8229e484b542199b01225347e33fe52beb590efeebaaf463b1702ab19fa3ac399cc1328c9ae70239df9803d600618aca26e0cbbd1a0cffe8f8c676c5866e6f9e5846259d82e4e6a07e82a036015d170d2bf8f7a819c9a4099791aaefd6a0e551123065eba1d5ce0d280733c16aa6e0f14869fcffe7375a7c43c906b45e26886e47102e499c9a2f4a97275624e6666b9b409b896bded7610d47460be53a3afb75fdc10e5204f5062ef3e1cf5113c72566de4f80f068c10d59c90250f4eb08a3485c3020ef48fdfa0f332528af815fd4ca56f1c362cc1daed51d7c9f8fe3dcbae2186978396a418b437bea66bac938da3177bdd4d1de6b3177438650538b25cc77d0e514c5ea9df00d08f93ad5bb92000900097721f99ed31982405347d380420440894cd057e35ae5533ee5af356d76f03cb0ffb13a87dc4509a17492794d967681974748a36caa08434bec91ba252449624199c36d7876a3fc0a8008daa406405a5435e58d6822f242855d56e92ffe36f0a1a111bdd914a60eca465358ffabb07e2f83d423f819d409913bec430d7850af781db4090e6290ca2fb3c4b593db3fdbc731905bfe148e4e5bc253eb920d7b9521fc50cf20037d8eeed1e1317b4a59f7e85d93a6bab225470adbc96fb0f276e52c0d046d100018cd284b6b9de6e153a2124bbd3ef7711900b0a702d70de15a2bd61daef920fd74e020aac4a477c9a40e5e0a8bc5354dcc1416df59a232510a163291f2133d9481a9016aa2add24d896d1f9b89cad76e3a56ae62ec96d454c2cdf5bd3304a08ca7d01e302926f27510826cc87be97186a331832d5415ee6e55c2e13858ba7050cf61308462cae16fa67305b1d3ef219a72f65f527338cfcff1a95943118071dbe4626d36fd0a95698b08333e3c08b012f44e129056c4d3c9c29139ecade113e112aa8056b24ab2abd0a6c5059098ffbed1136a65c511cd40574a31c43abf2ff7bc2fe93ba904c0f31fbbfb0d9e369d2d3b74b2a04c88226c92b63c63b35b013705ee4dbf29eff81f4987137599ae9c6a9740134d31c2098221ef3b7e2a94aff4b85f0c95d14dc273df1b2a3822a3ff5fe156af71ce9bd9ee97f39f4e634cd28f16de650bca52458aad4a4711eae00d4cc7b6d1b0fc02829ca47b2072679779ac8ba6f62e56c941b66d3c463f17848ff4089236c909620133ecde673ea6e72af8ca3981e6a889e2664f3ae7a712f6ba8d59c89c064ff4daea7fbfea37bb72c23b2cb3499725f37ac4108ae6399b04db672f13581c7c5a8195964c07e478c3d5051c95b2b519946b5a5b59e882900a8b2c245e972210d76f0c0e12309863091fa3aadba3634069280d9aab701751a2e2223a317d4024c8f307f3c15d0cbb774b333bf5cb15f93c33d2eac24a0097bb64d540971a2a02376858ceb1a4c78ea80", 0x800, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) 19:43:03 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:03 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x6, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f00000004c0)="6eeba52fdf9cd7df83af10e214be763369d2f7ddb382912ac1c49e5dfadcf2cb97f68d692a9f1897bd71c0df89597e1a6431d9e8c776cbd757a7a25e433a90047c5c039045196d91ed53b96772d962ffe716dc91d0dd531d89c9509253f00667dc85c77c7effab58ba23d2ddacffee9de94f55af8e15f3d8d4c87fbfe5275eeb80102323fc2b6cd56cb7fb", 0x8b, 0x3}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4548a1dffe18d967cb5628b23f7dbc7d3d8ccb3dc3b6459c5e85f125189f5cdf4652c7e76ee4d845d3bcf3d9c29bf01e3ee01ad571486a3b46d801eb02d6178cea50ef6d2952923b017b73f0ad294095c44f5de61fc9e976b07c3c5c427fd4073f8db39911022b76ec67ceec04dab02e4dca17a77b574ff8bba82a1842be3ce5f7dd3", 0xeb}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:03 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:03 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) [ 665.667785][T24066] input: syz0 as /devices/virtual/input/input2901 19:43:03 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 19:43:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) sendto$inet(r0, &(0x7f0000000300)='\r', 0x1, 0x0, 0x0, 0x0) sendto(r0, &(0x7f00000012c0)="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", 0x800, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) 19:43:03 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 665.965140][T24081] gfs2: invalid mount option: hash [ 665.984724][T24081] gfs2: can't parse mount arguments [ 666.000563][T24091] input: syz0 as /devices/virtual/input/input2902 19:43:03 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) sendto$inet(r0, &(0x7f0000000300)='\r', 0x1, 0x0, 0x0, 0x0) sendto(r0, &(0x7f00000012c0)="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", 0x800, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) 19:43:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 19:43:04 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 19:43:04 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:04 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x6, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f00000004c0)="6eeba52fdf9cd7df83af10e214be763369d2f7ddb382912ac1c49e5dfadcf2cb97f68d692a9f1897bd71c0df89597e1a6431d9e8c776cbd757a7a25e433a90047c5c039045196d91ed53b96772d962ffe716dc91d0dd531d89c9509253f00667dc85c77c7effab58ba23d2ddacffee9de94f55af8e15f3d8d4c87fbfe5275eeb80102323fc2b6cd56cb7fb", 0x8b, 0x3}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4548a1dffe18d967cb5628b23f7dbc7d3d8ccb3dc3b6459c5e85f125189f5cdf4652c7e76ee4d845d3bcf3d9c29bf01e3ee01ad571486a3b46d801eb02d6178cea50ef6d2952923b017b73f0ad294095c44f5de61fc9e976b07c3c5c427fd4073f8db39911022b76ec67ceec04dab02e4dca17a77b574ff8bba82a1842be3ce5f7dd3", 0xeb}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:04 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) sendto$inet(r0, &(0x7f0000000300)='\r', 0x1, 0x0, 0x0, 0x0) sendto(r0, &(0x7f00000012c0)="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", 0x800, 0x0, 0x0, 0x0) 19:43:04 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 666.338569][T24218] input: syz0 as /devices/virtual/input/input2903 19:43:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 19:43:04 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(r3, 0x0, 0x0) [ 666.463886][T24221] gfs2: invalid mount option: hash 19:43:04 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) sendto$inet(r0, &(0x7f0000000300)='\r', 0x1, 0x0, 0x0, 0x0) [ 666.506586][T24221] gfs2: can't parse mount arguments 19:43:04 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 666.612475][T24332] input: syz0 as /devices/virtual/input/input2904 19:43:04 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x6, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f00000004c0)="6eeba52fdf9cd7df83af10e214be763369d2f7ddb382912ac1c49e5dfadcf2cb97f68d692a9f1897bd71c0df89597e1a6431d9e8c776cbd757a7a25e433a90047c5c039045196d91ed53b96772d962ffe716dc91d0dd531d89c9509253f00667dc85c77c7effab58ba23d2ddacffee9de94f55af8e15f3d8d4c87fbfe5275eeb80102323fc2b6cd56cb7fb", 0x8b, 0x3}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4548a1dffe18d967cb5628b23f7dbc7d3d8ccb3dc3b6459c5e85f125189f5cdf4652c7e76ee4d845d3bcf3d9c29bf01e3ee01ad571486a3b46d801eb02d6178cea50ef6d2952923b017b73f0ad294095c44f5de61fc9e976b07c3c5c427fd4073f8db39911022b76ec67ceec04dab02e4dca17a77b574ff8bba82a1842be3ce5f7dd3", 0xeb}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:04 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 19:43:04 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(r3, 0x0, 0x0) 19:43:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) sendto$inet(r0, &(0x7f0000000300)='\r', 0x1, 0x0, 0x0, 0x0) 19:43:04 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 666.926415][T24357] gfs2: invalid mount option: hash [ 666.942822][T24357] gfs2: can't parse mount arguments 19:43:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) [ 666.968438][T24374] input: syz0 as /devices/virtual/input/input2905 19:43:04 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:04 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:05 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(r3, 0x0, 0x0) 19:43:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 19:43:05 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x6, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f00000004c0)="6eeba52fdf9cd7df83af10e214be763369d2f7ddb382912ac1c49e5dfadcf2cb97f68d692a9f1897bd71c0df89597e1a6431d9e8c776cbd757a7a25e433a90047c5c039045196d91ed53b96772d962ffe716dc91d0dd531d89c9509253f00667dc85c77c7effab58ba23d2ddacffee9de94f55af8e15f3d8d4c87fbfe5275eeb80102323fc2b6cd56cb7fb", 0x8b, 0x3}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4548a1dffe18d967cb5628b23f7dbc7d3d8ccb3dc3b6459c5e85f125189f5cdf4652c7e76ee4d845d3bcf3d9c29bf01e3ee01ad571486a3b46d801eb02d6178cea50ef6d2952923b017b73f0ad294095c44f5de61fc9e976b07c3c5c427fd4073f8db39911022b76ec67ceec04dab02e4dca17a77b574ff8bba82a1842be3ce5f7dd30846", 0xed}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:05 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) 19:43:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) 19:43:05 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 667.281347][T24489] input: syz0 as /devices/virtual/input/input2906 19:43:05 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(r3, 0x0, &(0x7f0000000180)) [ 667.350249][T24495] gfs2: invalid mount option: hash [ 667.367286][T24495] gfs2: can't parse mount arguments 19:43:05 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:05 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) 19:43:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) 19:43:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 19:43:05 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:05 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x6, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f00000004c0)="6eeba52fdf9cd7df83af10e214be763369d2f7ddb382912ac1c49e5dfadcf2cb97f68d692a9f1897bd71c0df89597e1a6431d9e8c776cbd757a7a25e433a90047c5c039045196d91ed53b96772d962ffe716dc91d0dd531d89c9509253f00667dc85c77c7effab58ba23d2ddacffee9de94f55af8e15f3d8d4c87fbfe5275eeb80102323fc2b6cd56cb7fb", 0x8b, 0x3}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4548a1dffe18d967cb5628b23f7dbc7d3d8ccb3dc3b6459c5e85f125189f5cdf4652c7e76ee4d845d3bcf3d9c29bf01e3ee01ad571486a3b46d801eb02d6178cea50ef6d2952923b017b73f0ad294095c44f5de61fc9e976b07c3c5c427fd4073f8db39911022b76ec67ceec04dab02e4dca17a77b574ff8bba82a1842be3ce5f7dd30846", 0xed}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040), 0x4) 19:43:05 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(r3, 0x0, &(0x7f0000000180)) 19:43:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 19:43:05 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) [ 667.727810][T24628] gfs2: invalid mount option: hash [ 667.732944][T24628] gfs2: can't parse mount arguments 19:43:05 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000040), 0x4) 19:43:05 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:05 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(r3, 0x0, &(0x7f0000000180)) 19:43:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 19:43:05 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x6, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f00000004c0)="6eeba52fdf9cd7df83af10e214be763369d2f7ddb382912ac1c49e5dfadcf2cb97f68d692a9f1897bd71c0df89597e1a6431d9e8c776cbd757a7a25e433a90047c5c039045196d91ed53b96772d962ffe716dc91d0dd531d89c9509253f00667dc85c77c7effab58ba23d2ddacffee9de94f55af8e15f3d8d4c87fbfe5275eeb80102323fc2b6cd56cb7fb", 0x8b, 0x3}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4548a1dffe18d967cb5628b23f7dbc7d3d8ccb3dc3b6459c5e85f125189f5cdf4652c7e76ee4d845d3bcf3d9c29bf01e3ee01ad571486a3b46d801eb02d6178cea50ef6d2952923b017b73f0ad294095c44f5de61fc9e976b07c3c5c427fd4073f8db39911022b76ec67ceec04dab02e4dca17a77b574ff8bba82a1842be3ce5f7dd30846", 0xed}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:05 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x4}, 0x0, 0x0}}}) 19:43:05 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000040), 0x4) 19:43:06 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, 0x0, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 668.128767][T24768] gfs2: invalid mount option: hash [ 668.148079][T24768] gfs2: can't parse mount arguments 19:43:06 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(r3, 0x1, &(0x7f0000000180)=[0x0]) 19:43:06 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:06 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000040), 0x4) 19:43:06 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:06 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4548a1dffe18d967cb5628b23f7dbc7d3d8ccb3dc3b6459c5e85f125189f5cdf4652c7e76ee4d845d3bcf3d9c29bf01e3ee01ad571486a3b46d801eb02d6178cea50ef6d2952923b017b73f0ad294095c44f5de61fc9e976b07c3c5c427fd4073f8db39911022b76ec67ceec04dab02e4dca17a77b574ff8bba82a1842be3ce5f7dd3084619", 0xee}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, 0x0, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) 19:43:06 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040), 0x4) 19:43:06 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(r3, 0x1, &(0x7f0000000180)=[0x0]) 19:43:06 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 668.565811][T24909] gfs2: invalid mount option: hash 19:43:06 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) [ 668.626011][T24909] gfs2: can't parse mount arguments 19:43:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, 0x0, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) 19:43:06 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(r3, 0x1, &(0x7f0000000180)=[0x0]) 19:43:06 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040), 0x4) 19:43:06 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:06 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4548a1dffe18d967cb5628b23f7dbc7d3d8ccb3dc3b6459c5e85f125189f5cdf4652c7e76ee4d845d3bcf3d9c29bf01e3ee01ad571486a3b46d801eb02d6178cea50ef6d2952923b017b73f0ad294095c44f5de61fc9e976b07c3c5c427fd4073f8db39911022b76ec67ceec04dab02e4dca17a77b574ff8bba82a1842be3ce5f7dd3084619", 0xee}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 19:43:06 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:06 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 19:43:06 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040), 0x4) 19:43:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 19:43:07 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4548a1dffe18d967cb5628b23f7dbc7d3d8ccb3dc3b6459c5e85f125189f5cdf4652c7e76ee4d845d3bcf3d9c29bf01e3ee01ad571486a3b46d801eb02d6178cea50ef6d2952923b017b73f0ad294095c44f5de61fc9e976b07c3c5c427fd4073f8db39911022b76ec67ceec04dab02e4dca17a77b574ff8bba82a1842be3ce5f7dd3084619", 0xee}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:07 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:07 executing program 1: socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000040), 0x4) 19:43:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) [ 669.333718][T25286] gfs2: invalid mount option: hash [ 669.381713][T25286] gfs2: can't parse mount arguments 19:43:07 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 19:43:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:07 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:07 executing program 1: socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000040), 0x4) 19:43:07 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {0x0}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:43:07 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:07 executing program 1: socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000040), 0x4) [ 669.723511][T25418] gfs2: invalid mount option: hash 19:43:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) [ 669.759750][T25418] gfs2: can't parse mount arguments 19:43:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:43:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 19:43:07 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {0x0}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) [ 670.123636][T25542] gfs2: invalid mount option: hash [ 670.144132][T25542] gfs2: can't parse mount arguments 19:43:08 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 19:43:08 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffff2f4b}) 19:43:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:43:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 19:43:08 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {0x0}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:08 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffff2f4b}) 19:43:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040), 0x4) [ 670.627323][T25658] gfs2: invalid mount option: hash [ 670.682896][T25658] gfs2: can't parse mount arguments 19:43:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 19:43:08 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) 19:43:09 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, 0xffffffffffffffff, &(0x7f0000000080), 0xfdef}]) 19:43:09 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffff2f4b}) 19:43:09 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 19:43:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) [ 671.647101][T25798] gfs2: invalid mount option: hash 19:43:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) 19:43:09 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0, 0x0, 0x2, r0}) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000015c0)={r0, 0xffffffffffff2f4b, 0x0, r0}) [ 671.670268][T25798] gfs2: can't parse mount arguments 19:43:09 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) 19:43:09 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, 0xffffffffffffffff, &(0x7f0000000080), 0xfdef}]) 19:43:09 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0, 0x0, 0x2, r0}) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000015c0)={r0, 0xffffffffffff2f4b, 0x0, r0}) 19:43:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffff2f4b}) 19:43:09 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:09 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) 19:43:10 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:10 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0, 0x0, 0x2, r0}) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000015c0)={r0, 0xffffffffffff2f4b, 0x0, r0}) [ 672.098271][T25932] gfs2: invalid mount option: hash [ 672.108036][T25932] gfs2: can't parse mount arguments 19:43:10 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:43:10 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, 0xffffffffffffffff, &(0x7f0000000080), 0xfdef}]) 19:43:10 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) 19:43:10 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f00000015c0)={r1, 0xffffffffffff2f4b, 0x0, r1}) 19:43:10 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:10 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, 0x0}]) [ 672.506796][T26058] gfs2: invalid mount option: hash [ 672.522922][T26058] gfs2: can't parse mount arguments 19:43:10 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f00000015c0)={r1, 0xffffffffffff2f4b, 0x0, r1}) 19:43:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:43:10 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0, 0x0, 0x2, r0}) 19:43:10 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:10 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4548a1dffe18d967cb5628b23f7db", 0x77}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:10 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f00000015c0)={r1, 0xffffffffffff2f4b, 0x0, r1}) 19:43:10 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, 0x0}]) 19:43:10 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 672.870444][T26192] gfs2: invalid mount option: hash 19:43:10 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0, 0x0, 0x2, r0}) [ 672.966925][T26192] gfs2: can't parse mount arguments 19:43:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:10 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:10 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0, 0x0, 0x2, r0}) 19:43:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x2, r2}) 19:43:11 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4}) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, 0x0}]) 19:43:11 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4548a1dffe18d967cb5628b23f7db", 0x77}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:11 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:11 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) 19:43:11 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x2, r2}) [ 673.315819][T26323] gfs2: invalid mount option: hash [ 673.320969][T26323] gfs2: can't parse mount arguments 19:43:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x2, r2}) 19:43:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:11 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 673.451020][T26334] gfs2: invalid mount option: hash [ 673.500515][T26334] gfs2: can't parse mount arguments 19:43:11 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) 19:43:11 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x2, r2}) 19:43:11 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f00000015c0)={r1, 0xffffffffffff2f4b, 0x0, r1}) 19:43:11 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) 19:43:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x2, r2}) 19:43:11 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:11 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:11 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f00000015c0)={r1, 0xffffffffffff2f4b, 0x0, r1}) 19:43:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) 19:43:11 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 19:43:12 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f00000015c0)={r1, 0xffffffffffff2f4b, 0x0, r1}) [ 674.083759][T26472] gfs2: invalid mount option: hash 19:43:12 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) [ 674.154766][T26472] gfs2: can't parse mount arguments 19:43:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 19:43:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x2, r2}) 19:43:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:12 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:12 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) 19:43:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 19:43:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) [ 674.582496][T26725] gfs2: invalid mount option: hash 19:43:12 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 674.621751][T26725] gfs2: can't parse mount arguments 19:43:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) 19:43:12 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) 19:43:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) 19:43:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:12 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:12 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b9", 0x3c}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:12 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) 19:43:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) 19:43:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) 19:43:12 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:13 