, 0x1, 0x0, 0x18, 0x0, 0x88, 0x88, 0x6, [@var={0xc, 0x0, 0x0, 0xe, 0x5}, @enum={0x1, 0x2, 0x0, 0x6, 0x4, [{0xd, 0x4}, {0x4, 0x400}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x4, 0x3}, {0xd, 0x1}, {0x10, 0x1}, {0xc, 0x2}]}, @struct={0x3, 0x3, 0x0, 0x4, 0x0, 0x7fffffff, [{0x10, 0x0, 0x1}, {0x9, 0x4, 0xfb0d}, {0x7, 0x2, 0x80000000}]}]}, {0x0, [0x30, 0x0, 0x5f, 0x2e]}}, &(0x7f0000000600)=""/91, 0xa6, 0x5b, 0x1}, 0x20) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r5, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r10, @ANYBLOB=',func=KEXEC_KERNEL']) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x1f, 0x3, &(0x7f0000000340)=[{&(0x7f0000000240)="827d0aee2a67fee5b5f317f4e1bd96cb9ad54ca2c37951ef80ab9f272c8fe70ab24dbe8b37df2bc1687e83e91e4a44199a7a738b41a3b316a5392c5d8121cbf7a633b5d0e04aad6c9f9cdf2109619eaf5d2f262158dc2c9270dbafd4a9dc82023477ca0e7564951ae10baa4b9f8cc13f6cb1f615c09b7c5430b1dfc2fc1942d4021aea44bc618e1551e7fbdf69b5ef7e0b79ea675ef8aca1cc0287ffa7b68f4933cba1baa60f2972f571243fb7c1a4028615be104d49cba960866522963018009d99f3db61a671451222875b73c898efe38566e148ab079dc6aced097e14bdbe4512d744", 0xe4, 0x9}, {&(0x7f0000000080)="a9cd72f7e2fb5fe06b07468a4db97b701de8e63499f5cbcd749484a73b354b412154707e32ce3b280f4eb9670c410712645b", 0x32, 0xd9}, {&(0x7f0000000140)="9041b51fc0f7dbda0adedf8b064f79526d8c97a7e925ff3c55fdae31ed08e770de3cdfc623357c912bfdcbd07d51dbbe26674d8e9536cc4590ac573c8bc8f1af4df0d3fe55bb5efbd627361ed4f47ba247280dca030fd4a63565db3a348e22be9b17250dacba86f528257161bfdcfc9aa2c491f2cbefd5f5419f89284894f7f78c8469085ef9e15d60635997e4dd5797596053328e2414638a1f4887c699dbd2d3a007e30fe031a331f6a11ddd8f9c", 0xaf, 0x2}], 0x2, &(0x7f0000000480)={[{@nodots='nodots'}, {@dots='dots'}], [{@euid_gt={'euid>', r2}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@seclabel='seclabel'}, {@fowner_gt={'fowner>', r4}}]}) io_setup(0x400, &(0x7f0000000840)=0x0) r12 = socket$inet6(0xa, 0x400000000001, 0x0) close(r12) r13 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r12, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r14, 0x839}, 0x8) ftruncate(r13, 0x200004) sendfile(r12, r13, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r13, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) io_cancel(r11, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x1000, r13, &(0x7f0000000880)="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", 0x1000, 0x47a38b9b, 0x0, 0x1}, &(0x7f00000018c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = fcntl$dupfd(r16, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) 05:07:25 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) 05:07:25 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000040)=0x7, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:25 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x4800, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:25 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x300000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 658.298104][T17261] FAT-fs (loop5): Unrecognized mount option "euid>00000000000000000000" or missing value 05:07:25 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) 05:07:25 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000140)=@routing={0x29, 0x2, 0x1, 0x8, 0x0, [@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}]}, 0x18) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x100}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:07:25 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x4c00, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:25 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2) write$FUSE_NOTIFY_INVAL_INODE(r4, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x5, 0x0, 0x7}}, 0x28) r5 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:25 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x400000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:25 executing program 2: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000140)=@routing={0x29, 0x2, 0x1, 0x8, 0x0, [@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}]}, 0x18) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x100}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) 05:07:25 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000003) 05:07:25 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x6800, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:25 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:25 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socket$inet_dccp(0x2, 0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) 05:07:26 executing program 2: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000140)=@routing={0x29, 0x2, 0x1, 0x8, 0x0, [@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}]}, 0x18) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x100}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) 05:07:26 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x500000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:26 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x6c00, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:26 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000140)=@routing={0x29, 0x2, 0x1, 0x8, 0x0, [@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}]}, 0x18) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x100}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:07:26 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x100000410) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r2 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0xe, 0x40000) recvmsg(r2, &(0x7f0000000380)={&(0x7f0000000180)=@x25, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)=""/134, 0x86}], 0x1, &(0x7f0000000340)=""/13, 0xd}, 0xc42c9f24f5e09689) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) listxattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)=""/4096, 0x1000) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r8, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000003c0)={0x0, 0x5d, "01b7fc0a860bdd6c5c5ecbaf996dd5258c7e242b3bfa8ac8d478fcba9f5469fcb999f9923f1cd37ee7700a30daa293b0d900406c6b0e1013d02fc0c6dc7f8f06a6ad440db1261e782111f85f1e050d4a96810e2ca9237f1396fc788c24"}, &(0x7f0000000480)=0x65) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r7, 0x84, 0x79, &(0x7f00000004c0)={r9, 0x2, 0xeb4}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:26 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x18c800) fcntl$dupfd(r5, 0x0, r3) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000240)=0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x50280, &(0x7f0000000280)={[{@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x14f2}}], [{@measure='measure'}, {@obj_type={'obj_type', 0x3d, '/dev/input/event#\x00'}}, {@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, 'em0'}}, {@smackfshat={'smackfshat', 0x3d, 'vboxnet0'}}, {@fowner_gt={'fowner>', r6}}, {@euid_eq={'euid', 0x3d, r7}}, {@dont_hash='dont_hash'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) unlinkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x200) 05:07:26 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x600000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:26 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x7400, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:26 