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) 19:43:13 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:13 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b9", 0x3c}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) 19:43:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:13 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0, 0x0, 0x2}) 19:43:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) [ 675.450688][T27091] gfs2: invalid mount option: hash 19:43:13 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 675.481999][T27091] gfs2: can't parse mount arguments 19:43:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:13 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0, 0x0, 0x2}) 19:43:13 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b9", 0x3c}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) 19:43:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) 19:43:13 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:13 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0, 0x0, 0x2}) [ 675.828093][T27301] gfs2: invalid mount option: hash [ 675.833334][T27301] gfs2: can't parse mount arguments 19:43:13 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0, 0x0, 0x2}) 19:43:13 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:13 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2}) 19:43:14 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe1", 0x5a}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:14 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2}) 19:43:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) 19:43:14 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0, 0x0, 0x2}) 19:43:14 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 676.332324][T27439] gfs2: invalid mount option: hash 19:43:14 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0, 0x0, 0x2}) 19:43:14 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2}) [ 676.384777][T27439] gfs2: can't parse mount arguments 19:43:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:14 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 19:43:14 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2}) 19:43:14 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe1", 0x5a}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) 19:43:14 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:14 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2}) 19:43:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 19:43:14 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) [ 676.852320][T27578] gfs2: invalid mount option: hash [ 676.906804][T27578] gfs2: can't parse mount arguments 19:43:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:14 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2}) 19:43:15 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe1", 0x5a}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:15 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) 19:43:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) 19:43:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 19:43:15 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2}) 19:43:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) [ 677.324953][T27710] gfs2: invalid mount option: hash 19:43:15 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 677.374711][T27710] gfs2: can't parse mount arguments 19:43:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) 19:43:15 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2}) 19:43:15 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4", 0x69}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:15 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2, r2}) 19:43:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) 19:43:15 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2}) [ 677.748979][T27848] gfs2: invalid mount option: hash [ 677.774577][T27848] gfs2: can't parse mount arguments 19:43:15 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000015c0)={r2, 0xffffffffffff2f4b, 0x0, r2}) 19:43:15 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18c", 0x5b}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2, r2}) 19:43:15 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2}) 19:43:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2}) 19:43:15 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 678.111303][T27870] gfs2: invalid mount option: hash 19:43:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 19:43:16 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2}) [ 678.155095][T27870] gfs2: can't parse mount arguments 19:43:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2, r2}) 19:43:16 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:16 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2}) 19:43:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2}) 19:43:16 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:16 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18c", 0x5b}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 19:43:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, r2}) 19:43:16 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2}) 19:43:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2}) [ 678.578961][T28009] gfs2: invalid mount option: hash [ 678.622008][T28009] gfs2: can't parse mount arguments 19:43:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 19:43:16 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 19:43:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2}) 19:43:16 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18c", 0x5b}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, r2}) 19:43:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffff2f4b, 0x0, r2}) 19:43:16 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 679.019044][T28144] gfs2: invalid mount option: hash [ 679.044315][T28144] gfs2: can't parse mount arguments 19:43:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2}) 19:43:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 19:43:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffff2f4b, 0x0, r2}) 19:43:17 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, r2}) 19:43:17 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c", 0x62}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:17 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 19:43:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) [ 679.450258][T28278] gfs2: invalid mount option: hash 19:43:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffff2f4b, 0x0, r2}) 19:43:17 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 679.478153][T28278] gfs2: can't parse mount arguments 19:43:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) 19:43:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) 19:43:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 19:43:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0x0, 0x0, r2}) 19:43:17 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c", 0x62}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:17 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) 19:43:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) 19:43:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) [ 679.910030][T28412] gfs2: invalid mount option: hash 19:43:17 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 679.965285][T28412] gfs2: can't parse mount arguments 19:43:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2}) 19:43:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) 19:43:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) 19:43:18 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000000)="0f0966ba6100b826460000efb80000c0fe0f23d80f21f835400000200f23f8ea00a0000087000f01df0f01cf260fae17660fe1a90000c0fe3e640f09c4c1f817bd00d00000", 0x45}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:43:18 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c", 0x62}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) 19:43:18 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000000)="0f0966ba6100b826460000efb80000c0fe0f23d80f21f835400000200f23f8ea00a0000087000f01df0f01cf260fae17660fe1a90000c0fe3e640f09c4c1f817bd00d00000", 0x45}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:43:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) [ 680.449606][T28646] gfs2: invalid mount option: hash 19:43:18 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000001c0)={0x33, 0x6, 0x0, {0x0, 0x6, 0xa, 0x0, '/dev/cuse\x00'}}, 0x33) 19:43:18 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 680.534585][T28646] gfs2: can't parse mount arguments 19:43:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) 19:43:18 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000001c0)={0x33, 0x6, 0x0, {0x0, 0x6, 0xa, 0x0, '/dev/cuse\x00'}}, 0x33) 19:43:18 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd7", 0x66}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 19:43:18 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 680.779949][T28774] gfs2: invalid mount option: hash [ 680.804583][T28774] gfs2: can't parse mount arguments 19:43:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:43:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) 19:43:18 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 19:43:18 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000001c0)={0x33, 0x6, 0x0, {0x0, 0x6, 0xa, 0x0, '/dev/cuse\x00'}}, 0x33) 19:43:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd7", 0x66}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 19:43:19 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:19 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={0x33, 0x6, 0x0, {0x0, 0x6, 0xa, 0x0, '/dev/cuse\x00'}}, 0x33) 19:43:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x12, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:43:19 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 681.232006][T28909] gfs2: invalid mount option: hash 19:43:19 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={0x33, 0x6, 0x0, {0x0, 0x6, 0xa, 0x0, '/dev/cuse\x00'}}, 0x33) 19:43:19 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) [ 681.324838][T28909] gfs2: can't parse mount arguments 19:43:19 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={0x33, 0x6, 0x0, {0x0, 0x6, 0xa, 0x0, '/dev/cuse\x00'}}, 0x33) 19:43:19 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd7", 0x66}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:19 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:19 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000001c0)={0x33, 0x6, 0x0, {0x0, 0x6, 0xa, 0x0, '/dev/cuse\x00'}}, 0x33) [ 681.622939][T29078] gfs2: invalid mount option: hash 19:43:19 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 681.673502][T29115] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev bpf, type bpf) errno=-22 [ 681.704091][T29078] gfs2: can't parse mount arguments 19:43:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 19:43:19 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000001c0)={0x33, 0x6, 0x0, {0x0, 0x6, 0xa, 0x0, '/dev/cuse\x00'}}, 0x33) 19:43:19 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:19 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:19 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000001c0)={0x33, 0x6, 0x0, {0x0, 0x6, 0xa, 0x0, '/dev/cuse\x00'}}, 0x33) 19:43:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 681.970146][T29264] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev bpf, type bpf) errno=-22 19:43:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x21020017ec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$poke(0x4209, r2, &(0x7f00000000c0), 0x0) 19:43:19 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) [ 682.124830][T29275] gfs2: invalid mount option: hash 19:43:20 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000001c0)={0x33, 0x6, 0x0, {0x0, 0x6, 0xa, 0x0, '/dev/cuse\x00'}}, 0x33) [ 682.181190][T29275] gfs2: can't parse mount arguments 19:43:20 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 682.251207][T29331] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev bpf, type bpf) errno=-22 19:43:20 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000001c0)={0x33, 0x6, 0x0, {0x0, 0x6, 0xa, 0x0, '/dev/cuse\x00'}}, 0x33) 19:43:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:20 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:20 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:20 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={0x33, 0x6, 0x0, {0x0, 0x6, 0xa, 0x0, '/dev/cuse\x00'}}, 0x33) 19:43:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) [ 682.554894][T29509] gfs2: invalid mount option: hash [ 682.609621][T29509] gfs2: can't parse mount arguments 19:43:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x21020017ec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$poke(0x4209, r2, &(0x7f00000000c0), 0x0) 19:43:20 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:20 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={0x33, 0x6, 0x0, {0x0, 0x6, 0xa, 0x0, '/dev/cuse\x00'}}, 0x33) 19:43:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:20 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x5, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000400)="dac4b092c6d88486af522fef5cc412349f47a9ee716358896a4f2fe9d042b5ce0efda63a5cbfa9321b1ea3c93ab2f30926ca175a519d933bc570d4c9f5bb92330a5d6530adb3964e1657afb8a2594100300e38905dfde818d10d957b646e752fa3c8d434ed84a75d0f6347c68b226b7628d55aed175a26f38c71d50dfdd86bb1fed1e7bf8db47004dd0daeffdee4bc81ea01a07529fad4158f019695e9843adf22634a377026531ba57c42", 0xab, 0x7}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) [ 682.917939][T29631] gfs2: invalid mount option: hash 19:43:20 executing program 1: mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:20 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={0x33, 0x6, 0x0, {0x0, 0x6, 0xa, 0x0, '/dev/cuse\x00'}}, 0x33) [ 682.951490][T29631] gfs2: can't parse mount arguments 19:43:20 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:21 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:21 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4", 0x69}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) [ 683.226490][T29854] gfs2: invalid mount option: hash [ 683.240956][T29854] gfs2: can't parse mount arguments 19:43:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x21020017ec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$poke(0x4209, r2, &(0x7f00000000c0), 0x0) 19:43:21 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x0) 19:43:21 executing program 1: mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:21 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:21 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4", 0x69}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:21 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x0) 19:43:21 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:21 executing program 1: mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) [ 683.541004][T29974] gfs2: invalid mount option: hash [ 683.547613][T29974] gfs2: can't parse mount arguments 19:43:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:21 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:21 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x21020017ec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$poke(0x4209, r2, &(0x7f00000000c0), 0x0) 19:43:21 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x0) 19:43:21 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4", 0x69}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:21 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:21 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:22 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000001c0)={0x33, 0x6, 0x0, {0x0, 0x0, 0xa, 0x0, '/dev/cuse\x00'}}, 0x33) [ 684.124689][T30207] gfs2: invalid mount option: hash [ 684.129929][T30207] gfs2: can't parse mount arguments 19:43:22 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:22 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:22 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) 19:43:22 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x21020017ec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$poke(0x4209, r2, &(0x7f00000000c0), 0x0) 19:43:22 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {0x0}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:22 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x21020017ec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x100000000000001}) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$poke(0x4209, r2, &(0x7f00000000c0), 0x0) 19:43:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:22 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:22 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 684.709145][T30452] gfs2: invalid mount option: hash [ 684.748986][T30452] gfs2: can't parse mount arguments 19:43:22 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:22 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:22 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {0x0}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:22 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:22 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) [ 685.101256][T30679] gfs2: invalid mount option: hash [ 685.131416][T30679] gfs2: can't parse mount arguments 19:43:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x21020017ec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$poke(0x4209, r2, &(0x7f00000000c0), 0x0) 19:43:23 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:23 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x21020017ec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x100000000000001}) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$poke(0x4209, r2, &(0x7f00000000c0), 0x0) 19:43:23 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:23 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {0x0}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:23 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 685.471653][T30801] gfs2: invalid mount option: hash 19:43:23 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:23 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 685.494206][T30801] gfs2: can't parse mount arguments 19:43:23 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:23 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:23 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) [ 685.741548][T31023] gfs2: invalid mount option: hash [ 685.805044][T31023] gfs2: can't parse mount arguments 19:43:23 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 19:43:23 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:23 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:24 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:24 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:24 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:24 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 686.142913][T31144] gfs2: invalid mount option: hash 19:43:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x40}}, 0x0) [ 686.200016][T31144] gfs2: can't parse mount arguments 19:43:24 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:24 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:24 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:24 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:24 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:24 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:24 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x29, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:24 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 686.564942][T31275] gfs2: invalid mount option: hash [ 686.606807][T31275] gfs2: can't parse mount arguments 19:43:24 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:24 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:24 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:24 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45", 0x35}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:24 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 686.953315][T31414] gfs2: invalid mount option: hash 19:43:24 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:24 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 687.014591][T31414] gfs2: can't parse mount arguments 19:43:24 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:25 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:25 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45", 0x35}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:25 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:25 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 19:43:25 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 687.403768][T31547] gfs2: invalid mount option: hash 19:43:25 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 687.427213][T31547] gfs2: can't parse mount arguments 19:43:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:25 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:25 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, 0x0) 19:43:25 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:25 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:25 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45", 0x35}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:25 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:25 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:25 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, 0x0) 19:43:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 687.864256][T31681] gfs2: invalid mount option: hash 19:43:25 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 687.921953][T31681] gfs2: can't parse mount arguments 19:43:25 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:25 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x8000, 0x21) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:26 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45", 0x4f}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:26 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:26 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, 0x0) 19:43:26 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x8000, 0x21) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:26 executing program 0: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 688.230596][T31811] gfs2: invalid mount option: hash [ 688.263814][T31811] gfs2: can't parse mount arguments 19:43:26 