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000440)={r5}, 0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000001c0)={r5, 0x1}, &(0x7f0000000240)=0x8) r6 = fcntl$dupfd(r2, 0xfbe550ab45c64249, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000000)=""/2) r7 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) bind(r7, &(0x7f0000000140)=@rc={0x1f, {0xbd, 0x80, 0x2, 0x2, 0x8, 0x20}, 0x6}, 0x80) r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x208000, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r8, 0x8040ae9f, &(0x7f00000000c0)) sendfile(r1, r0, 0x0, 0x100000001) 05:07:26 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:26 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x7a00, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:26 executing program 2: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000)=0x1e00000000000000, 0x100000001) 05:07:26 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x800000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:26 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) 05:07:27 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xcf) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="440000001000810500"/20, @ANYPTR, @ANYRES32=r1, @ANYRES32=r11, @ANYBLOB], 0x5}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="740100001800200025bd7000fcdbdf251c108008fe01ff070020000008000400", @ANYRES32=r8, @ANYBLOB="0c00090045d33ffd", @ANYRES32=0x0, @ANYBLOB="840013000000000000000000cf059e00000000000004000000000000000200000000000000000000000000000000b000000000000000000000000000000000000000000000000000000000000000000000000000000f000000000000d0d9ded00c98000300000000000000b625efe6292b03d200000000000000000200000000000c001c9ffde8febf3b0900000000000000000200", @ANYRES32=r8, @ANYBLOB="05001a00400000000c00090000020606", @ANYRES32=r11, @ANYBLOB="0c000900000000fa", @ANYRES32=0x0, @ANYBLOB="8400130000000000000007000000000000000000000003000000000000000100000204000000000000000000000000000400000000000000000000000100000000000000000000000000000c0f00000005000000000000000000000000000000000000000000000000000000000000000000000f0e00000f0f000000040005001a00ff00000008000100"/148], 0x174}}, 0x0) connect$packet(r5, &(0x7f00000003c0)={0x11, 0xc, r8, 0x1, 0x0, 0x6, @random="0819a470a0b5"}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x100000, &(0x7f0000000680)=ANY=[@ANYBLOB="6e66735f6578706f72743d6f6e2c64656661756c745f7165726d697373696f6e732c78696e6f3d6fd46e8865442dc079c8c1e66e2c736d61636b66736861743d2f73656c696e75782f6176632f63616368655f74687265739657171f002c00"]) r12 = socket$inet6(0xa, 0x400000000001, 0x0) close(r12) r13 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r12, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r14, 0x839}, 0x8) ftruncate(r13, 0x200004) sendfile(r12, r4, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r13, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$EVIOCGABS2F(r13, 0x8018456f, &(0x7f0000000240)=""/92) 05:07:27 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000140)=@routing={0x29, 0x2, 0x1, 0x8, 0x0, [@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}]}, 0x18) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x100}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:07:27 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xeb10, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:27 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x900000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:27 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000000)=""/86) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) 05:07:27 executing program 2: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x100000001) 05:07:27 executing program 1: r0 = shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x3000)=nil, 0x1000) shmdt(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r2, r1, &(0x7f0000000000), 0x100000001) 05:07:27 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xedc0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:27 executing program 2: socket(0x9, 0x2, 0x26) r0 = fanotify_init(0x40, 0x800) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000000100)={0x80000000, 0x5, "9617198400ee157c515b2f887ac4d1e59b01e1059dc6c3b58ef7188044ece215", 0x1090, 0xffffffff, 0x6, 0x6, 0x7, 0x0, 0x7, 0x2, [0xffffff08, 0x1000, 0x7, 0x40e78eed]}) r1 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r0, r1, 0x0) ioctl(r0, 0x100, &(0x7f0000000000)="97b9936f056b434e697071ec58b16407bff737ade7a2689282c0003940f58190cf82a9c85df1f37274c1d83cabbedef72e8c1268240943e4f7f16a6fbf05909a2448c4e430a5269dbade97744d2f116f37d4911c5944e84f335f8f226b43fdf3de62ae76388856f57fa51c9a21b8033e4122c8d7d551a4e883dd0c9584966ad156841251bf4798cadf82b945b41f3ff23a5cda6aee118757eeeafcaaafb68c131c0cbb44be70d88ae35c2473c85080a085240f47b571ef4f92dbde495f204adabc331db1748b8bc0dc") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x4) socket(0x23, 0x2, 0x0) close(r3) 05:07:27 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xa00000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:27 executing program 1: bind$phonet(0xffffffffffffffff, &(0x7f0000000040)={0x23, 0x6, 0x6, 0x4}, 0x10) r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:27 executing program 2 (fault-call:1 fault-nth:0): r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:27 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xff00, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 660.958395][ T26] audit: type=1800 audit(1579324047.782:155): pid=17582 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=16531 res=0 [ 661.050151][T17700] FAULT_INJECTION: forcing a failure. [ 661.050151][T17700] name failslab, interval 1, probability 0, space 0, times 0 [ 661.079600][T17700] CPU: 0 PID: 17700 Comm: syz-executor.2 Not tainted 5.5.0-rc6-syzkaller #0 [ 661.088317][T17700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.098380][T17700] Call Trace: [ 661.101684][T17700] dump_stack+0x197/0x210 [ 661.106024][T17700] should_fail.cold+0xa/0x15 [ 661.110608][T17700] ? fault_create_debugfs_attr+0x180/0x180 [ 661.116593][T17700] ? ___might_sleep+0x163/0x2c0 [ 661.121463][T17700] __should_failslab+0x121/0x190 [ 661.126409][T17700] should_failslab+0x9/0x14 [ 661.130925][T17700] __kmalloc+0x2e0/0x770 [ 661.135290][T17700] ? mark_held_locks+0xf0/0xf0 [ 661.140064][T17700] ? _parse_integer+0x190/0x190 [ 661.145125][T17700] ? tomoyo_realpath_from_path+0xc5/0x660 [ 661.150989][T17700] tomoyo_realpath_from_path+0xc5/0x660 [ 661.156536][T17700] ? tomoyo_path_number_perm+0x193/0x520 [ 661.162197][T17700] tomoyo_path_number_perm+0x1dd/0x520 [ 661.167663][T17700] ? tomoyo_path_number_perm+0x193/0x520 [ 661.173308][T17700] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 661.179132][T17700] ? __f_unlock_pos+0x19/0x20 [ 661.183829][T17700] ? ___might_sleep+0x163/0x2c0 [ 661.188697][T17700] ? selinux_file_mprotect+0x620/0x620 [ 661.194159][T17700] ? __fget+0x37f/0x550 [ 661.198324][T17700] ? ksys_dup3+0x3e0/0x3e0 [ 661.202735][T17700] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 661.208976][T17700] ? fput_many+0x12c/0x1a0 [ 661.213421][T17700] tomoyo_file_ioctl+0x23/0x30 [ 661.218189][T17700] security_file_ioctl+0x77/0xc0 [ 661.223127][T17700] ksys_ioctl+0x57/0xd0 [ 661.227286][T17700] __x64_sys_ioctl+0x73/0xb0 [ 661.231879][T17700] do_syscall_64+0xfa/0x790 [ 661.236387][T17700] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.242283][T17700] RIP: 0033:0x45aff9 [ 661.246289][T17700] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 661.266502][T17700] RSP: 002b:00007efd35bfac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 661.275034][T17700] RAX: ffffffffffffffda RBX: 00007efd35bfb6d4 RCX: 000000000045aff9 [ 661.283112][T17700] RDX: 0000000020000000 RSI: 0000000000004601 RDI: 0000000000000003 [ 661.291125][T17700] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 661.299235][T17700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 661.307255][T17700] R13: 00000000000002cd R14: 00000000004c39a9 R15: 0000000000000000 [ 661.561885][T17700] ERROR: Out of memory at tomoyo_realpath_from_path. 05:07:28 executing program 0 (fault-call:13 fault-nth:0): r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:28 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xb00000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:28 executing program 5: pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x184000) ioctl$SNDCTL_DSP_GETOPTR(r0, 0x800c5012, &(0x7f0000000140)) r1 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) syz_mount_image$afs(&(0x7f0000000000)='afs\x00', &(0x7f0000000040)='./file0\x00', 0x7ff, 0x2, &(0x7f0000000080)=[{&(0x7f0000000240)="fdc9f89a4563df29c611ecb68b3a8ab778533c63f1b4d396ca3a200e854a27fbb4e2f906f3db8250d12da061502121cb26cddce7e6ed416991527bf496cfdcf048c599e7f00b00b012240f353d9123bb2d367d11965d7f2a270194ee34c7fc8da9f510bfdb49b8e22d26c955bfa95ac4a8d0a6a3db84f7b83dd29bc933aa1848836d50d282014c0470998dcf9ea88a45d07eb677b86fc50d8f4827de86c7da48c636b9ef9236f8c30d7483050a527b0af49cdb1326c056c9d5e603f1fd9d97da107466e51acd28dbca33a9b12bd584febf78a9bbd93dc1c3", 0xd8}, {&(0x7f0000000340)="6b8728ebdefa23d9a56f02554823b6e67f270e93b811b03ae0bd170cae23702e5a1347ac1ad2b22d453fbb7f0d864c8f4e6feae10fdbe76dcca2e3f66b05b9a2e34ec80c15279973751e11beb7e9d5c3a02db87cd157aec7435640e18a69d20dec60303233bf5c54cf176afa8c98aea311b0f87659c60336a9f4baa1daf009f0aa498eb12424683e4c2b6be0f975cd8da625623bc5788c71367d9bb951143c23d0ea4eef1b178531a12232a51f83e87977fe1f90f48364e8f86c384844382a18aaaec848c1bbb14856a79d867011823b24393aad3e8eacbbfaf5abd12ac1c57aae640d41706924", 0xe7, 0x6}], 0x29ac9b74305e7109, &(0x7f0000000480)=ANY=[@ANYBLOB="6175746f63656c6c2c666c6f636b3d77726974652c6175746f63656c6c2c666c6f566b3d77726974652c666c6f636b3d6f70656e0522906166732ce66708e5d89d59f9666c6f636b3d7374726963742c736f75726303002f6465762f0002000000000000656e7423002c66686f676b3d2c666c6f636b00000000000000"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r6) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r11 = ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) r12 = ioctl$KVM_CREATE_VCPU(r11, 0xae41, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r13, r12, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r13, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r8, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r9, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r14, @ANYBLOB=',func=KEXEC_KERNEL']) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r15, r15) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r18 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r19 = ioctl$KVM_CREATE_VM(r18, 0xae01, 0x0) r20 = ioctl$KVM_CREATE_VCPU(r19, 0xae41, 0x0) r21 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r21, r20, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r21, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r16, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r17, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r22, @ANYBLOB=',func=KEXEC_KERNEL']) mount$9p_tcp(&(0x7f0000000dc0)='127.0.0.1\x00', &(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)='9p\x00', 0x4000, &(0x7f0000000e80)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r6}}, {@loose='loose'}, {@dfltuid={'dfltuid', 0x3d, r8}}, {@uname={'uname'}}, {@aname={'aname', 0x3d, '/dev/input/event#\x00'}}, {@mmap='mmap'}, {@access_client='access=client'}, {@privport='privport'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'vboxnet1$\xf0lo.,\xb4'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp1vmnet0'}}, {@seclabel='seclabel'}, {@permit_directio='permit_directio'}, {@fowner_lt={'fowner<', r16}}]}}) r23 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r23, 0x8912, 0x400200) r24 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg(r24, &(0x7f0000000d80)=[{{&(0x7f0000000500)=@generic={0x2c, "2d147ac068fd86f2a3d8f8fe09874b7965439cc841891f692ea0fadc43631dfc0a7335084a9dc736d60958eec2f39e273cef60d9c13d980681008314fa1d7c6e86d55ce645e02bd9de1f3adc6f573b8cba370d0fe41a4af98987468fe921bf0090d41c89237e0ab01cf461dcedf0138ca0c9e2f6f7ab1617a24a406e6bc9"}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000580)="facaa12c4a1f007d544f43b6466120628a2361d410f65aad10eda2d4fe1ab220a014e3bb8d2e4d16afd8a52b64a4e37d42185a3e8274c622f5aa362cb74d66ac7e4530549e5d73d2ef73670170ce410004383bc5acb1871890476ec919373c790ae7bec93afd894054c36ba5a0e0b60ad13f12c711c6e9a5dd9bce5b81d094eee5f68bbcb76ea3", 0x87}, {&(0x7f0000000640)="e1b14c76e6b65d0e30099c1a3c4c6d1d1a4602633a063cf5f906f0c1dd673e328445a866dd8021697acffbf5325e28062dee2abfea927189bab3f1cd85372d09b5bf565e8fc6062fd4924ffd465e8708da38350188c5b43447560f7115f87d0d85da1114cdf8ec74726e26c7a12502ff1f96331089425af5163c0b9b063339dba41210ffaf9631a892e9ee06d149d3fcecc92657e35b87c45d0f129fa316a8059873fec0e02dce0522242cf753fd35279c124a2e5258bb085e7a8776dec15234a21c01b40260cff41897e556a434cd", 0xcf}, {&(0x7f0000000740)="5af8109e2b1f59a0e961fe6646e1417e29becd5cc0eb60c656fae28cfe7c3512eb8747bef0a9dc6cc00be0c9a860a0f0eca95019a58fd90ff2c89a7d29ab355a78", 0x41}, {&(0x7f00000007c0)="ca38dce76dda0514b8e1ee2ecc95eef9b67278e6dff634e3bbd725408b85de084b3d5f6e07738e8e70057a7735895671334b324d6fae72b234e8ea27ec6ad94f2e04b6c63527f545670f53549d789d50063e54b085af6cf13ce12a82e5844ad542893ca844302090e8f69e46d222706204978d1dbd0b1f1b2e56571298e55b95db12d46cc80e40adb82b3779845e65f340a20e56989ae6", 0x97}, {&(0x7f0000000880)="c59903d3dc69504c0fd240205830ea253b28b21311484f661f761cd2b74d2c1c0069a17f3bfc2b702163b6e6d3f883103421a37a5b9ac18df46996440f0e54e8b53f99dcde6e70a3a7edf5a4109164a3a799b7cf058ad74be85fe1872ed673de8c583e5255ce5ed5e3786c669a89f190ada629ba6615cf05fe8999f5f3965c26aa0766080ff8e0743bb2e3693688a6267cc620418faf475e047134f0196c293e60fc47c9773b67be08eabc12d8e482169a369ed321375e5f0e52e172746362825556b7d87fda460045", 0xc9}, {&(0x7f0000000980)="17ab24c026d3e8c2056c3fbd59389e768e489615e4c906bcb4e1ecbf4b7eea43424c24e416ad7127ac62c5afa4246a0e6cc8b593636c7a0d23192887f81dc8ad93633f84a4d6aed0cbc9dec2ba369ae2465b2f0abb6e393b556b3d65a32a112305f0", 0x62}, {&(0x7f00000000c0)="106850156ca5bd5a0f69882fa6f470da5a7987d6e25f1e9c0708395ab814ed5bb4007909ac7392c7d3e548a145b901", 0x348}, {&(0x7f0000000a00)="0927c09235c570d5bf48810a15fb8e0c40b324c3776cc9cf109a6807ccd2079e3958923528a5e8eb975c39779da5d4c63364cfe4413b92acc6f53504db39674d68ff7f5923cbc57c15bac1cdc92f4da598e31dcb41cdfab35690028fb770129cae6aeb6f3b477b2de6872c4450b121eca6d2354cbee6253aa646d3824a01b258c7ca51a99f2c61ab2c05ff4d118d19525c2ee82d1f0cbb2d5cf677350f0b02184a77da667b76d94b6053d4d709e801e5185d2a587c377ecd359fcf446a07895af9a60e531b6afe66", 