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:26 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x8000, 0x21) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:26 executing program 0: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:26 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)) 19:43:26 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45", 0x4f}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:26 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 688.610249][T31941] gfs2: invalid mount option: hash 19:43:26 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x8000, 0x21) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 688.633283][T31941] gfs2: can't parse mount arguments 19:43:26 executing program 0: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:26 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)) 19:43:26 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:26 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x8000, 0x21) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:26 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45", 0x4f}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 19:43:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:26 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x29, &(0x7f0000000200)) 19:43:26 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:27 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x8000, 0x21) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 689.068920][T32078] gfs2: invalid mount option: hash [ 689.074075][T32078] gfs2: can't parse mount arguments 19:43:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 19:43:27 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:27 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x8000, 0x21) mount$fuse(0x20000000, 0x0, 0x0, 0x17cd, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:27 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x8000, 0x21) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc", 0x5c}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:27 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 19:43:27 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x8000, 0x21) mount$fuse(0x20000000, 0x0, 0x0, 0x17cd, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 689.432533][T32204] gfs2: invalid mount option: hash 19:43:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 689.534608][T32204] gfs2: can't parse mount arguments 19:43:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) 19:43:27 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:27 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x8000, 0x21) mount$fuse(0x20000000, 0x0, 0x0, 0x17cd, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:27 executing program 5: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc", 0x5c}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:27 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) [ 689.883826][T32343] gfs2: invalid mount option: hash [ 689.889328][T32343] gfs2: can't parse mount arguments 19:43:27 executing program 5: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:27 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x8000, 0x21) mount$fuse(0x20000000, 0x0, 0x0, 0x17cd, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:27 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) 19:43:28 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc", 0x5c}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:28 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x8000, 0x21) mount$fuse(0x20000000, 0x0, 0x0, 0x17cd, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:28 executing program 5: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 690.240055][T32470] gfs2: invalid mount option: hash 19:43:28 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 690.269455][T32470] gfs2: can't parse mount arguments 19:43:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={0x0}}, 0x0) 19:43:28 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x8000, 0x21) mount$fuse(0x20000000, 0x0, 0x0, 0x17cd, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 19:43:28 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c54", 0x63}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:28 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={0x0}}, 0x0) 19:43:28 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x8000, 0x21) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 690.638905][T32599] gfs2: invalid mount option: hash 19:43:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) [ 690.667038][T32599] gfs2: can't parse mount arguments 19:43:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:28 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={0x0}}, 0x0) 19:43:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:28 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:28 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c54", 0x63}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 19:43:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:28 executing program 1: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 691.053127][T32732] gfs2: invalid mount option: hash 19:43:29 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 691.102057][T32732] gfs2: can't parse mount arguments 19:43:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) 19:43:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:29 executing program 1: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:29 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:29 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c54", 0x63}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 19:43:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) 19:43:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:29 executing program 1: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:29 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 691.499120][ T400] gfs2: invalid mount option: hash [ 691.504281][ T400] gfs2: can't parse mount arguments 19:43:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) 19:43:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x80}}, 0x0) 19:43:29 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 19:43:29 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd7", 0x66}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={0x0}}, 0x0) 19:43:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x80}}, 0x0) 19:43:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 19:43:29 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 691.937600][ T534] gfs2: invalid mount option: hash [ 691.942741][ T534] gfs2: can't parse mount arguments 19:43:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={0x0}}, 0x0) 19:43:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x80}}, 0x0) 19:43:29 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r2 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:30 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:30 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd7", 0x66}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 19:43:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={0x0}}, 0x0) 19:43:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:30 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 692.326007][ T666] gfs2: invalid mount option: hash 19:43:30 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r2 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 692.395055][ T666] gfs2: can't parse mount arguments 19:43:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) 19:43:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:30 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) 19:43:30 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd7", 0x66}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:30 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r2 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:30 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) [ 692.810117][ T805] gfs2: invalid mount option: hash 19:43:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 692.864863][ T805] gfs2: can't parse mount arguments 19:43:30 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:30 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={0x0}}, 0x0) 19:43:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x80}}, 0x0) 19:43:31 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:31 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:31 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={0x0}}, 0x0) [ 693.200766][ T939] gfs2: invalid mount option: hash [ 693.254875][ T939] gfs2: can't parse mount arguments 19:43:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x80}}, 0x0) 19:43:31 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:31 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={0x0}}, 0x0) 19:43:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x80}}, 0x0) 19:43:31 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:31 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:31 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) r2 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x0, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 693.651515][ T1091] gfs2: invalid mount option: hash 19:43:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 693.724230][ T1091] gfs2: can't parse mount arguments 19:43:31 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:31 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) r2 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x0, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:31 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000340)="ac6d2cafa09043a399789d497bc44a61b6346c26863f47b2f99182619a62e94519e1620e42f4307894d771b20752b616caea9d58496351b0357743a453fc15a3b1c7f23f0d0ca49a575463e3d13138bea58a9cecd8f818067e5fdad0505a0e8f2356b0743135477b86a21aa369ea9eae516313912070484ba474873d317538a62d1aa07e643c1869768b3e9ff92caca7741c7d7905ea33bf6925a8c6d1854dc81803eb6bbfff7a96be30", 0xaa, 0x9b}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:31 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:31 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) r2 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:32 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:32 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 694.083834][ T1237] gfs2: invalid mount option: hash [ 694.094616][ T1237] gfs2: can't parse mount arguments 19:43:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x0, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x80}}, 0x0) 19:43:32 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:32 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4", 0x69}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:32 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:32 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x80}}, 0x0) 19:43:32 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) [ 694.495358][ T1377] gfs2: invalid mount option: hash [ 694.500673][ T1377] gfs2: can't parse mount arguments 19:43:32 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x80}}, 0x0) 19:43:32 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:32 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4", 0x69}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:32 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x0, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:32 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 694.938584][ T1534] gfs2: invalid mount option: hash 19:43:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) [ 694.993916][ T1534] gfs2: can't parse mount arguments 19:43:33 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:33 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x0, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:33 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:33 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7c4", 0x69}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x0, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 695.338684][ T1766] gfs2: invalid mount option: hash [ 695.347473][ T1766] gfs2: can't parse mount arguments 19:43:33 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:33 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {0x0}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:33 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:33 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 695.677096][ T1893] gfs2: invalid mount option: hash [ 695.683152][ T1893] gfs2: can't parse mount arguments 19:43:33 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:33 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x40}}, 0x0) 19:43:33 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {0x0}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:33 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:33 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 696.001953][ T2021] gfs2: invalid mount option: hash [ 696.057932][ T2021] gfs2: can't parse mount arguments 19:43:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x40}}, 0x0) 19:43:34 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:34 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:34 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:34 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {0x0}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:34 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x40}}, 0x0) 19:43:34 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 696.582633][ T2160] gfs2: invalid mount option: hash [ 696.610146][ T2160] gfs2: can't parse mount arguments 19:43:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:34 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:34 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:34 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:34 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:34 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:34 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 697.013903][ T2306] gfs2: invalid mount option: hash [ 697.032930][ T2306] gfs2: can't parse mount arguments 19:43:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:35 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:35 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:35 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:35 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 19:43:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x40}}, 0x0) 19:43:35 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:35 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:35 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 697.446908][ T2442] gfs2: invalid mount option: hash [ 697.452250][ T2442] gfs2: can't parse mount arguments 19:43:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 19:43:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x40}}, 0x0) 19:43:35 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:35 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:35 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 19:43:35 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x40}}, 0x0) 19:43:35 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:35 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 697.896974][ T2594] gfs2: invalid mount option: hash 19:43:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) [ 697.924574][ T2594] gfs2: can't parse mount arguments 19:43:35 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:35 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:35 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:36 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45", 0x35}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:36 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:36 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:36 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 698.250316][ T2731] gfs2: invalid mount option: hash 19:43:36 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 698.346299][ T2731] gfs2: can't parse mount arguments 19:43:36 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:36 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45", 0x35}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:36 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x10, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:36 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:36 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 698.727637][ T2873] gfs2: invalid mount option: hash [ 698.771585][ T2873] gfs2: can't parse mount arguments 19:43:36 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:36 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x10, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:36 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r0 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:36 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 19:43:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45", 0x35}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:37 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x10, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:37 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:37 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r0 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:37 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 19:43:37 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 699.237654][ T3014] gfs2: invalid mount option: hash [ 699.243805][ T3014] gfs2: can't parse mount arguments 19:43:37 executing program 3: openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r0 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:37 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r0 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:37 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:37 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45", 0x4f}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:37 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:37 executing program 3: openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r0 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:37 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 699.563748][ T3165] gfs2: invalid mount option: hash 19:43:37 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r0 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 699.602686][ T3165] gfs2: can't parse mount arguments 19:43:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:37 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:37 executing program 5: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:37 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r0 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:37 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45", 0x4f}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:37 executing program 3: openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r0 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:37 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 699.978745][ T3341] gfs2: invalid mount option: hash [ 699.983914][ T3341] gfs2: can't parse mount arguments 19:43:37 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r0 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:37 executing program 5: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:38 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:38 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:38 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x0) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:38 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45", 0x4f}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:38 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:38 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:38 executing program 5: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 700.372268][ T3473] gfs2: invalid mount option: hash 19:43:38 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x0) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:38 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 700.452827][ T3473] gfs2: can't parse mount arguments 19:43:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 19:43:38 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:38 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:38 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:38 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc", 0x5c}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 19:43:38 executing program 1: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:38 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:38 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x0) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 700.743490][ T3608] gfs2: invalid mount option: hash 19:43:38 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 700.804716][ T3608] gfs2: can't parse mount arguments 19:43:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 19:43:38 executing program 1: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:38 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:38 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:39 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc", 0x5c}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) 19:43:39 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x0, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:39 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:39 executing program 1: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:39 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 701.259226][ T3856] gfs2: invalid mount option: hash 19:43:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) 19:43:39 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 701.297893][ T3856] gfs2: can't parse mount arguments 19:43:39 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x0, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:39 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 19:43:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) 19:43:39 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc", 0x5c}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:39 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:39 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x0, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:39 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 19:43:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={0x0}}, 0x0) 19:43:39 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:39 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 701.788447][ T4005] gfs2: invalid mount option: hash [ 701.807790][ T4005] gfs2: can't parse mount arguments 19:43:39 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 19:43:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={0x0}}, 0x0) 19:43:39 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:39 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c54", 0x63}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:39 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) 19:43:40 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 702.143297][ T4140] gfs2: invalid mount option: hash [ 702.159895][ T4140] gfs2: can't parse mount arguments 19:43:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={0x0}}, 0x0) 19:43:40 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:40 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) 19:43:40 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c54", 0x63}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:40 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x10, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:40 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:40 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 702.495549][ T4266] gfs2: invalid mount option: hash [ 702.527741][ T4266] gfs2: can't parse mount arguments 19:43:40 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) 19:43:40 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x10, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:40 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:40 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c54", 0x63}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={0x0}}, 0x0) 19:43:40 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:40 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 702.940482][ T4405] gfs2: invalid mount option: hash [ 702.979699][ T4405] gfs2: can't parse mount arguments 19:43:40 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x10, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:40 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={0x0}}, 0x0) 19:43:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x80}}, 0x0) 19:43:41 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:41 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd7", 0x66}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:41 executing program 0: openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r0 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:41 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={0x0}}, 0x0) 19:43:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x80}}, 0x0) 19:43:41 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, 0x0, 0x0) [ 703.335655][ T4535] gfs2: invalid mount option: hash [ 703.340796][ T4535] gfs2: can't parse mount arguments 19:43:41 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:41 executing program 0: openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r0 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x80}}, 0x0) 19:43:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:41 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, 0x0, 0x0) 19:43:41 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="c642997050b5440b30d89e96f28c29603cfd0e33540152f068c6be389daf612cdf768658d9ffafa879df397786451e862b90598bfc88395b3edd9b00f4c07f50eb8c375d7bf6b7ce1d138b7772d0d0dbf4c4cb1bce6c9f5ad57794271762fb12accc2ba5220641dc2e5a8d18d434b6a57b24a867f4e280e8ecb9fea2a6663e2abc6a6d849896efa37190dd836ae9c63c8239ba4d1432d893630d4fbc3a249fa27a3c6c9c8ed7c58da3f1812498d53e443debbeeb9497c68c86e153a4aecdd99b2f541f272b0681e8950fccadd422f101bc94aeabfbbf91dc6bdfffcab671e306705cab9292aac840e24c426413e4e0338b313c9729b07d7055f42fc7", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd7", 0x66}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:41 executing program 0: openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r0 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:41 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 703.842041][ T4677] gfs2: invalid mount option: hash 19:43:41 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, 0x0, 0x0) 19:43:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) [ 703.917797][ T4677] gfs2: can't parse mount arguments 19:43:41 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:41 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x0) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:42 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd7", 0x66}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:42 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:42 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:42 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x0) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 704.259695][ T4812] gfs2: invalid mount option: hash 19:43:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 704.309070][ T4812] gfs2: can't parse mount arguments 19:43:42 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) r2 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:42 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:42 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x0) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x40}}, 0x0) 19:43:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:42 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:42 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:42 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:42 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x0, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:42 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x0) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x40}}, 0x0) [ 704.738280][ T4947] gfs2: invalid mount option: hash 19:43:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) [ 704.768307][ T4947] gfs2: can't parse mount arguments 19:43:42 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75b", 0x67}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:42 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x40}}, 0x0) 19:43:42 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x0, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:42 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x0) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 705.019671][ T5072] gfs2: invalid mount option: hash [ 705.034720][ T5072] gfs2: can't parse mount arguments 19:43:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 19:43:43 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:43 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75b", 0x67}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:43 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) r2 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:43 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:43 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x0, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 705.410165][ T5301] gfs2: invalid mount option: hash [ 705.424632][ T5301] gfs2: can't parse mount arguments 19:43:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:43 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="1300003ef059"], 0x6) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:43:43 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000240)="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", 0xfc, 0x7f}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75b", 0x67}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 19:43:43 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:43 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x40}}, 0x0) [ 705.818382][ T5538] gfs2: invalid mount option: hash [ 705.834984][ T5538] gfs2: can't parse mount arguments 19:43:43 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:43 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x40}}, 0x0) 19:43:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:43:44 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:44 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x40}}, 0x0) [ 706.285280][ T5668] gfs2: invalid mount option: hash 19:43:44 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 706.371582][ T5668] gfs2: can't parse mount arguments 19:43:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:44 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:44 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:44 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:44 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:44 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 706.736033][ T5809] gfs2: invalid mount option: hash 19:43:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 706.789591][ T5809] gfs2: can't parse mount arguments 19:43:44 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000013000)) close(0xffffffffffffffff) 19:43:44 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:44 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x68}}, 0x0) 19:43:45 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000013000)) close(0xffffffffffffffff) 19:43:45 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:45 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, 0x0, 0x0) 19:43:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 707.263968][ T5955] gfs2: invalid mount option: hash 19:43:45 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:45 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, 0x0, 0x0) 19:43:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:43:45 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000013000)) close(0xffffffffffffffff) [ 707.295111][ T5955] gfs2: can't parse mount arguments 19:43:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:45 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, 0x0, 0x0) 19:43:45 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:45 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000013000)) 19:43:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {0x0}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:45 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:45 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x800004, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000ee3fe0)={{&(0x7f0000013000/0x2000)=nil, 0x2000}, 0x1}) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000013000)) close(r0) 19:43:45 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000013000)) [ 707.762572][ T6092] gfs2: invalid mount option: hash 19:43:45 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:45 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 707.832823][ T6092] gfs2: can't parse mount arguments 19:43:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:45 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0xc, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:45 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000013000)) 19:43:45 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000080)=0x8) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() setresgid(r3, r2, r3) keyctl$session_to_parent(0x12) 19:43:45 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:46 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {0x0}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:46 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x8000000, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) 19:43:46 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:46 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000013000)) 19:43:46 executing program 0 (fault-call:4 fault-nth:0): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:46 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 708.219041][ T6234] FAULT_INJECTION: forcing a failure. [ 708.219041][ T6234] name failslab, interval 1, probability 0, space 0, times 0 [ 708.251267][ T6239] gfs2: invalid mount option: hash [ 708.266604][ T6241] FAULT_INJECTION: forcing a failure. [ 708.266604][ T6241] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 708.280835][ T6234] CPU: 1 PID: 6234 Comm: syz-executor.1 Not tainted 5.1.0-rc3+ #48 [ 708.288745][ T6234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.298895][ T6234] Call Trace: [ 708.302218][ T6234] dump_stack+0x172/0x1f0 [ 708.306568][ T6234] should_fail.cold+0xa/0x15 [ 708.311172][ T6234] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 708.317008][ T6234] ? ___might_sleep+0x163/0x280 [ 708.321872][ T6234] __should_failslab+0x121/0x190 [ 708.326812][ T6234] should_failslab+0x9/0x14 [ 708.331494][ T6234] kmem_cache_alloc_node+0x264/0x710 [ 708.336790][ T6234] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 708.342698][ T6234] __alloc_skb+0xd5/0x5e0 [ 708.347042][ T6234] ? skb_trim+0x190/0x190 [ 708.351382][ T6234] ? copy_msghdr_from_user+0x2d0/0x430 [ 708.356846][ T6234] pfkey_sendmsg+0x146/0xbe0 [ 708.361440][ T6234] ? tomoyo_socket_sendmsg+0x26/0x30 [ 708.366739][ T6234] ? pfkey_send_new_mapping+0x1220/0x1220 [ 708.372651][ T6234] sock_sendmsg+0xdd/0x130 [ 708.377076][ T6234] ___sys_sendmsg+0x806/0x930 [ 708.381762][ T6234] ? copy_msghdr_from_user+0x430/0x430 [ 708.387246][ T6234] ? kasan_check_read+0x11/0x20 [ 708.392102][ T6234] ? __fget+0x381/0x550 [ 708.396271][ T6234] ? ksys_dup3+0x3e0/0x3e0 [ 708.400683][ T6234] ? lock_downgrade+0x880/0x880 [ 708.405546][ T6234] ? __fget_light+0x1a9/0x230 [ 708.410229][ T6234] ? __fdget+0x1b/0x20 [ 708.414302][ T6234] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 708.420550][ T6234] __sys_sendmsg+0x105/0x1d0 [ 708.425152][ T6234] ? __ia32_sys_shutdown+0x80/0x80 [ 708.430285][ T6234] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 708.435748][ T6234] ? do_syscall_64+0x26/0x610 [ 708.440425][ T6234] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.446485][ T6234] ? do_syscall_64+0x26/0x610 [ 708.451203][ T6234] __x64_sys_sendmsg+0x78/0xb0 [ 708.455975][ T6234] do_syscall_64+0x103/0x610 [ 708.460568][ T6234] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.466460][ T6234] RIP: 0033:0x4582b9 [ 708.470354][ T6234] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 708.489957][ T6234] RSP: 002b:00007f1265303c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 708.498370][ T6234] RAX: ffffffffffffffda RBX: 00007f1265303c90 RCX: 00000000004582b9 [ 708.506338][ T6234] RDX: 0000000000000000 RSI: 0000000020cd0fc8 RDI: 0000000000000003 [ 708.514302][ T6234] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 708.522291][ T6234] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12653046d4 [ 708.530257][ T6234] R13: 00000000004c58c6 R14: 00000000004d9b90 R15: 0000000000000004 [ 708.538255][ T6241] CPU: 0 PID: 6241 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #48 [ 708.544402][ T6239] gfs2: can't parse mount arguments [ 708.546150][ T6241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.561397][ T6241] Call Trace: [ 708.564695][ T6241] dump_stack+0x172/0x1f0 [ 708.569036][ T6241] should_fail.cold+0xa/0x15 [ 708.573634][ T6241] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 708.579528][ T6241] ? ___might_sleep+0x163/0x280 [ 708.584385][ T6241] should_fail_alloc_page+0x50/0x60 [ 708.589598][ T6241] __alloc_pages_nodemask+0x1a1/0x7e0 [ 708.595160][ T6241] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 708.600908][ T6241] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 708.607152][ T6241] alloc_pages_current+0x107/0x210 [ 708.612273][ T6241] pte_alloc_one+0x1b/0x1a0 [ 708.616780][ T6241] __handle_mm_fault+0x3491/0x3ec0 [ 708.621892][ T6241] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 708.627439][ T6241] ? find_held_lock+0x35/0x130 [ 708.632212][ T6241] ? handle_mm_fault+0x322/0xb30 [ 708.637157][ T6241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.643406][ T6241] ? kasan_check_read+0x11/0x20 [ 708.648256][ T6241] handle_mm_fault+0x43f/0xb30 [ 708.653025][ T6241] __do_page_fault+0x5ef/0xda0 [ 708.657883][ T6241] do_page_fault+0x71/0x581 [ 708.662397][ T6241] page_fault+0x1e/0x30 [ 708.668636][ T6241] RIP: 0010:__get_user_4+0x21/0x30 [ 708.673742][ T6241] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 55 65 48 8b 14 25 00 ee 01 00 48 3b 82 18 14 00 00 73 43 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 25 65 [ 708.693351][ T6241] RSP: 0018:ffff888065aa7c00 EFLAGS: 00010206 [ 708.699416][ T6241] RAX: 0000000020a154cf RBX: dffffc0000000000 RCX: ffffc90005e67000 [ 708.707386][ T6241] RDX: ffffffffffffffff RSI: ffffffff819ac6b3 RDI: 0000000000000282 [ 708.715859][ T6241] RBP: ffff888065aa7e08 R08: ffff88806570a480 R09: 0000000000000001 [ 708.723828][ T6241] R10: ffff88806570ad00 R11: ffff88806570a480 R12: ffff888094ae19c0 [ 708.731797][ T6241] R13: 0000000000000001 R14: ffff888065aa7eb0 R15: 000000000000002f [ 708.739799][ T6241] ? __might_fault+0x1a3/0x1e0 [ 708.744570][ T6241] ? sock_getsockopt+0xf2/0x2162 [ 708.749518][ T6241] ? sk_get_meminfo+0x4d0/0x4d0 [ 708.754387][ T6241] ? sock_has_perm+0x209/0x2a0 [ 708.759157][ T6241] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 708.765511][ T6241] ? kasan_check_write+0x14/0x20 [ 708.770485][ T6241] ? selinux_socket_getsockopt+0x36/0x40 [ 708.776120][ T6241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.782369][ T6241] ? security_socket_getsockopt+0x93/0xc0 [ 708.788102][ T6241] __sys_getsockopt+0x21c/0x250 [ 708.792958][ T6241] ? kernel_setsockopt+0x1e0/0x1e0 [ 708.798077][ T6241] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 708.803536][ T6241] ? do_syscall_64+0x26/0x610 [ 708.808224][ T6241] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.814287][ T6241] ? do_syscall_64+0x26/0x610 [ 708.818970][ T6241] __x64_sys_getsockopt+0xbe/0x150 [ 708.824082][ T6241] do_syscall_64+0x103/0x610 [ 708.828675][ T6241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.834738][ T6241] RIP: 0033:0x4582b9 [ 708.838628][ T6241] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 708.859626][ T6241] RSP: 002b:00007fde3fc01c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 19:43:46 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {0x0}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:46 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000013000)) 19:43:46 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 708.868047][ T6241] RAX: ffffffffffffffda RBX: 00007fde3fc01c90 RCX: 00000000004582b9 [ 708.876277][ T6241] RDX: 000000000000002f RSI: 0000000000000001 RDI: 0000000000000004 [ 708.884333][ T6241] RBP: 000000000073bf00 R08: 0000000020a154cc R09: 0000000000000000 [ 708.892392][ T6241] R10: 0000000020000000 R11: 0000000000000246 R12: 00007fde3fc026d4 [ 708.900475][ T6241] R13: 00000000004bede8 R14: 00000000004d0080 R15: 0000000000000005 19:43:46 executing program 0 (fault-call:4 fault-nth:1): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 708.941693][ T6347] FAULT_INJECTION: forcing a failure. [ 708.941693][ T6347] name failslab, interval 1, probability 0, space 0, times 0 19:43:46 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:46 executing program 1 (fault-call:1 fault-nth:1): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 709.054458][ T6347] CPU: 0 PID: 6347 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #48 [ 709.062501][ T6347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.072588][ T6347] Call Trace: [ 709.075900][ T6347] dump_stack+0x172/0x1f0 [ 709.075926][ T6347] should_fail.cold+0xa/0x15 [ 709.075945][ T6347] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 709.075971][ T6347] ? ___might_sleep+0x163/0x280 [ 709.075992][ T6347] __should_failslab+0x121/0x190 [ 709.076009][ T6347] should_failslab+0x9/0x14 [ 709.076028][ T6347] kmem_cache_alloc_node+0x264/0x710 [ 709.076057][ T6347] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 709.116381][ T6347] __alloc_skb+0xd5/0x5e0 [ 709.120726][ T6347] ? skb_trim+0x190/0x190 [ 709.125076][ T6347] ? copy_msghdr_from_user+0x2d0/0x430 [ 709.130545][ T6347] pfkey_sendmsg+0x146/0xbe0 [ 709.135144][ T6347] ? tomoyo_socket_sendmsg+0x26/0x30 [ 709.140448][ T6347] ? pfkey_send_new_mapping+0x1220/0x1220 [ 709.146172][ T6347] sock_sendmsg+0xdd/0x130 [ 709.150689][ T6347] ___sys_sendmsg+0x806/0x930 [ 709.155373][ T6347] ? copy_msghdr_from_user+0x430/0x430 [ 709.160839][ T6347] ? kasan_check_read+0x11/0x20 [ 709.165694][ T6347] ? __fget+0x381/0x550 [ 709.169856][ T6347] ? ksys_dup3+0x3e0/0x3e0 [ 709.174357][ T6347] ? lock_downgrade+0x880/0x880 [ 709.179228][ T6347] ? __fget_light+0x1a9/0x230 [ 709.183903][ T6347] ? __fdget+0x1b/0x20 [ 709.187970][ T6347] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 709.194226][ T6347] __sys_sendmsg+0x105/0x1d0 [ 709.198826][ T6347] ? __ia32_sys_shutdown+0x80/0x80 [ 709.204044][ T6347] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 709.209509][ T6347] ? do_syscall_64+0x26/0x610 [ 709.214184][ T6347] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.220263][ T6347] ? do_syscall_64+0x26/0x610 [ 709.224947][ T6347] __x64_sys_sendmsg+0x78/0xb0 [ 709.229719][ T6347] do_syscall_64+0x103/0x610 [ 709.234317][ T6347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.240221][ T6347] RIP: 0033:0x4582b9 [ 709.244111][ T6347] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 709.263719][ T6347] RSP: 002b:00007f4ef8b53c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 709.272134][ T6347] RAX: ffffffffffffffda RBX: 00007f4ef8b53c90 RCX: 00000000004582b9 [ 709.280104][ T6347] RDX: 0000000000000000 RSI: 0000000020cd0fc8 RDI: 0000000000000003 [ 709.288094][ T6347] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 709.296062][ T6347] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ef8b546d4 19:43:46 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000013000)) [ 709.304466][ T6347] R13: 00000000004c58c6 R14: 00000000004d9b90 R15: 0000000000000004 [ 709.342496][ T6410] FAULT_INJECTION: forcing a failure. [ 709.342496][ T6410] name failslab, interval 1, probability 0, space 0, times 0 [ 709.360102][ T6430] FAULT_INJECTION: forcing a failure. [ 709.360102][ T6430] name failslab, interval 1, probability 0, space 0, times 0 [ 709.373962][ T6410] CPU: 0 PID: 6410 Comm: syz-executor.1 Not tainted 5.1.0-rc3+ #48 [ 709.381926][ T6410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.391984][ T6410] Call Trace: [ 709.395297][ T6410] dump_stack+0x172/0x1f0 [ 709.399653][ T6410] should_fail.cold+0xa/0x15 [ 709.404257][ T6410] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 709.410076][ T6410] ? ___might_sleep+0x163/0x280 [ 709.415114][ T6410] __should_failslab+0x121/0x190 [ 709.420150][ T6410] should_failslab+0x9/0x14 [ 709.424669][ T6410] kmem_cache_alloc_node_trace+0x270/0x720 [ 709.430666][ T6410] __kmalloc_node_track_caller+0x3d/0x70 [ 709.436302][ T6410] __kmalloc_reserve.isra.0+0x40/0xf0 [ 709.441679][ T6410] __alloc_skb+0x10b/0x5e0 [ 709.446102][ T6410] ? skb_trim+0x190/0x190 [ 709.450448][ T6410] ? copy_msghdr_from_user+0x2d0/0x430 [ 709.455914][ T6410] pfkey_sendmsg+0x146/0xbe0 [ 709.460518][ T6410] ? tomoyo_socket_sendmsg+0x26/0x30 [ 709.465812][ T6410] ? pfkey_send_new_mapping+0x1220/0x1220 [ 709.471551][ T6410] sock_sendmsg+0xdd/0x130 [ 709.475976][ T6410] ___sys_sendmsg+0x806/0x930 [ 709.480667][ T6410] ? copy_msghdr_from_user+0x430/0x430 [ 709.486139][ T6410] ? kasan_check_read+0x11/0x20 [ 709.491772][ T6410] ? __fget+0x381/0x550 [ 709.495942][ T6410] ? ksys_dup3+0x3e0/0x3e0 [ 709.500362][ T6410] ? lock_downgrade+0x880/0x880 [ 709.505239][ T6410] ? __fget_light+0x1a9/0x230 [ 709.510179][ T6410] ? __fdget+0x1b/0x20 [ 709.514266][ T6410] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 709.520518][ T6410] __sys_sendmsg+0x105/0x1d0 [ 709.525115][ T6410] ? __ia32_sys_shutdown+0x80/0x80 [ 709.530333][ T6410] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 709.535792][ T6410] ? do_syscall_64+0x26/0x610 [ 709.540470][ T6410] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.546536][ T6410] ? do_syscall_64+0x26/0x610 [ 709.551234][ T6410] __x64_sys_sendmsg+0x78/0xb0 [ 709.556010][ T6410] do_syscall_64+0x103/0x610 [ 709.560612][ T6410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.566509][ T6410] RIP: 0033:0x4582b9 [ 709.570411][ T6410] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 709.590024][ T6410] RSP: 002b:00007f1265303c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 709.598443][ T6410] RAX: ffffffffffffffda RBX: 00007f1265303c90 RCX: 00000000004582b9 19:43:47 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 709.606439][ T6410] RDX: 0000000000000000 RSI: 0000000020cd0fc8 RDI: 0000000000000003 [ 709.614412][ T6410] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 709.622472][ T6410] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12653046d4 [ 709.630448][ T6410] R13: 00000000004c58c6 R14: 00000000004d9b90 R15: 0000000000000004 [ 709.638442][ T6430] CPU: 1 PID: 6430 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #48 [ 709.646360][ T6430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.656416][ T6430] Call Trace: 19:43:47 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 709.659735][ T6430] dump_stack+0x172/0x1f0 [ 709.664109][ T6430] should_fail.cold+0xa/0x15 [ 709.668720][ T6430] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 709.674544][ T6430] ? ___might_sleep+0x163/0x280 [ 709.679409][ T6430] __should_failslab+0x121/0x190 [ 709.684356][ T6430] should_failslab+0x9/0x14 [ 709.688874][ T6430] kmem_cache_alloc+0x2b2/0x6f0 [ 709.688893][ T6430] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 709.688917][ T6430] ptlock_alloc+0x20/0x70 [ 709.688934][ T6430] pte_alloc_one+0x6d/0x1a0 [ 709.688955][ T6430] __handle_mm_fault+0x3491/0x3ec0 [ 709.700301][ T6430] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 709.700315][ T6430] ? find_held_lock+0x35/0x130 [ 709.700330][ T6430] ? handle_mm_fault+0x322/0xb30 [ 709.700354][ T6430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.700373][ T6430] ? kasan_check_read+0x11/0x20 [ 709.700397][ T6430] handle_mm_fault+0x43f/0xb30 [ 709.745903][ T6430] __do_page_fault+0x5ef/0xda0 [ 709.750668][ T6430] do_page_fault+0x71/0x581 [ 709.755158][ T6430] page_fault+0x1e/0x30 [ 709.759308][ T6430] RIP: 0010:__get_user_4+0x21/0x30 [ 709.764403][ T6430] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 55 65 48 8b 14 25 00 ee 01 00 48 3b 82 18 14 00 00 73 43 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 25 65 [ 709.784019][ T6430] RSP: 0018:ffff888064bffc00 EFLAGS: 00010206 [ 709.790078][ T6430] RAX: 0000000020a154cf RBX: dffffc0000000000 RCX: ffffc90005e67000 [ 709.798033][ T6430] RDX: ffffffffffffffff RSI: ffffffff819ac6b3 RDI: 0000000000000282 [ 709.805986][ T6430] RBP: ffff888064bffe08 R08: ffff88806350a280 R09: 0000000000000001 [ 709.814029][ T6430] R10: ffff88806350ab00 R11: ffff88806350a280 R12: ffff8880705f3a00 [ 709.821999][ T6430] R13: 0000000000000001 R14: ffff888064bffeb0 R15: 000000000000002f [ 709.829991][ T6430] ? __might_fault+0x1a3/0x1e0 [ 709.834766][ T6430] ? sock_getsockopt+0xf2/0x2162 [ 709.839702][ T6430] ? sk_get_meminfo+0x4d0/0x4d0 [ 709.844559][ T6430] ? sock_has_perm+0x209/0x2a0 [ 709.849327][ T6430] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 709.855396][ T6430] ? kasan_check_write+0x14/0x20 [ 709.860452][ T6430] ? selinux_socket_getsockopt+0x36/0x40 [ 709.866209][ T6430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.872730][ T6430] ? security_socket_getsockopt+0x93/0xc0 [ 709.878463][ T6430] __sys_getsockopt+0x21c/0x250 [ 709.883720][ T6430] ? kernel_setsockopt+0x1e0/0x1e0 [ 709.888861][ T6430] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 709.894325][ T6430] ? do_syscall_64+0x26/0x610 [ 709.899018][ T6430] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.905076][ T6430] ? do_syscall_64+0x26/0x610 [ 709.909769][ T6430] __x64_sys_getsockopt+0xbe/0x150 [ 709.914885][ T6430] do_syscall_64+0x103/0x610 [ 709.919481][ T6430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.925361][ T6430] RIP: 0033:0x4582b9 [ 709.929257][ T6430] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 709.948846][ T6430] RSP: 002b:00007fde3fc01c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 19:43:47 executing program 0 (fault-call:4 fault-nth:2): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 709.957241][ T6430] RAX: ffffffffffffffda RBX: 00007fde3fc01c90 RCX: 00000000004582b9 [ 709.965200][ T6430] RDX: 000000000000002f RSI: 0000000000000001 RDI: 0000000000000004 [ 709.973153][ T6430] RBP: 000000000073bf00 R08: 0000000020a154cc R09: 0000000000000000 [ 709.981119][ T6430] R10: 0000000020000000 R11: 0000000000000246 R12: 00007fde3fc026d4 [ 709.989071][ T6430] R13: 00000000004bede8 R14: 00000000004d0080 R15: 0000000000000005 19:43:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:48 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000013000)) 19:43:48 executing program 3 (fault-call:1 fault-nth:1): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:48 executing program 1 (fault-call:1 fault-nth:2): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 710.140762][ T6477] gfs2: invalid mount option: hash [ 710.152759][ T6477] gfs2: can't parse mount arguments [ 710.185010][ T6484] FAULT_INJECTION: forcing a failure. [ 710.185010][ T6484] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 710.226632][ T6484] CPU: 0 PID: 6484 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #48 [ 710.230662][ T6486] FAULT_INJECTION: forcing a failure. [ 710.230662][ T6486] name failslab, interval 1, probability 0, space 0, times 0 [ 710.234559][ T6484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.234567][ T6484] Call Trace: [ 710.234596][ T6484] dump_stack+0x172/0x1f0 [ 710.234618][ T6484] should_fail.cold+0xa/0x15 [ 710.234641][ T6484] ? fault_create_debugfs_attr+0x1e0/0x1e0 19:43:48 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 710.234661][ T6484] ? ___might_sleep+0x163/0x280 [ 710.234697][ T6484] should_fail_alloc_page+0x50/0x60 [ 710.234719][ T6484] __alloc_pages_nodemask+0x1a1/0x7e0 [ 710.234742][ T6484] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 710.234767][ T6484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.303202][ T6484] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 710.309456][ T6484] alloc_pages_current+0x107/0x210 [ 710.314587][ T6484] __page_cache_alloc+0x2bd/0x460 [ 710.319621][ T6484] ? ondemand_readahead+0x36d/0xd40 [ 710.324828][ T6484] __do_page_cache_readahead+0x1c9/0x5c0 [ 710.330475][ T6484] ? read_pages+0x550/0x550 [ 710.334983][ T6484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.341242][ T6484] ? kasan_check_read+0x11/0x20 [ 710.346104][ T6484] ondemand_readahead+0x561/0xd40 [ 710.348144][ T6531] FAULT_INJECTION: forcing a failure. [ 710.348144][ T6531] name failslab, interval 1, probability 0, space 0, times 0 [ 710.351142][ T6484] page_cache_sync_readahead+0x281/0x520 [ 710.351165][ T6484] filemap_fault+0x11af/0x2720 [ 710.351184][ T6484] ? lock_downgrade+0x880/0x880 [ 710.351223][ T6484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.385500][ T6484] ? grab_cache_page_write_begin+0xb0/0xb0 [ 710.391334][ T6484] ? rcu_read_lock_sched_held+0x110/0x130 [ 710.397059][ T6484] ? unaccount_page_cache_page+0xc80/0xc80 [ 710.402866][ T6484] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 710.409114][ T6484] ? pmd_val+0x85/0x100 [ 710.413277][ T6484] __do_fault+0x116/0x4e0 [ 710.417618][ T6484] __handle_mm_fault+0x2c6c/0x3ec0 [ 710.422746][ T6484] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 710.428292][ T6484] ? find_held_lock+0x35/0x130 [ 710.433065][ T6484] ? handle_mm_fault+0x322/0xb30 [ 710.438017][ T6484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.444259][ T6484] ? kasan_check_read+0x11/0x20 [ 710.449122][ T6484] handle_mm_fault+0x43f/0xb30 [ 710.453894][ T6484] __do_page_fault+0x5ef/0xda0 [ 710.458678][ T6484] do_page_fault+0x71/0x581 [ 710.463232][ T6484] page_fault+0x1e/0x30 [ 710.467389][ T6484] RIP: 0010:__get_user_4+0x21/0x30 [ 710.472503][ T6484] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 55 65 48 8b 14 25 00 ee 01 00 48 3b 82 18 14 00 00 73 43 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 25 65 [ 710.492113][ T6484] RSP: 0018:ffff88805f5cfc00 EFLAGS: 00010206 [ 710.498207][ T6484] RAX: 0000000020a154cf RBX: dffffc0000000000 RCX: ffffc90005e67000 [ 710.506196][ T6484] RDX: ffffffffffffffff RSI: ffffffff819ac6b3 RDI: 0000000000000282 [ 710.514177][ T6484] RBP: ffff88805f5cfe08 R08: ffff8880667f0580 R09: 0000000000000001 [ 710.522254][ T6484] R10: ffff8880667f0e00 R11: ffff8880667f0580 R12: ffff8880948201c0 [ 710.530236][ T6484] R13: 0000000000000001 R14: ffff88805f5cfeb0 R15: 000000000000002f [ 710.538239][ T6484] ? __might_fault+0x1a3/0x1e0 [ 710.543010][ T6484] ? sock_getsockopt+0xf2/0x2162 [ 710.547956][ T6484] ? sk_get_meminfo+0x4d0/0x4d0 [ 710.552815][ T6484] ? sock_has_perm+0x209/0x2a0 [ 710.557592][ T6484] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 710.563682][ T6484] ? kasan_check_write+0x14/0x20 [ 710.568635][ T6484] ? selinux_socket_getsockopt+0x36/0x40 [ 710.574271][ T6484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.580602][ T6484] ? security_socket_getsockopt+0x93/0xc0 [ 710.586325][ T6484] __sys_getsockopt+0x21c/0x250 [ 710.591182][ T6484] ? kernel_setsockopt+0x1e0/0x1e0 [ 710.596327][ T6484] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 710.601783][ T6484] ? do_syscall_64+0x26/0x610 [ 710.606469][ T6484] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 710.612625][ T6484] ? do_syscall_64+0x26/0x610 [ 710.617313][ T6484] __x64_sys_getsockopt+0xbe/0x150 [ 710.622430][ T6484] do_syscall_64+0x103/0x610 [ 710.627025][ T6484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 710.632915][ T6484] RIP: 0033:0x4582b9 [ 710.636811][ T6484] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 710.656414][ T6484] RSP: 002b:00007fde3fc01c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 710.664827][ T6484] RAX: ffffffffffffffda RBX: 00007fde3fc01c90 RCX: 00000000004582b9 [ 710.672796][ T6484] RDX: 000000000000002f RSI: 0000000000000001 RDI: 0000000000000004 [ 710.680766][ T6484] RBP: 000000000073bf00 R08: 0000000020a154cc R09: 0000000000000000 [ 710.688739][ T6484] R10: 0000000020000000 R11: 0000000000000246 R12: 00007fde3fc026d4 [ 710.696706][ T6484] R13: 00000000004bede8 R14: 00000000004d0080 R15: 0000000000000005 [ 710.706367][ T6486] CPU: 0 PID: 6486 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #48 [ 710.714268][ T6486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.724331][ T6486] Call Trace: [ 710.727631][ T6486] dump_stack+0x172/0x1f0 [ 710.731969][ T6486] should_fail.cold+0xa/0x15 [ 710.736748][ T6486] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 710.742743][ T6486] ? ___might_sleep+0x163/0x280 [ 710.747600][ T6486] __should_failslab+0x121/0x190 [ 710.752540][ T6486] should_failslab+0x9/0x14 [ 710.757083][ T6486] kmem_cache_alloc_node_trace+0x270/0x720 [ 710.762900][ T6486] __kmalloc_node_track_caller+0x3d/0x70 [ 710.768633][ T6486] __kmalloc_reserve.isra.0+0x40/0xf0 [ 710.774012][ T6486] __alloc_skb+0x10b/0x5e0 [ 710.778434][ T6486] ? skb_trim+0x190/0x190 [ 710.782769][ T6486] ? copy_msghdr_from_user+0x2d0/0x430 [ 710.788315][ T6486] pfkey_sendmsg+0x146/0xbe0 [ 710.793105][ T6486] ? tomoyo_socket_sendmsg+0x26/0x30 [ 710.798584][ T6486] ? pfkey_send_new_mapping+0x1220/0x1220 [ 710.804311][ T6486] sock_sendmsg+0xdd/0x130 [ 710.808740][ T6486] ___sys_sendmsg+0x806/0x930 [ 710.813430][ T6486] ? copy_msghdr_from_user+0x430/0x430 [ 710.818904][ T6486] ? kasan_check_read+0x11/0x20 [ 710.823764][ T6486] ? __fget+0x381/0x550 [ 710.827930][ T6486] ? ksys_dup3+0x3e0/0x3e0 [ 710.832347][ T6486] ? lock_downgrade+0x880/0x880 [ 710.837226][ T6486] ? __fget_light+0x1a9/0x230 [ 710.841910][ T6486] ? __fdget+0x1b/0x20 [ 710.846963][ T6486] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 710.853235][ T6486] __sys_sendmsg+0x105/0x1d0 [ 710.857832][ T6486] ? __ia32_sys_shutdown+0x80/0x80 [ 710.862958][ T6486] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 710.868414][ T6486] ? do_syscall_64+0x26/0x610 [ 710.873248][ T6486] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 710.879317][ T6486] ? do_syscall_64+0x26/0x610 [ 710.884093][ T6486] __x64_sys_sendmsg+0x78/0xb0 [ 710.888861][ T6486] do_syscall_64+0x103/0x610 [ 710.893458][ T6486] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 710.899354][ T6486] RIP: 0033:0x4582b9 [ 710.903247][ T6486] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:43:48 executing program 0 (fault-call:4 fault-nth:3): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 710.922870][ T6486] RSP: 002b:00007f4ef8b53c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 710.931283][ T6486] RAX: ffffffffffffffda RBX: 00007f4ef8b53c90 RCX: 00000000004582b9 [ 710.939248][ T6486] RDX: 0000000000000000 RSI: 0000000020cd0fc8 RDI: 0000000000000003 [ 710.947225][ T6486] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 710.955207][ T6486] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ef8b546d4 [ 710.963176][ T6486] R13: 00000000004c58c6 R14: 00000000004d9b90 R15: 0000000000000004 [ 710.978227][ T6531] CPU: 0 PID: 6531 Comm: syz-executor.1 Not tainted 5.1.0-rc3+ #48 [ 710.986234][ T6531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.996307][ T6531] Call Trace: [ 710.999582][ T6531] dump_stack+0x172/0x1f0 [ 711.003927][ T6531] should_fail.cold+0xa/0x15 [ 711.008514][ T6531] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 711.014332][ T6531] ? ___might_sleep+0x163/0x280 [ 711.019202][ T6531] __should_failslab+0x121/0x190 [ 711.024159][ T6531] should_failslab+0x9/0x14 [ 711.028683][ T6531] kmem_cache_alloc+0x2b2/0x6f0 [ 711.033547][ T6531] skb_clone+0x150/0x3b0 [ 711.037807][ T6531] pfkey_process+0xcf/0x810 [ 711.042325][ T6531] ? __mutex_lock+0x3cd/0x1310 [ 711.047101][ T6531] ? pfkey_send_migrate+0x15c0/0x15c0 [ 711.052480][ T6531] ? pfkey_sendmsg+0x3fd/0xbe0 [ 711.057247][ T6531] ? mutex_trylock+0x1e0/0x1e0 [ 711.062028][ T6531] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 711.067999][ T6531] ? iov_iter_advance+0x295/0xf70 [ 711.073018][ T6531] ? _copy_from_iter_full+0x25d/0x900 [ 711.078373][ T6531] ? __phys_addr_symbol+0x30/0x70 [ 711.083387][ T6531] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 711.089124][ T6531] pfkey_sendmsg+0x40b/0xbe0 [ 711.093733][ T6531] ? pfkey_send_new_mapping+0x1220/0x1220 [ 711.099454][ T6531] sock_sendmsg+0xdd/0x130 [ 711.103962][ T6531] ___sys_sendmsg+0x806/0x930 [ 711.108648][ T6531] ? copy_msghdr_from_user+0x430/0x430 [ 711.114138][ T6531] ? kasan_check_read+0x11/0x20 [ 711.118989][ T6531] ? __fget+0x381/0x550 [ 711.123913][ T6531] ? ksys_dup3+0x3e0/0x3e0 [ 711.128497][ T6531] ? lock_downgrade+0x880/0x880 [ 711.133364][ T6531] ? __fget_light+0x1a9/0x230 [ 711.138065][ T6531] ? __fdget+0x1b/0x20 [ 711.142409][ T6531] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 711.148661][ T6531] __sys_sendmsg+0x105/0x1d0 [ 711.153370][ T6531] ? __ia32_sys_shutdown+0x80/0x80 [ 711.158495][ T6531] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 711.163957][ T6531] ? do_syscall_64+0x26/0x610 [ 711.168657][ T6531] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 711.174744][ T6531] ? do_syscall_64+0x26/0x610 [ 711.179453][ T6531] __x64_sys_sendmsg+0x78/0xb0 [ 711.184223][ T6531] do_syscall_64+0x103/0x610 [ 711.188820][ T6531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 711.194721][ T6531] RIP: 0033:0x4582b9 [ 711.198621][ T6531] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 711.218643][ T6531] RSP: 002b:00007f1265303c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 711.227050][ T6531] RAX: ffffffffffffffda RBX: 00007f1265303c90 RCX: 00000000004582b9 [ 711.235038][ T6531] RDX: 0000000000000000 RSI: 0000000020cd0fc8 RDI: 0000000000000003 [ 711.243002][ T6531] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 711.250981][ T6531] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12653046d4 [ 711.258936][ T6531] R13: 00000000004c58c6 R14: 00000000004d9b90 R15: 0000000000000004 19:43:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:49 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000013000)) 19:43:49 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 711.485204][ T6607] gfs2: invalid mount option: hash 19:43:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x2, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 711.508570][ T6607] gfs2: can't parse mount arguments 19:43:49 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000013000)) 19:43:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x2, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:49 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:49 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:49 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000013000)) 19:43:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x4, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:49 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x4, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 711.881150][ T6838] gfs2: invalid mount option: hash 19:43:49 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x2, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 711.934531][ T6838] gfs2: can't parse mount arguments 19:43:49 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:49 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000013000)) 19:43:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x3f00, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:50 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x3f00, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:50 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc", 0x34}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:50 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000013000)) 19:43:50 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x0e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x34000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:50 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x3, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:50 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x34000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 712.354034][ T7072] gfs2: invalid mount option: hash 19:43:50 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000013000)) [ 712.405388][ T7072] gfs2: can't parse mount arguments 19:43:50 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x400300, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:50 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000013000)) 19:43:50 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x400300, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:50 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:50 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc", 0x34}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:50 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x4, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x1000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 712.781420][ T7327] gfs2: invalid mount option: hash [ 712.787553][ T7327] gfs2: can't parse mount arguments 19:43:50 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:50 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000013000)) 19:43:50 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x1000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:50 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x5, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:50 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc", 0x34}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x2000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:51 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x0e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:51 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000013000)) 19:43:51 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x2000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 713.182168][ T7581] gfs2: invalid mount option: hash [ 713.244611][ T7581] gfs2: can't parse mount arguments 19:43:51 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x6, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x4000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:51 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:51 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x4000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:51 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) 19:43:51 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea", 0x4e}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) [ 713.622817][ T7847] gfs2: invalid mount option: hash 19:43:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x3f000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:51 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:51 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x7, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 713.677912][ T7847] gfs2: can't parse mount arguments 19:43:51 executing program 5 (fault-call:2 fault-nth:0): mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) 19:43:51 