0xc8}, {&(0x7f00000001c0)="51ce508e91a99e5a03ca836035303e334780e3c7f6c4e5f07f7a2a221eaa35e8d22ce95fb9de7a16856d7534a1ee", 0xfffffffffffffedb}], 0x10000000000000e9, &(0x7f0000000bc0)=[{0x88, 0x10f, 0x0, "8c6bf52a6904da527727b1abe2438c0d759d0b7e9c0d473dde95e4db23afa3091d783cee7682f9d4191f29913c2cfaa6b0222ddd3eb0a4a2d5738b2f3036bd575ad9ac75f03752f2d7ca4282ac4caaec2da05a226d9ffb6642f2aeba3a614ee081933c5d9acc03c339f16dc4e071207de353ef581729fc9f"}, {0x110, 0x3a, 0x4, "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"}], 0x198}}], 0x1, 0x40) sendfile(r2, r1, 0x0, 0x100000001) 05:07:28 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r5, 0x8904, 0x0) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000040)=r8) 05:07:28 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xff0f, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:28 executing program 2 (fault-call:1 fault-nth:1): r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 661.858088][T17720] FAULT_INJECTION: forcing a failure. [ 661.858088][T17720] name failslab, interval 1, probability 0, space 0, times 0 05:07:28 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x48000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 661.992501][T17720] CPU: 1 PID: 17720 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 662.001230][T17720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.011300][T17720] Call Trace: [ 662.014618][T17720] dump_stack+0x197/0x210 [ 662.018976][T17720] should_fail.cold+0xa/0x15 [ 662.023724][T17720] ? fault_create_debugfs_attr+0x180/0x180 [ 662.029600][T17720] ? ___might_sleep+0x163/0x2c0 [ 662.034486][T17720] __should_failslab+0x121/0x190 [ 662.039467][T17720] should_failslab+0x9/0x14 [ 662.043990][T17720] kmem_cache_alloc_trace+0x2d3/0x790 [ 662.049392][T17720] alloc_pipe_info+0x10e/0x4f0 [ 662.054266][T17720] ? __might_sleep+0x95/0x190 [ 662.057138][T17728] FAULT_INJECTION: forcing a failure. [ 662.057138][T17728] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 662.058965][T17720] splice_direct_to_actor+0x80e/0xa30 [ 662.077611][T17720] ? __inode_security_revalidate+0xf7/0x150 [ 662.083780][T17720] ? avc_policy_seqno+0xd/0x70 [ 662.088545][T17720] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 662.094986][T17720] ? generic_pipe_buf_nosteal+0x10/0x10 [ 662.100547][T17720] ? selinux_file_permission+0x9b/0x580 [ 662.106122][T17720] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 662.112404][T17720] ? do_splice_to+0x180/0x180 [ 662.117107][T17720] ? rw_verify_area+0x126/0x360 [ 662.121982][T17720] do_splice_direct+0x1da/0x2a0 [ 662.126849][T17720] ? splice_direct_to_actor+0xa30/0xa30 [ 662.132419][T17720] ? rw_verify_area+0x126/0x360 [ 662.137280][T17720] do_sendfile+0x597/0xd00 [ 662.141721][T17720] ? do_compat_pwritev64+0x1c0/0x1c0 [ 662.147042][T17720] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 662.153304][T17720] ? _copy_from_user+0x12c/0x1a0 [ 662.158369][T17720] __x64_sys_sendfile64+0x15a/0x220 [ 662.163592][T17720] ? __ia32_sys_sendfile+0x230/0x230 [ 662.168889][T17720] ? do_syscall_64+0x26/0x790 [ 662.173587][T17720] ? lockdep_hardirqs_on+0x421/0x5e0 [ 662.178883][T17720] ? trace_hardirqs_on+0x67/0x240 [ 662.184730][T17720] do_syscall_64+0xfa/0x790 [ 662.189253][T17720] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.195271][T17720] RIP: 0033:0x45aff9 [ 662.199173][T17720] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 662.219069][T17720] RSP: 002b:00007ff0cfcffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 662.227623][T17720] RAX: ffffffffffffffda RBX: 00007ff0cfd006d4 RCX: 000000000045aff9 [ 662.235723][T17720] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 662.243767][T17720] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 662.251888][T17720] R10: 0000000100000001 R11: 0000000000000246 R12: 000000000000000a [ 662.259873][T17720] R13: 00000000000008a2 R14: 00000000004c9bce R15: 0000000000000000 [ 662.267880][T17728] CPU: 0 PID: 17728 Comm: syz-executor.2 Not tainted 5.5.0-rc6-syzkaller #0 [ 662.272992][T17723] 9pnet: p9_fd_create_tcp (17723): problem connecting socket to 127.0.0.1 05:07:29 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xc00000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 662.276759][T17728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.276774][T17728] Call Trace: [ 662.300201][T17728] dump_stack+0x197/0x210 [ 662.304895][T17728] should_fail.cold+0xa/0x15 [ 662.309623][T17728] ? fault_create_debugfs_attr+0x180/0x180 [ 662.315617][T17728] ? __kasan_check_read+0x11/0x20 [ 662.320791][T17728] should_fail_alloc_page+0x50/0x60 [ 662.326062][T17728] __alloc_pages_nodemask+0x1a1/0x910 [ 662.331486][T17728] ? avc_has_extended_perms+0x8e4/0x10f0 [ 662.337151][T17728] ? __alloc_pages_slowpath+0x2900/0x2900 [ 662.343100][T17728] ? __kasan_check_read+0x11/0x20 [ 662.348172][T17728] ? fault_create_debugfs_attr+0x180/0x180 [ 662.354011][T17728] cache_grow_begin+0x90/0xc60 [ 662.358926][T17728] ? tomoyo_realpath_from_path+0xc5/0x660 [ 662.364703][T17728] ? trace_hardirqs_off+0x62/0x240 [ 662.369882][T17728] __kmalloc+0x6b2/0x770 [ 662.374169][T17728] ? mark_held_locks+0xf0/0xf0 [ 662.378959][T17728] ? tomoyo_realpath_from_path+0xc5/0x660 [ 662.384716][T17728] tomoyo_realpath_from_path+0xc5/0x660 [ 662.390291][T17728] ? tomoyo_path_number_perm+0x193/0x520 [ 662.396090][T17728] tomoyo_path_number_perm+0x1dd/0x520 [ 662.401578][T17728] ? tomoyo_path_number_perm+0x193/0x520 [ 662.407241][T17728] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 662.413174][T17728] ? __f_unlock_pos+0x19/0x20 [ 662.418145][T17728] ? ___might_sleep+0x163/0x2c0 [ 662.423039][T17728] ? selinux_file_mprotect+0x620/0x620 [ 662.428641][T17728] ? __fget+0x37f/0x550 [ 662.432838][T17728] ? ksys_dup3+0x3e0/0x3e0 [ 662.437288][T17728] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 662.443563][T17728] ? fput_many+0x12c/0x1a0 [ 662.448051][T17728] tomoyo_file_ioctl+0x23/0x30 [ 662.452847][T17728] security_file_ioctl+0x77/0xc0 [ 662.457819][T17728] ksys_ioctl+0x57/0xd0 [ 662.461993][T17728] __x64_sys_ioctl+0x73/0xb0 [ 662.466617][T17728] do_syscall_64+0xfa/0x790 [ 662.471181][T17728] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.477203][T17728] RIP: 0033:0x45aff9 [ 662.481151][T17728] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 662.500944][T17728] RSP: 002b:00007efd35bfac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 662.509394][T17728] RAX: ffffffffffffffda RBX: 00007efd35bfb6d4 RCX: 000000000045aff9 [ 662.517396][T17728] RDX: 0000000020000000 RSI: 0000000000004601 RDI: 0000000000000003 [ 662.525522][T17728] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 662.533512][T17728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 662.541509][T17728] R13: 00000000000002cd R14: 00000000004c39a9 R15: 0000000000000001 05:07:29 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x5, 0x527201) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r8, r7, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r4, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r9, @ANYBLOB=',func=KEXEC_KERNEL']) write$P9_RGETATTR(r1, &(0x7f0000000140)={0x51, 0x19, 0x2, {0x401, {0x14, 0x3, 0x6}, 0xe96ca46863abf8c0, r4, 0xee01, 0x3, 0x9, 0x0, 0x5, 0x3f, 0x80000000, 0x0, 0x6, 0x0, 0x81, 0x80000000000000, 0x5, 0x366, 0x200, 0x6}}, 0xa0) r10 