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x3f000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:51 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:51 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) 19:43:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x80ffffff, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:51 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea", 0x4e}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:51 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x8, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:51 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 714.063567][ T8114] gfs2: invalid mount option: hash [ 714.081461][ T8114] gfs2: can't parse mount arguments 19:43:52 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x2, 0x0) 19:43:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0xffffff7f, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x80ffffff, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:52 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea", 0x4e}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0xffffff80, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:52 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x9, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:52 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 714.405079][ T8381] gfs2: invalid mount option: hash [ 714.445943][ T8381] gfs2: can't parse mount arguments 19:43:52 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x4b47, 0x0) 19:43:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x40030000000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0xffffff7f, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:52 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18c", 0x5b}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) [ 714.679793][ T8611] gfs2: invalid mount option: hash 19:43:52 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0xa, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 714.704504][ T8611] gfs2: can't parse mount arguments 19:43:52 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:52 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x4b49, 0x0) 19:43:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0xffffff80, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x100000000000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18c", 0x5b}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:52 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:52 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0xb, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 715.024966][ T8839] gfs2: invalid mount option: hash 19:43:52 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x541b, 0x0) [ 715.046464][ T8839] gfs2: can't parse mount arguments 19:43:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x40030000000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x200000000000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:53 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:53 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18c", 0x5b}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:53 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0xc, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:53 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:53 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x5421, 0x0) [ 715.341426][ T9067] gfs2: invalid mount option: hash [ 715.355424][ T9067] gfs2: can't parse mount arguments 19:43:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x400000000000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x100000000000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:53 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:53 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c", 0x62}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:53 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0xd, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:53 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x5450, 0x0) 19:43:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x200000000000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x3f00000000000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:53 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 715.720866][ T9297] gfs2: invalid mount option: hash [ 715.766907][ T9297] gfs2: can't parse mount arguments 19:43:53 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:53 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0xe, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:53 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x5451, 0x0) 19:43:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x80ffffff00000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x400000000000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:54 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c", 0x62}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:54 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0xf, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:54 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:54 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x5452, 0x0) 19:43:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x3f00000000000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 716.186330][ T9635] gfs2: invalid mount option: hash 19:43:54 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 716.237150][ T9635] gfs2: can't parse mount arguments 19:43:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0xffffff7f00000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:54 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x10, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x80ffffff00000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:54 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:54 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c", 0x62}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:54 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x5460, 0x0) 19:43:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x2, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 716.588220][ T9879] gfs2: invalid mount option: hash [ 716.593363][ T9879] gfs2: can't parse mount arguments 19:43:54 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:54 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x11, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:54 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x40044581, 0x0) 19:43:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x4, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0xffffff7f00000000, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:54 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8b", 0x65}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:54 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:54 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x12, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 716.992777][T10158] gfs2: invalid mount option: hash [ 717.012039][T10158] gfs2: can't parse mount arguments 19:43:55 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x0e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:55 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x40044590, 0x0) 19:43:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x3f00, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x2, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8b", 0x65}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:55 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 717.310590][T10426] gfs2: invalid mount option: hash 19:43:55 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x40044591, 0x0) 19:43:55 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x13, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x34000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 717.352532][T10426] gfs2: can't parse mount arguments 19:43:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x4, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:55 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x400300, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8b", 0x65}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:55 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x400445a0, 0x0) 19:43:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x3f00, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x1000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:55 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x14, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 717.802358][T10660] gfs2: invalid mount option: hash 19:43:55 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 717.842279][T10660] gfs2: can't parse mount arguments 19:43:55 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x40049409, 0x0) 19:43:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x2000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:55 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x0e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x34000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75b", 0x67}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:56 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x15, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:56 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x4000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:56 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x40084503, 0x0) [ 718.182300][T10892] gfs2: invalid mount option: hash 19:43:56 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x400300, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 718.265177][T10892] gfs2: can't parse mount arguments 19:43:56 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x3f000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:56 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x16, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:56 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x40084504, 0x0) 19:43:56 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75b", 0x67}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:56 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:56 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x1000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 718.644298][T11133] gfs2: invalid mount option: hash 19:43:56 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x40086602, 0x0) 19:43:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x80ffffff, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 718.698940][T11133] gfs2: can't parse mount arguments 19:43:56 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x17, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:56 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:56 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x40087602, 0x0) 19:43:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0xffffff7f, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:56 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x2, &(0x7f0000000880)=[{&(0x7f0000000140)="d02400753dc13e23dc868dd6935a553cff3be2894f4b937a03d112d75cf22bd9830be64e686addb3e8eae64d21be10a140ae486b15443170307a6d13c0c79bccb58bb0ce20dac9a917af4c2568976dafeb864119620e1b8eb633784a5f385b87e72258beff771e6329e86bca7a19ee489fb26de2cc7d7c0a309083c0b8436096f067e82d27637244c4c9c2771834a4aae10ee4721acc0140c1b541bcaed4aecfa72d620a0f3bab149252d09cc3a4ca5d3bdb2c6c5ba7ac28cef1964ca95711d74a9f9e4c5d4399", 0xc7, 0xd0be}, {&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75b", 0x67}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:56 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x2000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:56 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:57 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:57 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x40104593, 0x0) [ 719.068637][T11453] gfs2: invalid mount option: hash [ 719.073814][T11453] gfs2: can't parse mount arguments 19:43:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0xffffff80, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:57 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x18, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x4000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:57 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x40030000000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:57 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:57 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x4020940d, 0x0) 19:43:57 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x3f000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 719.470112][T11654] gfs2: invalid mount option: hash 19:43:57 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x19, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x100000000000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 719.545673][T11654] gfs2: can't parse mount arguments 19:43:57 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x40284504, 0x0) 19:43:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x80ffffff, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:57 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:57 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x200000000000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:57 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1a, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 719.890242][T11937] gfs2: invalid mount option: hash [ 719.903637][T11937] gfs2: can't parse mount arguments 19:43:57 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x80044501, 0x0) 19:43:57 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0xffffff7f, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x400000000000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:58 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:58 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x80044584, 0x0) 19:43:58 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1b, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0xffffff80, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x3f00000000000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:58 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 720.337322][T12168] gfs2: invalid mount option: hash [ 720.342464][T12168] gfs2: can't parse mount arguments 19:43:58 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x80084502, 0x0) 19:43:58 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{0x0}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x80ffffff00000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x40030000000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:58 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1c, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:58 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 720.678261][T12401] gfs2: invalid mount option: hash [ 720.736305][T12401] gfs2: can't parse mount arguments 19:43:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0xffffff7f00000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:58 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x80084503, 0x0) 19:43:58 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x100000000000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{0x0}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:58 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1d, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:59 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x80084504, 0x0) 19:43:59 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:59 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 721.172428][T12657] gfs2: invalid mount option: hash [ 721.178438][T12657] gfs2: can't parse mount arguments 19:43:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x200000000000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:59 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1e, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:59 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x80086601, 0x0) 19:43:59 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:59 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{0x0}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:59 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 721.509719][T12906] gfs2: invalid mount option: hash [ 721.524834][T12906] gfs2: can't parse mount arguments 19:43:59 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x80087601, 0x0) 19:43:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x400000000000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:43:59 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0xff00, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:43:59 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:43:59 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x0e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x3f00000000000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:43:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 721.846005][T13110] gfs2: invalid mount option: hash [ 721.873965][T13110] gfs2: can't parse mount arguments 19:43:59 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x80104592, 0x0) 19:43:59 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:43:59 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1f400000, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:44:00 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x80ffffff00000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:00 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x80284504, 0x0) 19:44:00 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0xffff8880a36621a8, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:44:00 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 722.306564][T13426] gfs2: invalid mount option: hash [ 722.362878][T13426] gfs2: can't parse mount arguments 19:44:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0xffffff7f00000000, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:00 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:00 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0xc0045878, 0x0) 19:44:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:00 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:00 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0xffff8880a3662368, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:44:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 722.679818][T13657] gfs2: invalid mount option: hash 19:44:00 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 722.727705][T13657] gfs2: can't parse mount arguments 19:44:00 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0xc0045878, 0x0) 19:44:00 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:00 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20836000) 19:44:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc", 0x34}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:00 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0xc0189436, 0x0) 19:44:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 723.179760][T13956] gfs2: invalid mount option: hash [ 723.188248][T13956] gfs2: can't parse mount arguments 19:44:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:01 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20c36000) 19:44:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:01 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0xc020660b, 0x0) 19:44:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc", 0x34}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:01 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x7fffffffefff) [ 723.581009][T14231] gfs2: invalid mount option: hash 19:44:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 723.613228][T14231] gfs2: can't parse mount arguments 19:44:01 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x2000000000000000) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000080)={0x10000, 0x80, 0xb4, 0x7, 0x8}) clone(0x48240000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), &(0x7f00000001c0)="93743eaacd24ce3ab56f7d9052e420264adc4736eca20d7e2ab395d081e7bf0e929b3d275f23daa79c0a9958d2ee30d4c926f4ce94a71e92c3e566b84388e82c954eb9a97bdb7eba30937d2cf4535f6dee1428e3df0e52b46db8614bd94e4f1f679378f084dd37592cd6c4ca1f34dde66f1a327c8d65f799678a3eb61b5c2631") r2 = dup2(r1, r0) write$selinux_load(r2, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "9f17b2c0818b418b80f90f29f74a24345bc9c04acd015c5ede5e73e5282683ad68c6a31bebab4222596cf998d5165e01ed34df5c2301e9e1ac6dcc6b4d86aa91cf6a3ef49341f585709e63ad94a7ba4a4ed5d4a4cfd54dc7ae8870a2fcf662ad"}, 0x70) 19:44:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:01 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x0) r1 = socket(0x10, 0x801, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f00000000c0), 0xfffffffffffffebb) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x401, 0x0, 0x7f, 0x7, 0x3ff, 0x9}, 0x4}, 0xa) 19:44:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc", 0x34}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 724.032365][T14467] gfs2: invalid mount option: hash 19:44:02 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 724.084811][T14467] gfs2: can't parse mount arguments 19:44:02 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x2, 0x10802, 0x0) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000140)=0x8, &(0x7f0000000180)=0x2) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0xffffffffffffff8a) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) 19:44:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:02 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) 19:44:02 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:02 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea", 0x4e}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:02 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/softnet_stat\x00') sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x2, 0x3, 0x4, 0xb, 0xc, 0x0, 0x70bd28, 0x25dfdbfc, [@sadb_address={0x3, 0x7, 0x2b, 0x80, 0x0, @in={0x2, 0x4e24, @broadcast}}, @sadb_spirange={0x2, 0x10, 0x4d3, 0x4d5}, @sadb_x_nat_t_type={0x1, 0x14, 0x8}, @sadb_lifetime={0x4, 0x3, 0x152367ce, 0x8, 0x913, 0x8}]}, 0x60}}, 0x10) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r2 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 724.442807][T14794] gfs2: invalid mount option: hash 19:44:02 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 724.519484][T14794] gfs2: can't parse mount arguments 19:44:02 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) 19:44:02 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea", 0x4e}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:02 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:02 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x81, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000572000/0x3000)=nil, 0x3000, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-monitor\x00', 0x2001, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000580)={0x1, 0x0, 0x102, 0x4, {0x2, 0x434d, 0xffffffff, 0x1ff}}) r2 = socket(0x10, 0x802, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000040)={0x8, 0x0, 0x3b98}, 0xc) r3 = request_key(&(0x7f00000000c0)='logon\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='/dev/nullb0\x00', 0x0) keyctl$set_timeout(0xf, r3, 0xff) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x2f, &(0x7f0000000000), 0x20a1580e) getsockopt$bt_hci(r2, 0x0, 0x2, &(0x7f0000000100)=""/68, &(0x7f0000000080)=0x44) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000003c0)={r4, 0xfb}, &(0x7f0000000400)=0x8) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000240)=0x4000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000440)=ANY=[@ANYBLOB="f6f23ba5c6cd290a2f46031f00000a10438573979df61f89a4879c565e43", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000002c0)={r5, 0xfc7}, &(0x7f0000000300)=0x8) 19:44:02 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x20000) recvfrom$netrom(r1, &(0x7f0000000040)=""/253, 0xfd, 0x1, &(0x7f00000001c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5}, [@default, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) [ 724.890882][T15028] gfs2: invalid mount option: hash 19:44:02 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 724.924796][T15028] gfs2: can't parse mount arguments 19:44:03 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = syz_open_dev$media(&(0x7f0000000480)='/dev/media#\x00', 0x92, 0x0) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f00000004c0), &(0x7f0000000500)=0x4) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000540)={'raw\x00', 0x2, [{}, {}]}, 0x48) r2 = socket(0x10, 0x802, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5b3, 0x2000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r3, &(0x7f0000000100)="487b9898b5e2affe993c7f8a50b54ca6026286148f6e09ccadeb45d73fbf7c3ed5b302065ed89820ec55c442449f8a393f9423bf18a2bb5bdc698831b162c285d3d4e2c14d02cba47825e2cf0ea9924d3bd99c475f1cb35530ecd8e4d34b8738b9ac0f4001d84de7f73591f6b2dd447f52389317f4ac33958f71b593424a1d8fe8fb7cca70d37f4efcf673c868359512ce32c1a1fda2204ee9f9075ef9eeb4082be0726a5f025f514b68559f9bb02946ee26508c2f8dfef4b61900cb850d4ea0b7ea791f058432427413a6236d34af507c9264f01a08a26eae"}, 0x10) kexec_load(0x8, 0x1, &(0x7f0000000440)=[{&(0x7f0000000340)="247a1ba41f6b48a0c252bee894ca815f0423e97676a3ae8bbcaa56e4be445a4c15928dc610ad6dad3d30080678fd21b4b8d9c577a92605ff258e804ebb6bf29a6ca0814b297da0368ed5666a38aabd67abc5c62324d6f2c2f914cde6b43cb058487d5fe00dda772ff94fc55837c519fbf63916fd55b66202b7386001c02e8c0a076f8c790181a6f202bd0a47675012441ca3f431f1607f7998f707d402c803bebb4ac862816ae6c19d05c50bde30c39ae7eefd7304f62a64ae928c0115667c8a2ca30a64a2379f9e9a22480d3dad40e0d4f889412f20427744b383ad59", 0xdd, 0x1, 0xe168}], 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0xffffffff, 0x0, 0x2, 0x8, 0x0, "3ea5b60729c13dcf53ff024b1b74c72463b529a374bbdbefd98b138acb33003acc5281d7f99e637559c8b02f649c28fbcf6b279aaafd41b5eacf626f8e0897ac", "81f2c743f90da651885cc5a138a7ba5958b4bcfa7bc6c5058f9f5b0f98e19024dae30ad59f6c4eed77dc26e7676c8a68a8465a36156871e64ab7d96cfe12ab87", "1d9575a5d91b0bbd21321a7bcc70033baaa9b07aad6def89391cf3108e557b99", [0x8, 0xab]}) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x7, 0x600) madvise(&(0x7f0000234000/0x4000)=nil, 0x4000, 0x0) 19:44:03 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea", 0x4e}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:03 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:03 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x1000, 0x9, 0x0, 0x4, 0x8}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={r1, 0xd8d8}, 0x8) syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) 19:44:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:03 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 725.351990][T15277] gfs2: invalid mount option: hash [ 725.363303][T15277] gfs2: can't parse mount arguments 19:44:03 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x140) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000001c0)) 19:44:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:03 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) sendmsg$xdp(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="4006cbaa9bcfef72556cba7124b38e9e914759fc0a15bbb43d2257c6ce6891d29881f059b869c584b57a3d75930501e20db8809f908ed3fd5e4beb96b978c49f0d87409d9a4c930414164df830a8b975aca22e9f66afaff38fb8fb24ccb56e", 0x5f}, {&(0x7f0000000100)="7be4127b9c262cb9e85fbf833e714372d528d1f80b19fd161cbfe89bd77950f314def629291136e7b1c64d07a557216e0009b151a4e9322ef255eb5184282ee8c9cd0f494e91a0b628ba8fa51fd5325c8724ee5404c02477500ef5707802fc14f6b873d7cae0ec8dc5205a6dd2777b5b0d0af6fef1b83f43261d20f6b88891", 0x7f}, {&(0x7f0000000180)="3645742d7d7710710601b36f10176357a5224509dd355b0bef2d7d8ea7fa96ebd20ffc15c742d8a8b4e83dde8b3ce032d5e06c114f7ae6d516441fd73f539918e49ee03c144246413d440b405d542b473d77ad20d0ca0cca3ba4b26f904ae888a6088cf4b11624b10e639fc99f3215c0ec55b8859f80b6ce445a2659ac3a7895099f596d5a", 0x85}, {&(0x7f0000000240)="47f08c6082ae9348cac6b74c7e7436473fcc5eb6a03dc19a8008bd2515f44f32bc3d52397b082b74e0b758b51b3e573d404f894c49242b0b5119a2b62d4fd2e786dcb204a2c6e0d1a1121252505c00f11c100f0697d0624c30cc85c85b0c654e81fa67a266aba782ba893e466a1831cf84fca47116157d561733ac3298133cb05f4f17fb00d6bb19328f3e70fcdf52f9955f6d4af1a5655c4ccd642b341247c1ae53be4497e89247cd4b8f00723e56eb4417fa27054b7b04b88f0d05aff60f3470", 0xc1}], 0x4, 0x0, 0x0, 0x8000}, 0x20008080) 19:44:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:03 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:03 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18c", 0x5b}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) [ 725.695579][T15489] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53147 sclass=netlink_route_socket pig=15489 comm=syz-executor.0 19:44:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:03 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:03 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) 19:44:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 725.768072][T15526] gfs2: invalid mount option: hash [ 725.774280][T15526] gfs2: can't parse mount arguments 19:44:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:03 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x10542, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) getsockname$tipc(r1, &(0x7f00000000c0)=@name, &(0x7f0000000100)=0x10) 19:44:03 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:04 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x200100, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x208000, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000003c0)={0xfffffffffffffdbe, 0x1, 0xf1a, "4eac1b82fd9ab7f98d40086ba7a77efe2a7d0ed7ca59b6284bdebb3013eabe25df924b987216d8e6d5a2e8feda84191b9df3a5d0123830127f16586109c480675683f5b0bf3062188e572e7de819ab09245a117beef0e0034889409836b5d124146e93e5e6ad5db90fbd3faffd8a43493f3eea4818f0274029741eb7fb19cd4fc8b0d6d2805f8c5305c58dac0639a4ad92822c9c0b73803550dfb0a86bbc31621db96933eb5c1c30778a84f028949239fac78f32abfce4d342da0ae97e7a7168e4ddc130b345af74330373bf8b7e1bd1c57005b5723f9054e26084026e66a6ac"}) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) flock(r0, 0x2) 19:44:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:04 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18c", 0x5b}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:04 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:04 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000080)=0x9) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r2 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:44:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 726.314169][T15836] gfs2: invalid mount option: hash [ 726.334931][T15836] gfs2: can't parse mount arguments 19:44:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:04 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) unshare(0x40000) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) fcntl$setlease(r0, 0x400, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000100)={0x17, 0xf9, &(0x7f0000000000)="ee308ade96297701be0e3366db8d88496fec49f09749285c9e6b0f7ca8b3aadba5cd182f2729935e8321ac145cd225172d3c2fa21b41678d703970b9a9e4fc0c0b83d30e6c252d101da646e9caec8724a44f3272e8377b11a5ab7961230fc6538ea86ce2bbba42f4146b37348269ef8e7a1a42c8244d26937375416458e5636c8a37bf0a399c66f469874c193775273a30813bc13c1a3c514588d9d85fde224f9e20774e81fb15f98e5573618c3fd208d28a44a56fe6c348879e8f20e85a6de05f7757f218df454268e720be183d3f783243e25ef55077120f080cc7bdd991022a17d672526fdf3df6bd05c5058b5d97126bf4add24cef39de"}) 19:44:04 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:04 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18c", 0x5b}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:04 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:04 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x8, 0x400) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000140)=0x3, 0x4) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r2 = socket(0x10, 0x802, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @initdev, @multicast1}, &(0x7f0000000080)=0xc) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) iopl(0x3ef) 19:44:04 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20100, 0x0) readlinkat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/82, 0x52) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) 19:44:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 726.750480][T16063] gfs2: invalid mount option: hash 19:44:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x3f00, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:04 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 726.827703][T16063] gfs2: can't parse mount arguments 19:44:04 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c", 0x62}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:04 executing program 5: sync() delete_module(&(0x7f0000000000)='keyring)keyring]\x00', 0x800) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0x6, 0x5, 0x5, 0x4, 0x5, [{0x4, 0xff, 0x843, 0x0, 0x0, 0xc01}, {0x11d9, 0xdee, 0xb9a}, {0x7, 0x40, 0xfffffffffffffffb, 0x0, 0x0, 0x2401}, {0x3fff800, 0x0, 0x7}, {0xfffffffffffff001, 0xfff, 0xfffffffffffffffe, 0x0, 0x0, 0x2}]}) r1 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, 0x0) ioctl$sock_proto_private(r0, 0x89e9, &(0x7f0000000040)="6db5ec485ff6f0eeb1b04de3267c57f5d4d5e31a9f25111579bff009c1497f5b04e454c627aa5bb3e7dbddf98c056aaa0d2579a01cd58ab69e7c4cf1bffb3d5814efb7746b4fcfb6f77af6164968387b7be9d3fbfe2656715500e0281348e4fe601c77160caca7249cdd7d16f8b45243ef4b24c106d53abe39344104d42ce9cb9d11d095454ef940329d421dec02fd1cab56064b473d52d2330eaeb7b752a6e9fdcb330e72fbfc9eed74361588a51b5b5e509ffe059882bc1225d2982daf1e3dfb4f70abe1fc536af743b75d1ee8bcaa6c2947eec2d82d3a9b") 19:44:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:04 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x34000, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:05 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x9, 0x7}, {0xeb, 0x2}]}, 0x14, 0x1) [ 727.133711][ T26] audit: type=1400 audit(5849178245.041:117): avc: denied { ioctl } for pid=16291 comm="syz-executor.5" path="socket:[185399]" dev="sockfs" ino=185399 ioctlcmd=0x660b scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 727.201086][T16304] gfs2: invalid mount option: hash 19:44:05 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 727.227729][T16304] gfs2: can't parse mount arguments 19:44:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x400300, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:05 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/access\x00', 0x2, 0x0) read(r0, &(0x7f0000000080)=""/169, 0xa9) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x800) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, 0x0) 19:44:05 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:05 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) timerfd_gettime(r1, &(0x7f00000001c0)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000100)={0x7b, 0x0, [0x6a, 0xffffffffffff88ce, 0x7ff0, 0x4]}) r3 = socket(0xd, 0x802, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x480) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:44:05 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c", 0x62}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x1000000, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:05 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 727.587579][T16536] gfs2: invalid mount option: hash [ 727.612232][T16536] gfs2: can't parse mount arguments 19:44:05 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') sendmsg(r1, &(0x7f0000000140)={&(0x7f0000000040)=@ipx={0x4, 0x800000000, 0xfffffffffffffff8, "dde7acb0a599", 0x2}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000100)=[{0x18, 0x108, 0x401, "38ad8d6c1a"}], 0x18}, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) 19:44:05 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:05 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) socket$inet(0x2, 0x4, 0x5) 19:44:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x2000000, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:05 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c", 0x62}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:05 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x2, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:05 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-sel\x87/attr/keycreate\x00', 0x2, 0x0) mmap(&(0x7f000000f000/0x3000)=nil, 0x3000, 0x1, 0x32, r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, 0x0) [ 727.970631][T16766] gfs2: invalid mount option: hash [ 728.044546][T16766] gfs2: can't parse mount arguments 19:44:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x4000000, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:06 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x4, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:06 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x80000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x20000) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f00000000c0)={0x0, 0x4, 0x3, 0x88, &(0x7f0000ffa000/0x4000)=nil, 0x1}) r2 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:44:06 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x2) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000040)={0xf, 0x7fff, 0xffffffff}) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) 19:44:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x3f000000, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:06 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8b", 0x65}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:06 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x3f00, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:06 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 728.417626][T17053] gfs2: invalid mount option: hash [ 728.423537][T17053] gfs2: can't parse mount arguments 19:44:06 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='msdos\x00', 0x20, &(0x7f0000000140)='posix_acl_access\x00') madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:44:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x80ffffff, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:06 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:06 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x20000000000001, 0xffffffffffffffff) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/sequencer\x00', 0x101, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000001140)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000001200)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000011c0)={&(0x7f0000001180)={0x2c, r2, 0x800, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'syz_tun\x00'}}}, ["", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x800) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) r3 = syz_open_dev$radio(&(0x7f0000001300)='/dev/radio#\x00', 0x3, 0x2) sendto$inet6(r3, &(0x7f0000000080)="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", 0x1000, 0x40000, &(0x7f0000001080)={0xa, 0x4e23, 0x1, @rand_addr="f36dcbbebb85b1023dcc02d832b1594c", 0x81}, 0x1c) 19:44:06 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8b", 0x65}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x34000, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0xffffff7f, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:06 executing program 5: pipe2(&(0x7f0000000000), 0x800) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) 19:44:06 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:06 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x2000, 0x0) accept4(r1, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f00000002c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x3, 0x4}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)={r2, 0x3}, &(0x7f0000000200)=0x8) r3 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_RD_TIME(r4, 0x80247009, &(0x7f0000000080)) [ 728.830376][T17351] gfs2: invalid mount option: hash [ 728.891309][T17351] gfs2: can't parse mount arguments 19:44:06 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0xffffff80, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x400300, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:06 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x200, 0x0, 0x10001, 0xbe42}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000100)={0x1, r1, 0x1, 0x1ff}) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, 0x0) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000080)) 19:44:07 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:07 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000140)={0xde46}) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r2 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1a959232, 0x800) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f0000000080)=0x6) 19:44:07 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8b", 0x65}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:07 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x1000000, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x40030000000000, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:07 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000300)='./file0\x00', 0x9, 0x3, &(0x7f0000000280)=[{&(0x7f0000000080)="c5e19f0f362fbfbdcc52c45d28626c333a899b2192e36ec4cc9d08184c7633830d4e4291aaffa1ca16cd81d9ab2c1d8a6d2d19b441620586b897b17d4e1f86897db518954c76486ac8b3d110a30477d03f8fd0b0c8d77f99a38687e16319a47c168529d7dfdaf60bd1ea34c8c7bf2c05ae94127c2c025b6ae591bc9dafbaaec3ea914c7a6d0a1081b8105c3a1f7fe59640bec58f61a2f9260963c0c0c35bb2c264df3fbd", 0xa4, 0x8}, {&(0x7f00000001c0)="ce9cf458e328eb782e940e66be96e7c35ee326f2852e5603a2357e5c560f2e1d33623331544f03b7d217bb58c58e1444331a829f0344fad1f580b6d8350b79e9e79c685192ce78818c64a7056d5eb5da3231ac0a0dac566d01bb4d038d291d736d9f2b41f578a7c437018408deffc0d1771920f59c68d3246792c9e78ddaf51eda", 0x81, 0x9}, {&(0x7f0000000140)="7b675be707e287d264fa0382a487770d", 0x10, 0x100000001}], 0x10000, 0x0) 19:44:07 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 729.357765][T17620] gfs2: invalid mount option: hash [ 729.364081][T17620] gfs2: can't parse mount arguments 19:44:07 executing program 0: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x6, 0x4) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r2 = socket(0xc, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) setns(r0, 0x6e000000) 19:44:07 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 729.472846][T17669] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 19:44:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x100000000000000, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:07 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x2000000, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 729.651592][T17669] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 19:44:07 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:07 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75b", 0x67}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:07 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x4000000, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:07 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040)=0x1, 0x4) 19:44:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x200000000000000, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:07 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:07 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000180)={0x0, 0x80000000}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000240)={0x0, 0x6}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000340)={r1, 0xd8d, 0x2}, &(0x7f0000000300)=0x241) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0xdca4, 0x0, 0x2, 0x1, r2}, &(0x7f0000000140)=0x10) [ 729.835781][T17946] gfs2: invalid mount option: hash [ 729.852579][T17946] gfs2: can't parse mount arguments 19:44:08 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:08 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75b", 0x67}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x3f000000, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x400000000000000, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:08 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80002, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000100)={&(0x7f0000000040)=[0x0, 0x0], 0x2}) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) 19:44:08 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 730.246405][T18177] gfs2: invalid mount option: hash 19:44:08 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x3, 0x1, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) [ 730.273318][T18177] gfs2: can't parse mount arguments 19:44:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x80ffffff, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:08 