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) r14 = socket$inet6(0xa, 0x400000000001, 0x0) close(r14) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r16, 0x839}, 0x8) ftruncate(r15, 0x200004) sendfile(r14, r15, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r15, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet_IP_XFRM_POLICY(r15, 0x0, 0x11, &(0x7f0000000500)={{{@in=@broadcast, @in=@initdev}}, {{}, 0x0, @in=@initdev}}, &(0x7f00000000c0)=0xe8) sendfile(r10, r0, &(0x7f0000000000), 0x100000001) 05:07:29 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000000)=[0xe28, 0x9]) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x20) sendfile(r1, r0, 0x0, 0x100000001) 05:07:29 executing program 2 (fault-call:1 fault-nth:2): r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:29 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x7ef9b, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:29 executing program 0 (fault-call:13 fault-nth:1): r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 662.939408][T17749] FAULT_INJECTION: forcing a failure. [ 662.939408][T17749] name failslab, interval 1, probability 0, space 0, times 0 [ 662.962573][T17749] CPU: 1 PID: 17749 Comm: syz-executor.2 Not tainted 5.5.0-rc6-syzkaller #0 [ 662.964971][T17747] FAULT_INJECTION: forcing a failure. [ 662.964971][T17747] name failslab, interval 1, probability 0, space 0, times 0 [ 662.971322][T17749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.971336][T17749] Call Trace: [ 662.997384][T17749] dump_stack+0x197/0x210 [ 663.001835][T17749] should_fail.cold+0xa/0x15 [ 663.006439][T17749] ? fault_create_debugfs_attr+0x180/0x180 [ 663.012266][T17749] ? ___might_sleep+0x163/0x2c0 [ 663.017208][T17749] __should_failslab+0x121/0x190 [ 663.022149][T17749] should_failslab+0x9/0x14 [ 663.026856][T17749] __kmalloc+0x2e0/0x770 [ 663.031107][T17749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 663.037352][T17749] ? d_absolute_path+0x11b/0x170 [ 663.042300][T17749] ? __d_path+0x140/0x140 [ 663.046658][T17749] ? tomoyo_encode2.part.0+0xf5/0x400 [ 663.052028][T17749] tomoyo_encode2.part.0+0xf5/0x400 [ 663.057242][T17749] tomoyo_encode+0x2b/0x50 [ 663.061651][T17749] tomoyo_realpath_from_path+0x19c/0x660 [ 663.067307][T17749] tomoyo_path_number_perm+0x1dd/0x520 [ 663.072778][T17749] ? tomoyo_path_number_perm+0x193/0x520 [ 663.078419][T17749] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 663.084219][T17749] ? __f_unlock_pos+0x19/0x20 [ 663.088933][T17749] ? ___might_sleep+0x163/0x2c0 [ 663.093794][T17749] ? selinux_file_mprotect+0x620/0x620 [ 663.099382][T17749] ? __fget+0x37f/0x550 [ 663.103660][T17749] ? ksys_dup3+0x3e0/0x3e0 [ 663.108075][T17749] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 663.114308][T17749] ? fput_many+0x12c/0x1a0 [ 663.118745][T17749] tomoyo_file_ioctl+0x23/0x30 [ 663.123507][T17749] security_file_ioctl+0x77/0xc0 [ 663.128447][T17749] ksys_ioctl+0x57/0xd0 [ 663.132612][T17749] __x64_sys_ioctl+0x73/0xb0 [ 663.137245][T17749] do_syscall_64+0xfa/0x790 [ 663.141908][T17749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 663.147925][T17749] RIP: 0033:0x45aff9 [ 663.151822][T17749] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 663.171437][T17749] RSP: 002b:00007efd35bfac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 663.179875][T17749] RAX: ffffffffffffffda RBX: 00007efd35bfb6d4 RCX: 000000000045aff9 [ 663.187953][T17749] RDX: 0000000020000000 RSI: 0000000000004601 RDI: 0000000000000003 [ 663.195932][T17749] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 663.203907][T17749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 663.212466][T17749] R13: 00000000000002cd R14: 00000000004c39a9 R15: 0000000000000002 [ 663.220669][T17747] CPU: 0 PID: 17747 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 663.229361][T17747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.239429][T17747] Call Trace: [ 663.242742][T17747] dump_stack+0x197/0x210 [ 663.247105][T17747] should_fail.cold+0xa/0x15 [ 663.251727][T17747] ? fault_create_debugfs_attr+0x180/0x180 [ 663.257656][T17747] ? ___might_sleep+0x163/0x2c0 [ 663.262527][T17747] __should_failslab+0x121/0x190 [ 663.267489][T17747] should_failslab+0x9/0x14 [ 663.272015][T17747] __kmalloc+0x2e0/0x770 [ 663.276410][T17747] ? kmem_cache_alloc_trace+0x397/0x790 [ 663.281974][T17747] ? alloc_pipe_info+0x1ee/0x4f0 [ 663.287066][T17747] alloc_pipe_info+0x1ee/0x4f0 [ 663.291859][T17747] splice_direct_to_actor+0x80e/0xa30 [ 663.297264][T17747] ? __inode_security_revalidate+0xf7/0x150 [ 663.303182][T17747] ? avc_policy_seqno+0xd/0x70 [ 663.307985][T17747] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 663.313847][T17747] ? generic_pipe_buf_nosteal+0x10/0x10 [ 663.319413][T17747] ? selinux_file_permission+0x9b/0x580 [ 663.324990][T17747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 663.331252][T17747] ? do_splice_to+0x180/0x180 [ 663.335946][T17747] ? rw_verify_area+0x126/0x360 [ 663.340820][T17747] do_splice_direct+0x1da/0x2a0 [ 663.345790][T17747] ? splice_direct_to_actor+0xa30/0xa30 [ 663.351372][T17747] ? rw_verify_area+0x126/0x360 [ 663.356251][T17747] do_sendfile+0x597/0xd00 [ 663.360698][T17747] ? do_compat_pwritev64+0x1c0/0x1c0 [ 663.366047][T17747] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 663.372318][T17747] ? _copy_from_user+0x12c/0x1a0 [ 663.377278][T17747] __x64_sys_sendfile64+0x15a/0x220 [ 663.382493][T17747] ? __ia32_sys_sendfile+0x230/0x230 [ 663.387801][T17747] ? do_syscall_64+0x26/0x790 [ 663.392614][T17747] ? lockdep_hardirqs_on+0x421/0x5e0 [ 663.398033][T17747] ? trace_hardirqs_on+0x67/0x240 [ 663.403182][T17747] do_syscall_64+0xfa/0x790 [ 663.407823][T17747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 663.413731][T17747] RIP: 0033:0x45aff9 [ 663.417667][T17747] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:07:30 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x1000000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 663.437290][T17747] RSP: 002b:00007ff0cfcffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 663.445942][T17747] RAX: ffffffffffffffda RBX: 00007ff0cfd006d4 RCX: 000000000045aff9 [ 663.453941][T17747] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 663.461929][T17747] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 663.469921][T17747] R10: 0000000100000001 R11: 0000000000000246 R12: 000000000000000a [ 663.477911][T17747] R13: 00000000000008a2 R14: 00000000004c9bce R15: 0000000000000001 [ 663.489228][T17749] ERROR: Out of memory at tomoyo_realpath_from_path. 05:07:30 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x800400, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:30 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0xe2980, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="235e3ff8773d8c09000000c0e80ae88e8950b00000000092eea554ad2800e0a35685c2e15e27bd2ad15a0a33b2fca671bb331875757af836135ccffd00922e66947991e35c230586ad64d2ff2aef817568e6761db4c4d73633bdcfbc6f6bd288aab89172aec20bf5cf170c3c986bc18e2dff0800fbb3603172c337a8d0e65f1b70c931", @ANYRES32=0x0], &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000440)={r3}, 0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@sack_info={r3, 0x7, 0x9}, 0xc) r4 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r6 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r9, 