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:08 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000000)=0x63, 0x2) arch_prctl$ARCH_SET_GS(0x1001, 0x0) 19:44:08 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x3f00000000000000, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:08 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x101000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000100)) r2 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040), 0x10) 19:44:08 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75b", 0x67}], 0x0, &(0x7f0000000980)={[{@nobarrier='nobarrier'}, {@noloccookie='noloccookie'}, {@nosuiddir='nosuiddir'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ':\xfbwlan0('}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:08 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x80ffffff00000000, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 730.676336][T18415] gfs2: invalid mount option: hash [ 730.682471][T18415] gfs2: can't parse mount arguments 19:44:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0xffffff7f, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:08 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x102) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 19:44:08 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:08 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:08 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x101, 0x101000) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x3}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000140)={r2, 0x7, 0x0, 0x4fc1d73, 0x6}, &(0x7f0000000180)=0x18) r3 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x2f, &(0x7f0000000200), 0xb045b01478e6f90e) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x121400, 0x0) 19:44:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0xffffff7f00000000, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0xffffff80, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:08 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:08 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000300)={0x0, 0x1000}) get_robust_list(r0, &(0x7f0000000240)=&(0x7f0000000200)={&(0x7f0000000140)={&(0x7f0000000080)}, 0x0, &(0x7f00000001c0)}, &(0x7f0000000280)=0x18) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xfff, 0x20000) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f00000000c0)=""/109) syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, 0x0) [ 731.059646][T18646] attempt to access beyond end of device [ 731.083964][T18646] loop2: rw=4096, want=136, limit=64 [ 731.122366][T18646] gfs2: error 10 reading superblock 19:44:09 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:09 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000491000/0x2000)=nil, 0x2000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:44:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x2, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x40030000000000, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:09 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:09 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x4, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x100000000000000, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 731.495455][T18888] attempt to access beyond end of device [ 731.528399][T18888] loop2: rw=4096, want=136, limit=64 19:44:09 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 731.575240][T18888] gfs2: error 10 reading superblock 19:44:09 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x1e1499) 19:44:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x3f00, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:09 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x200, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000040)=0x7) 19:44:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x200000000000000, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:09 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:09 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 731.897357][T19113] attempt to access beyond end of device [ 731.905274][T19113] loop2: rw=4096, want=136, limit=64 [ 731.910796][T19113] gfs2: error 10 reading superblock 19:44:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x400000000000000, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:09 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x34000, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:09 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x10200, 0x0) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000040)='syz0\x00') ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000080)=0x1) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) 19:44:10 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000100)={0x0, 0x70, 0xfffffffffffffc00, 0xff, 0x8f, 0x7fffffff, 0x0, 0x100, 0x100, 0x0, 0x3, 0x7df, 0x9, 0x20, 0x2, 0xffffffffffff0001, 0x5, 0xbfe, 0x1ff, 0x3, 0x6, 0x2, 0xd9b, 0x2, 0xa8, 0x0, 0xc7ee, 0x98, 0x4, 0x2, 0x80000000, 0x3, 0x2, 0xbf26, 0x1f, 0x8001, 0xfff, 0xffffffff, 0x0, 0x100, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x400, 0x4, 0x13b, 0x6, 0x0, 0x1, 0x2}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x5, 0x0, 0xfffffffffffff800, 0x2}, &(0x7f0000000180)=0x18) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r2, 0x5def}, &(0x7f0000000200)=0x8) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r3 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x2f, &(0x7f0000000280), 0x240) 19:44:10 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:10 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x3f00000000000000, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:10 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x400300, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 732.276607][T19390] attempt to access beyond end of device [ 732.282282][T19390] loop2: rw=4096, want=136, limit=64 [ 732.288071][T19390] gfs2: error 10 reading superblock 19:44:10 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 19:44:10 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x8000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x4000, 0x0) 19:44:10 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:10 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x80ffffff00000000, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:10 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x1000000, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:10 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 732.592125][T19594] attempt to access beyond end of device 19:44:10 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101040, 0x0) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000040)={0x2, 0x3, 0x1, 0x1, 0x7, 0x1}) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) [ 732.634259][T19594] loop2: rw=4096, want=136, limit=64 19:44:10 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0xffffff7f00000000, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 732.655292][T19594] gfs2: error 10 reading superblock 19:44:10 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e22, 0x7fff, @mcast1, 0x3}}, [0x1, 0x0, 0x1, 0x30, 0x6, 0x1, 0x5, 0x3f, 0x9, 0x1, 0x4, 0x7a9, 0x100, 0x149, 0x8000]}, &(0x7f00000003c0)=0x100) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000280)=@assoc_id=r2, &(0x7f0000000100)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000001c0)={0x0, 0x19, "09ea14390cea37d7eea355682d70064da471309b05974e8aca"}, &(0x7f0000000200)=0x21) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x5, 0x4}, &(0x7f0000000180)=0x10) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000af9000/0x1000)=nil, 0x1000, 0x1000000000002) r3 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000240)=0x1, 0x4) 19:44:10 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x2000000, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 732.795674][T19741] QAT: Invalid ioctl 19:44:10 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x2401c0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) [ 732.843175][T19741] QAT: Invalid ioctl 19:44:10 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x2, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:10 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:10 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x4000000, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 732.937691][T19838] attempt to access beyond end of device [ 732.943680][T19838] loop2: rw=4096, want=136, limit=64 [ 732.955674][T19838] gfs2: error 10 reading superblock 19:44:10 executing program 0: openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r0 = socket(0x10, 0x802, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000200)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x118, 0x118, 0x390, 0x390, 0x390, 0x4, &(0x7f00000001c0), {[{{@arp={@broadcast, @dev={0xac, 0x14, 0x14, 0x25}, 0xffffffff, 0xffffffff, @mac=@broadcast, {[0x0, 0xff, 0x0, 0xff, 0xff]}, @mac=@link_local, {[0xff, 0x0, 0xff, 0xff, 0xff]}, 0x100000000, 0x80ef, 0x3, 0x8, 0xa63, 0x4, 'veth0_to_team\x00', 'veth1\x00', {0xff}, {}, 0x0, 0x300}, 0xf0, 0x118}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@arp={@empty, @multicast2, 0xffffffff, 0x0, @empty, {[0xff, 0xff]}, @mac=@dev={[], 0x1c}, {[0x0, 0x0, 0xff]}, 0x8, 0x6, 0x7f, 0x38e2b87d, 0xd1, 0x7fffffff, 'nr0\x00', 'gre0\x00', {}, {0xff}, 0x0, 0x104}, 0xf0, 0x160}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x5, 0x20, 0x10000, 0x0, 0x0, "d10df2ae4372957d584ef5d55c41813828a9349a56887cda63241e0f7f1a7cdcefff13269e1eb9e05ad6cb371b7bdccd6ebcffc435dd1dc916b8a0bfa88aec21"}}}, {{@arp={@dev={0xac, 0x14, 0x14, 0x25}, @loopback, 0x0, 0xff000000, @mac=@remote, {[0xff, 0x0, 0x0, 0xff, 0xff]}, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, {[0xff, 0xff, 0xff, 0x0, 0x0, 0xff]}, 0x7, 0xffffffff, 0xa6, 0xffff, 0x6cd, 0x9, 'lapb0\x00', 'yam0\x00', {0xff}, {0xff}, 0x0, 0x20}, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x7fffffff, 0x4}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4c8) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x400, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8004}, 0x44080) 19:44:11 executing program 5: mmap(&(0x7f0000010000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000001480)={0x5, 0xfe, 0xc164, 0x67, 0xe0c32fe, 0xff}) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x20841, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000200)=""/4096) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000014c0)='SEG6\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000001440)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001400)={&(0x7f0000001280)={0x160, r3, 0x310, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x82d5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000000}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK={0xcc, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xce}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x378}]}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x78, r2, 0x1, 0x70bd28, 0x25dfdbff, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x50a1}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr="692730fdb67263ee9c8291b9bbb39269"}, @SEG6_ATTR_DST={0x14, 0x1, @mcast2}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3ff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x78}, 0x1, 0x0, 0x0, 0x40040}, 0x8000) [ 733.103094][T19899] attempt to access beyond end of device 19:44:11 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x3f000000, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 733.172814][T19899] loop2: rw=4096, want=136, limit=64 [ 733.183456][T19910] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=19910 comm=syz-executor.0 [ 733.206066][T19899] gfs2: error 10 reading superblock 19:44:11 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x4, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 733.310659][T19969] QAT: Invalid ioctl [ 733.369882][T19969] QAT: Invalid ioctl 19:44:11 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, &(0x7f0000000200)=0x3, 0x4) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x68281) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r2, &(0x7f0000000040)="819f049871755e8cdad6242ef29f32372e98d5c09f14cf1c0c3473c1cbde362833ccecefd87cc1fb64530d036765490db713cec108ba81d8134d59e13177f39f6a76d8b271ce8a1a66bb367dde055442cbe4664213effbfc2a14cf7b8c7b66415f0547bc2583dc3a7321a3a1c1699e98c14a2ed2005de3efa8be7918d16508524c84d693a1eb0a8f072df2131a5b740b011acbb10a667138df227b5b1efa8c779e", &(0x7f0000000100)=""/25}, 0x18) 19:44:11 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:11 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x80ffffff, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:11 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) r2 = socket$inet_sctp(0x2, 0x1, 0x84) syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f00000001c0), 0x1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) open$dir(&(0x7f0000000200)='./file0\x00', 0x80000, 0x20) write$P9_RSTATFS(r1, &(0x7f0000000280)={0x43, 0x9, 0x2, {0x24, 0x100000000, 0xffff, 0x2, 0x4, 0x466, 0x80, 0x2, 0x7}}, 0x43) r3 = socket(0x10, 0x802, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000140)={'NETMAP\x00'}, &(0x7f0000000180)=0x1e) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 19:44:11 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:11 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x3f00, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 733.596212][T20144] attempt to access beyond end of device [ 733.602666][T20144] loop2: rw=4096, want=136, limit=64 [ 733.609079][T20144] gfs2: error 10 reading superblock 19:44:11 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000880)=[{&(0x7f0000000780)="19ffe870ba8274c2b2bafe42f5ed76b05f8ccf8d1a746b3e4050023d9f08025a96158f98b0a86d3d9153da1c54ef925140da46fc45c85c903b8d57b90566c827d980d6cd64a8a522d0bf623954ea45dc9c42d961b0fd2ccdafe18ccc4f7be8cbef2c546e8bd75be7", 0x68}], 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000001ac0)={0x1, 0x1, [0x3, 0x6, 0x1, 0x0, 0xe21, 0x7, 0x5]}) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) r2 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000009c0)=""/4096, &(0x7f00000019c0)=0x1000) 19:44:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0xffffff7f, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:11 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) 19:44:11 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x800, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0xe1, 0x1f, {"bf8e3c75c55900e5b46937a7634ef799"}, 0x5, 0x6, 0x8}}}, 0xa0) recvmsg(r1, &(0x7f00000009c0)={&(0x7f00000004c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000900), 0x66, &(0x7f0000000980)=""/7, 0x7}, 0x10000) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000a00)={@empty, 0x58, r3}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000240), r2}}, 0x18) pwrite64(r0, &(0x7f0000000180)="b9e72bb7c826266caacb6e9925ae2c9ae026bd1b22c30a639d8d462b9346b774d865c5825916853944afc4d8f03e873923237312bf9ffeed7a912437cd8b98101a7a70ad019066209a9200f411fafa1b948230f209d3ee50ffd639ece1ee2fde80267a9a1864613189584424386f4b1af3ca7c", 0x73, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x1000000000002) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f00000003c0)=0x8) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_GET_VERSION_NUM(r4, 0x2282, &(0x7f0000000080)) r6 = socket(0x10, 0x806, 0x0) r7 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="0de70154507a6b57f4bf4aaaef3b81c9652c20124c90f176fb076fc8", 0x1c, 0xfffffffffffffff9) keyctl$read(0xb, r7, &(0x7f0000000a40)=""/61, 0x3d) fsync(r0) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000ac0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000c40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x40000000}, 0xfffffea8, &(0x7f0000000c00)={&(0x7f0000000b00)={0xcc, r8, 0xc00, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffff7}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x63}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x11}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) getsockopt$SO_BINDTODEVICE(r6, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) madvise(&(0x7f0000801000/0x3000)=nil, 0x3000, 0xf) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000100)={0x2, 0x3, 0x20, 0x0, 0xf}) 19:44:11 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x2, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0x86c}, 0x4) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x164, r1, 0x28, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffe70a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5813}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5230}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7fffffff}]}, @TIPC_NLA_LINK={0x84, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x800}, 0x10) r2 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000080)) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'veth1_to_team\x00', 0x2000}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0x4) [ 733.892477][T20367] attempt to access beyond end of device [ 733.929015][T20372] WARNING: CPU: 1 PID: 20372 at fs/attr.c:234 notify_change+0xca2/0xfb0 [ 733.937376][T20372] Kernel panic - not syncing: panic_on_warn set ... [ 733.943978][T20372] CPU: 1 PID: 20372 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #48 [ 733.951960][T20372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.953650][ T3875] kobject: 'loop4' (000000002d7a7b30): kobject_uevent_env [ 733.962022][T20372] Call Trace: [ 733.962049][T20372] dump_stack+0x172/0x1f0 [ 733.962071][T20372] ? notify_change+0xbc0/0xfb0 [ 733.962099][T20372] panic+0x2cb/0x65c [ 733.981522][T20367] loop2: rw=4096, want=136, limit=64 [ 733.981729][T20372] ? __warn_printk+0xf3/0xf3 [ 733.981752][T20372] ? notify_change+0xca2/0xfb0 [ 733.996212][T20367] gfs2: error 10 reading superblock [ 734.000335][T20372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.000354][T20372] ? __warn.cold+0x5/0x45 [ 734.000375][T20372] ? notify_change+0xca2/0xfb0 [ 734.005978][ T3875] kobject: 'loop4' (000000002d7a7b30): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 734.011797][T20372] __warn.cold+0x20/0x45 [ 734.023701][ T3875] kobject: 'loop1' (00000000c298b0cb): kobject_uevent_env [ 734.030998][T20372] ? notify_change+0xca2/0xfb0 [ 734.031016][T20372] report_bug+0x263/0x2b0 [ 734.031034][T20372] do_error_trap+0x11b/0x200 [ 734.031051][T20372] do_invalid_op+0x37/0x50 [ 734.031071][T20372] ? notify_change+0xca2/0xfb0 [ 734.036017][ T3875] kobject: 'loop1' (00000000c298b0cb): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 734.042422][T20372] invalid_op+0x14/0x20 [ 734.042441][T20372] RIP: 0010:notify_change+0xca2/0xfb0 19:44:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x34000, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 19:44:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0xffffff80, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 19:44:12 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\n\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', 0x0}, 0x120) [ 734.042455][T20372] Code: 14 52 0a 00 e8 ff ab b7 ff 4c 8b 7c 24 20 4c 89 ff e8 b2 87 4a 01 89 de 4c 89 ff e8 98 a3 4a 01 e9 33 fa ff ff e8 de ab b7 ff <0f> 0b e9 42 f4 ff ff e8 d2 ab b7 ff 44 89 f3 4c 89 ea 48 b8 00 00 [ 734.042471][T20372] RSP: 0018:ffff8880644879a0 EFLAGS: 00010216 [ 734.052736][ T3875] kobject: 'loop3' (000000000a4d244e): kobject_uevent_env [ 734.056152][T20372] RAX: 0000000000040000 RBX: 0000000000004200 RCX: ffffc90005e67000 [ 734.056161][T20372] RDX: 00000000000003d8 RSI: ffffffff81b8e5e2 RDI: 0000000000000007 [ 734.056170][T20372] RBP: ffff8880644879f0 R08: ffff888060a964c0 R09: ffffed1014707584 [ 734.056178][T20372] R10: ffffed1014707583 R11: ffff8880a383ac1f R12: ffff888064487a40 [ 734.056186][T20372] R13: ffff8880a383ab40 R14: 0000000000000000 R15: ffff888064487ad0 [ 734.056225][T20372] ? notify_change+0xca2/0xfb0 [ 734.056251][T20372] file_remove_privs+0x2a9/0x480 [ 734.061441][ T3875] kobject: 'loop3' (000000000a4d244e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 734.065549][T20372] ? dentry_needs_remove_privs.part.0+0x80/0x80 [ 734.065566][T20372] ? futex_wait+0x482/0x5e0 [ 734.065585][T20372] ? futex_wait_setup+0x390/0x390 [ 734.065604][T20372] ? refcount_dec_and_test_checked+0x1b/0x20 [ 734.065626][T20372] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 734.206193][T20372] __generic_file_write_iter+0x15e/0x630 [ 734.211825][T20372] ? futex_wake+0x179/0x4d0 [ 734.216318][T20372] blkdev_write_iter+0x23a/0x440 [ 734.221262][T20372] ? __blkdev_get+0x1660/0x1660 [ 734.226115][T20372] ? __fget+0x35a/0x550 [ 734.230265][T20372] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 734.236595][T20372] new_sync_write+0x4c7/0x760 [ 734.241259][T20372] ? default_llseek+0x2e0/0x2e0 [ 734.246108][T20372] ? avc_policy_seqno+0xd/0x70 [ 734.250854][T20372] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 734.256558][T20372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.262794][T20372] ? security_file_permission+0x94/0x380 [ 734.268443][T20372] __vfs_write+0xe4/0x110 [ 734.272770][T20372] vfs_write+0x20c/0x580 [ 734.277000][T20372] ksys_pwrite64+0x183/0x1c0 [ 734.283205][T20372] ? __ia32_sys_pread64+0xf0/0xf0 [ 734.288241][T20372] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 734.293712][T20372] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 734.299190][T20372] ? do_syscall_64+0x26/0x610 [ 734.304096][T20372] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 734.310145][T20372] ? do_syscall_64+0x26/0x610 [ 734.314809][T20372] __x64_sys_pwrite64+0x97/0xf0 [ 734.319818][T20372] do_syscall_64+0x103/0x610 [ 734.324401][T20372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 734.330276][T20372] RIP: 0033:0x4582b9 [ 734.334151][T20372] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 734.353835][T20372] RSP: 002b:00007fde3fc01c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 734.362254][T20372] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004582b9 [ 734.370222][T20372] RDX: 0000000000000073 RSI: 0000000020000180 RDI: 0000000000000003 [ 734.378180][T20372] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 734.386410][T20372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fde3fc026d4 [ 734.394458][T20372] R13: 00000000004c4e81 R14: 00000000004d8c60 R15: 00000000ffffffff [ 734.403559][T20372] Kernel Offset: disabled [ 734.407885][T20372] Rebooting in 86400 seconds..