0x839}, 0x8) ftruncate(r8, 0x200004) sendfile(r7, r8, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r8, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x10, 0x2, 0x5, 0x0, 0x400, r6, 0x9, [], 0x0, r8, 0x3, 0x3}, 0x3c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) sendfile(r5, r4, 0x0, 0x100000001) 05:07:30 executing program 0 (fault-call:13 fault-nth:2): r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:30 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x1f00000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 663.825870][T17763] FAULT_INJECTION: forcing a failure. [ 663.825870][T17763] name fail_page_alloc, interval 1, probability 0, space 0, times 0 05:07:30 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) dup2(r5, r2) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) r6 = fanotify_init(0x40, 0x800) r7 = socket$inet6(0xa, 0x100000003, 0x3a) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x44000, 0x0) ioctl$SNDCTL_DSP_RESET(r8, 0x5000, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r6, r7, 0x0) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) dup3(r6, r10, 0x0) r12 = socket$inet6(0xa, 0x400000000001, 0x0) close(r12) r13 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r12, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r14, 0x839}, 0x8) ftruncate(r13, 0x200004) sendfile(r12, r13, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r13, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$USBDEVFS_GETDRIVER(r13, 0x41045508, &(0x7f0000000240)={0x3, "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"}) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:30 executing program 2 (fault-call:1 fault-nth:3): r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 663.918531][T17763] CPU: 0 PID: 17763 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 663.927351][T17763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.937639][T17763] Call Trace: [ 663.941219][T17763] dump_stack+0x197/0x210 [ 663.945579][T17763] should_fail.cold+0xa/0x15 [ 663.950296][T17763] ? fault_create_debugfs_attr+0x180/0x180 [ 663.956131][T17763] ? ___might_sleep+0x163/0x2c0 [ 663.961014][T17763] should_fail_alloc_page+0x50/0x60 [ 663.966242][T17763] __alloc_pages_nodemask+0x1a1/0x910 [ 663.971798][T17763] ? __alloc_pages_slowpath+0x2900/0x2900 [ 663.977647][T17763] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 663.983913][T17763] alloc_pages_current+0x107/0x210 [ 663.989063][T17763] __page_cache_alloc+0x29d/0x490 [ 663.994214][T17763] ? __lock_acquire+0x8a0/0x4a00 [ 663.999165][T17763] ? lock_downgrade+0x920/0x920 [ 664.004206][T17763] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 664.010654][T17763] __do_page_cache_readahead+0x1c9/0x5d0 [ 664.016361][T17763] ? read_pages+0x610/0x610 [ 664.020909][T17763] ondemand_readahead+0x55c/0xd30 [ 664.025964][T17763] page_cache_sync_readahead+0x27c/0x510 [ 664.031641][T17763] generic_file_read_iter+0x180f/0x2cf0 [ 664.037223][T17763] ? mark_lock+0xc2/0x1220 [ 664.041668][T17763] ? save_stack+0x23/0x90 [ 664.046025][T17763] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 664.051853][T17763] ? kasan_kmalloc+0x9/0x10 [ 664.056389][T17763] ? filemap_write_and_wait_range+0x1d0/0x1d0 [ 664.062477][T17763] ? __kasan_check_read+0x11/0x20 [ 664.067521][T17763] ? __lock_acquire+0x8a0/0x4a00 [ 664.072491][T17763] ? rcu_read_unlock+0x16/0x60 [ 664.077271][T17763] ? memcg_kmem_put_cache+0xad/0x1a0 [ 664.082593][T17763] ext4_file_read_iter+0x1db/0x640 [ 664.087744][T17763] generic_file_splice_read+0x4af/0x800 [ 664.093338][T17763] ? add_to_pipe+0x3b0/0x3b0 [ 664.097974][T17763] ? rw_verify_area+0x126/0x360 [ 664.102970][T17763] ? add_to_pipe+0x3b0/0x3b0 [ 664.107599][T17763] do_splice_to+0x127/0x180 [ 664.112135][T17763] splice_direct_to_actor+0x320/0xa30 [ 664.117650][T17763] ? generic_pipe_buf_nosteal+0x10/0x10 [ 664.123742][T17763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.129997][T17763] ? do_splice_to+0x180/0x180 [ 664.134709][T17763] ? rw_verify_area+0x126/0x360 [ 664.139601][T17763] do_splice_direct+0x1da/0x2a0 [ 664.144472][T17763] ? splice_direct_to_actor+0xa30/0xa30 [ 664.150187][T17763] ? rw_verify_area+0x126/0x360 [ 664.155055][T17763] do_sendfile+0x597/0xd00 [ 664.159504][T17763] ? do_compat_pwritev64+0x1c0/0x1c0 [ 664.164817][T17763] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 664.171092][T17763] ? _copy_from_user+0x12c/0x1a0 [ 664.176337][T17763] __x64_sys_sendfile64+0x15a/0x220 [ 664.181687][T17763] ? __ia32_sys_sendfile+0x230/0x230 [ 664.187105][T17763] ? do_syscall_64+0x26/0x790 [ 664.191812][T17763] ? lockdep_hardirqs_on+0x421/0x5e0 [ 664.197236][T17763] ? trace_hardirqs_on+0x67/0x240 [ 664.202329][T17763] do_syscall_64+0xfa/0x790 [ 664.207429][T17763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 664.213472][T17763] RIP: 0033:0x45aff9 [ 664.217379][T17763] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 664.237971][T17763] RSP: 002b:00007ff0cfcffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 664.246531][T17763] RAX: ffffffffffffffda RBX: 00007ff0cfd006d4 RCX: 000000000045aff9 [ 664.254527][T17763] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000004 05:07:31 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 664.262550][T17763] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 664.270545][T17763] R10: 0000000100000001 R11: 0000000000000246 R12: 000000000000000a [ 664.278565][T17763] R13: 00000000000008a2 R14: 00000000004c9bce R15: 0000000000000002 05:07:31 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f0000000080)={0x40000, 0x0, [0x2, 0x80, 0x7083f757, 0x0, 0x9, 0x6, 0x8, 0x101]}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x111006, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000000040)={0x20000009}) sendfile(r1, r0, 0x0, 0x100000001) 05:07:31 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x2000000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:31 executing program 0 (fault-call:13 fault-nth:3): r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:31 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:31 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 664.588717][T17785] FAULT_INJECTION: forcing a failure. [ 664.588717][T17785] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 664.656906][T17785] CPU: 0 PID: 17785 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 664.665870][T17785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 664.676223][T17785] Call Trace: [ 664.679619][T17785] dump_stack+0x197/0x210 [ 664.684091][T17785] should_fail.cold+0xa/0x15 [ 664.688722][T17785] ? fault_create_debugfs_attr+0x180/0x180 [ 664.694989][T17785] ? ___might_sleep+0x163/0x2c0 [ 664.699914][T17785] should_fail_alloc_page+0x50/0x60 05:07:31 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x2010000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:31 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r5, 0x8904, 0x0) fcntl$setstatus(r5, 0x4, 0x2000) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendfile(r1, r0, 0x0, 0x100000001) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f00000001c0)=0x1, 0x4) 05:07:31 executing program 0 (fault-call:13 fault-nth:4): r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 664.705195][T17785] __alloc_pages_nodemask+0x1a1/0x910 [ 664.705218][T17785] ? __alloc_pages_slowpath+0x2900/0x2900 [ 664.705249][T17785] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 664.705272][T17785] alloc_pages_current+0x107/0x210 05:07:31 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x3000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 664.705296][T17785] __page_cache_alloc+0x29d/0x490 [ 664.705310][T17785] ? __lock_acquire+0x8a0/0x4a00 05:07:32 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r9, 0x839}, 0x8) ftruncate(r8, 0x200004) sendfile(r7, r8, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r8, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$bt_BT_FLUSHABLE(r8, 0x112, 0x8, &(0x7f0000000180)=0x4, &(0x7f00000001c0)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r10, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000040)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:32 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) 05:07:32 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x2300000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:32 executing program 0 (fault-call:13 fault-nth:5): r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 664.705323][T17785] ? lock_downgrade+0x920/0x920 [ 664.705340][T17785] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 664.705361][T17785] __do_page_cache_readahead+0x1c9/0x5d0 [ 664.705385][T17785] ? read_pages+0x610/0x610 [ 664.705412][T17785] ondemand_readahead+0x55c/0xd30 [ 664.705438][T17785] page_cache_sync_readahead+0x27c/0x510 [ 664.705461][T17785] generic_file_read_iter+0x180f/0x2cf0 [ 664.705476][T17785] ? mark_lock+0xc2/0x1220 [ 664.705500][T17785] ? save_stack+0x23/0x90 [ 664.705515][T17785] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 05:07:32 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1, 0x40) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000080)={0x0, {0xfffffe01, 0x40}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) socketpair(0xa, 0x1, 0xb1, &(0x7f0000000000)) [ 664.705528][T17785] ? kasan_kmalloc+0x9/0x10 [ 664.705553][T17785] ? filemap_write_and_wait_range+0x1d0/0x1d0 [ 664.705568][T17785] ? __kasan_check_read+0x11/0x20 [ 664.705583][T17785] ? __lock_acquire+0x8a0/0x4a00 [ 664.705604][T17785] ? rcu_read_unlock+0x16/0x60 [ 664.705620][T17785] ? memcg_kmem_put_cache+0xad/0x1a0 [ 664.705648][T17785] ext4_file_read_iter+0x1db/0x640 [ 664.705669][T17785] generic_file_splice_read+0x4af/0x800 [ 664.705686][T17785] ? add_to_pipe+0x3b0/0x3b0 [ 664.705713][T17785] ? rw_verify_area+0x126/0x360 [ 664.705723][T17785] ? add_to_pipe+0x3b0/0x3b0 [ 664.705737][T17785] do_splice_to+0x127/0x180 [ 664.705755][T17785] splice_direct_to_actor+0x320/0xa30 [ 664.705770][T17785] ? generic_pipe_buf_nosteal+0x10/0x10 [ 664.705790][T17785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.705802][T17785] ? do_splice_to+0x180/0x180 [ 664.705819][T17785] ? rw_verify_area+0x126/0x360 [ 664.705836][T17785] do_splice_direct+0x1da/0x2a0 [ 664.705850][T17785] ? splice_direct_to_actor+0xa30/0xa30 [ 664.705870][T17785] ? rw_verify_area+0x126/0x360 [ 664.705887][T17785] do_sendfile+0x597/0xd00 [ 664.705909][T17785] ? do_compat_pwritev64+0x1c0/0x1c0 [ 664.705928][T17785] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 664.705945][T17785] ? _copy_from_user+0x12c/0x1a0 [ 664.706000][T17785] __x64_sys_sendfile64+0x15a/0x220 [ 664.706019][T17785] ? __ia32_sys_sendfile+0x230/0x230 [ 664.706038][T17785] ? do_syscall_64+0x26/0x790 [ 664.706053][T17785] ? lockdep_hardirqs_on+0x421/0x5e0 [ 664.706073][T17785] ? trace_hardirqs_on+0x67/0x240 [ 664.706095][T17785] do_syscall_64+0xfa/0x790 [ 664.706118][T17785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 664.706130][T17785] RIP: 0033:0x45aff9 [ 664.706147][T17785] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 664.706155][T17785] RSP: 002b:00007ff0cfcffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 664.706168][T17785] RAX: ffffffffffffffda RBX: 00007ff0cfd006d4 RCX: 000000000045aff9 [ 664.706175][T17785] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 664.706183][T17785] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 664.706191][T17785] R10: 0000000100000001 R11: 0000000000000246 R12: 000000000000000a [ 664.706198][T17785] R13: 00000000000008a2 R14: 00000000004c9bce R15: 0000000000000003 [ 665.008977][T17807] FAULT_INJECTION: forcing a failure. [ 665.008977][T17807] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 665.008997][T17807] CPU: 0 PID: 17807 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 665.009007][T17807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.009013][T17807] Call Trace: [ 665.009037][T17807] dump_stack+0x197/0x210 [ 665.009059][T17807] should_fail.cold+0xa/0x15 [ 665.009079][T17807] ? fault_create_debugfs_attr+0x180/0x180 [ 665.009096][T17807] ? ___might_sleep+0x163/0x2c0 [ 665.009122][T17807] should_fail_alloc_page+0x50/0x60 [ 665.009137][T17807] __alloc_pages_nodemask+0x1a1/0x910 [ 665.009157][T17807] ? __alloc_pages_slowpath+0x2900/0x2900 [ 665.009186][T17807] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 665.009206][T17807] alloc_pages_current+0x107/0x210 [ 665.009228][T17807] __page_cache_alloc+0x29d/0x490 [ 665.009241][T17807] ? __lock_acquire+0x8a0/0x4a00 [ 665.009254][T17807] ? lock_downgrade+0x920/0x920 [ 665.009271][T17807] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 665.009292][T17807] __do_page_cache_readahead+0x1c9/0x5d0 [ 665.009315][T17807] ? read_pages+0x610/0x610 [ 665.009342][T17807] ondemand_readahead+0x55c/0xd30 [ 665.009367][T17807] page_cache_sync_readahead+0x27c/0x510 [ 665.009392][T17807] generic_file_read_iter+0x180f/0x2cf0 [ 665.009408][T17807] ? mark_lock+0xc2/0x1220 [ 665.009432][T17807] ? save_stack+0x23/0x90 [ 665.009454][T17807] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 665.009467][T17807] ? kasan_kmalloc+0x9/0x10 [ 665.009493][T17807] ? filemap_write_and_wait_range+0x1d0/0x1d0 [ 665.009507][T17807] ? __kasan_check_read+0x11/0x20 [ 665.009520][T17807] ? __lock_acquire+0x8a0/0x4a00 [ 665.009533][T17807] ? __lock_acquire+0x16f2/0x4a00 [ 665.009563][T17807] ? rcu_read_unlock+0x16/0x60 [ 665.009579][T17807] ? memcg_kmem_put_cache+0xad/0x1a0 [ 665.009606][T17807] ext4_file_read_iter+0x1db/0x640 [ 665.009625][T17807] generic_file_splice_read+0x4af/0x800 [ 665.009642][T17807] ? add_to_pipe+0x3b0/0x3b0 [ 665.009670][T17807] ? rw_verify_area+0x126/0x360 [ 665.009683][T17807] ? add_to_pipe+0x3b0/0x3b0 [ 665.009699][T17807] do_splice_to+0x127/0x180 [ 665.009719][T17807] splice_direct_to_actor+0x320/0xa30 [ 665.009738][T17807] ? generic_pipe_buf_nosteal+0x10/0x10 [ 665.009761][T17807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.009774][T17807] ? do_splice_to+0x180/0x180 [ 665.009794][T17807] ? rw_verify_area+0x126/0x360 [ 665.009812][T17807] do_splice_direct+0x1da/0x2a0 [ 665.009828][T17807] ? splice_direct_to_actor+0xa30/0xa30 [ 665.009849][T17807] ? rw_verify_area+0x126/0x360 [ 665.009866][T17807] do_sendfile+0x597/0xd00 [ 665.009889][T17807] ? do_compat_pwritev64+0x1c0/0x1c0 [ 665.009913][T17807] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 665.009930][T17807] ? _copy_from_user+0x12c/0x1a0 [ 665.009951][T17807] __x64_sys_sendfile64+0x15a/0x220 [ 665.009970][T17807] ? __ia32_sys_sendfile+0x230/0x230 [ 665.009988][T17807] ? do_syscall_64+0x26/0x790 [ 665.010003][T17807] ? lockdep_hardirqs_on+0x421/0x5e0 [ 665.010022][T17807] ? trace_hardirqs_on+0x67/0x240 [ 665.010044][T17807] do_syscall_64+0xfa/0x790 [ 665.010065][T17807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 665.010078][T17807] RIP: 0033:0x45aff9 [ 665.010096][T17807] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 665.010105][T17807] RSP: 002b:00007ff0cfcffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 665.010121][T17807] RAX: ffffffffffffffda RBX: 00007ff0cfd006d4 RCX: 000000000045aff9 [ 665.010130][T17807] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 665.010140][T17807] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 665.010149][T17807] R10: 0000000100000001 R11: 0000000000000246 R12: 000000000000000a [ 665.010158][T17807] R13: 00000000000008a2 R14: 00000000004c9bce R15: 0000000000000004 [ 665.359584][T17818] FAULT_INJECTION: forcing a failure. [ 665.359584][T17818] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 665.359606][T17818] CPU: 0 PID: 17818 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 665.359617][T17818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.359622][T17818] Call Trace: [ 665.359644][T17818] dump_stack+0x197/0x210 [ 665.359667][T17818] should_fail.cold+0xa/0x15 [ 665.359688][T17818] ? fault_create_debugfs_attr+0x180/0x180 [ 665.359705][T17818] ? ___might_sleep+0x163/0x2c0 [ 665.359731][T17818] should_fail_alloc_page+0x50/0x60 [ 665.359744][T17818] __alloc_pages_nodemask+0x1a1/0x910 [ 665.359762][T17818] ? __alloc_pages_slowpath+0x2900/0x2900 [ 665.359790][T17818] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 665.359808][T17818] alloc_pages_current+0x107/0x210 [ 665.359829][T17818] __page_cache_alloc+0x29d/0x490 [ 665.359843][T17818] ? __lock_acquire+0x8a0/0x4a00 [ 665.359855][T17818] ? lock_downgrade+0x920/0x920 [ 665.359871][T17818] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 665.359890][T17818] __do_page_cache_readahead+0x1c9/0x5d0 [ 665.359912][T17818] ? read_pages+0x610/0x610 [ 665.359934][T17818] ondemand_readahead+0x55c/0xd30 [ 665.359965][T17818] page_cache_sync_readahead+0x27c/0x510 [ 665.359989][T17818] generic_file_read_iter+0x180f/0x2cf0 [ 665.360005][T17818] ? mark_lock+0xc2/0x1220 [ 665.360028][T17818] ? save_stack+0x23/0x90 [ 665.360044][T17818] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 665.360057][T17818] ? kasan_kmalloc+0x9/0x10 [ 665.360080][T17818] ? filemap_write_and_wait_range+0x1d0/0x1d0 [ 665.360094][T17818] ? __kasan_check_read+0x11/0x20 [ 665.360108][T17818] ? __lock_acquire+0x8a0/0x4a00 [ 665.360129][T17818] ? rcu_read_unlock+0x16/0x60 [ 665.360145][T17818] ? memcg_kmem_put_cache+0xad/0x1a0 [ 665.360173][T17818] ext4_file_read_iter+0x1db/0x640 [ 665.360193][T17818] generic_file_splice_read+0x4af/0x800 [ 665.360210][T17818] ? add_to_pipe+0x3b0/0x3b0 [ 665.360237][T17818] ? rw_verify_area+0x126/0x360 [ 665.360256][T17818] ? add_to_pipe+0x3b0/0x3b0 [ 665.360270][T17818] do_splice_to+0x127/0x180 [ 665.360288][T17818] splice_direct_to_actor+0x320/0xa30 [ 665.360307][T17818] ? generic_pipe_buf_nosteal+0x10/0x10 [ 665.360329][T17818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.360343][T17818] ? do_splice_to+0x180/0x180 [ 665.360361][T17818] ? rw_verify_area+0x126/0x360 [ 665.360379][T17818] do_splice_direct+0x1da/0x2a0 [ 665.360396][T17818] ? splice_direct_to_actor+0xa30/0xa30 [ 665.360428][T17818] ? rw_verify_area+0x126/0x360 [ 665.360446][T17818] do_sendfile+0x597/0xd00 [ 665.360470][T17818] ? do_compat_pwritev64+0x1c0/0x1c0 [ 665.360490][T17818] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 665.360506][T17818] ? _copy_from_user+0x12c/0x1a0 [ 665.360523][T17818] __x64_sys_sendfile64+0x15a/0x220 [ 665.360539][T17818] ? __ia32_sys_sendfile+0x230/0x230 [ 665.360556][T17818] ? do_syscall_64+0x26/0x790 [ 665.360570][T17818] ? lockdep_hardirqs_on+0x421/0x5e0 [ 665.360585][T17818] ? trace_hardirqs_on+0x67/0x240 [ 665.360606][T17818] do_syscall_64+0xfa/0x790 [ 666.262426][T17818] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 666.262440][T17818] RIP: 0033:0x45aff9 [ 666.262456][T17818] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 666.262471][T17818] RSP: 002b:00007ff0cfcffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 666.262484][T17818] RAX: ffffffffffffffda RBX: 00007ff0cfd006d4 RCX: 000000000045aff9 [ 666.262493][T17818] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 666.317199][T17818] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 666.325194][T17818] R10: 0000000100000001 R11: 0000000000000246 R12: 000000000000000a 05:07:32 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 666.333183][T17818] R13: 00000000000008a2 R14: 00000000004c9bce R15: 0000000000000005 [ 666.393414][ T26] audit: type=1800 audit(1579324053.222:156): pid=17825 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=17585 res=0 05:07:33 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x4000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:33 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000)=0xfff, 0x3) migrate_pages(0x0, 0x8, &(0x7f00000001c0)=0x400, &(0x7f0000000240)=0x401) r5 = fanotify_init(0x40, 0x800) r6 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r5, r6, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x8, 0x4, 0x35, 0x2, 0xd94}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000140)={r7, 0x80000001}, &(0x7f0000000180)=0x8) 05:07:33 executing program 0 (fault-call:13 fault-nth:6): r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:33 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:33 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 666.680163][T17839] FAULT_INJECTION: forcing a failure. [ 666.680163][T17839] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 666.711437][T17839] CPU: 0 PID: 17839 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 666.720424][T17839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 666.730666][T17839] Call Trace: [ 666.733981][T17839] dump_stack+0x197/0x210 [ 666.738342][T17839] should_fail.cold+0xa/0x15 [ 666.742967][T17839] ? fault_create_debugfs_attr+0x180/0x180 [ 666.748790][T17839] ? ___might_sleep+0x163/0x2c0 [ 666.753667][T17839] should_fail_alloc_page+0x50/0x60 [ 666.758894][T17839] __alloc_pages_nodemask+0x1a1/0x910 [ 666.764291][T17839] ? __alloc_pages_slowpath+0x2900/0x2900 [ 666.770043][T17839] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 666.776408][T17839] alloc_pages_current+0x107/0x210 [ 666.781540][T17839] __page_cache_alloc+0x29d/0x490 [ 666.786596][T17839] ? __lock_acquire+0x8a0/0x4a00 [ 666.791667][T17839] ? lock_downgrade+0x920/0x920 [ 666.796532][T17839] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 666.802795][T17839] __do_page_cache_readahead+0x1c9/0x5d0 [ 666.808453][T17839] ? read_pages+0x610/0x610 [ 666.812983][T17839] ondemand_readahead+0x55c/0xd30 [ 666.818228][T17839] page_cache_sync_readahead+0x27c/0x510 [ 666.823979][T17839] generic_file_read_iter+0x180f/0x2cf0 [ 666.829596][T17839] ? mark_lock+0xc2/0x1220 [ 666.834167][T17839] ? save_stack+0x23/0x90 [ 666.838508][T17839] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 666.844357][T17839] ? kasan_kmalloc+0x9/0x10 [ 666.849789][T17839] ? filemap_write_and_wait_range+0x1d0/0x1d0 [ 666.855871][T17839] ? __kasan_check_read+0x11/0x20 [ 666.860915][T17839] ? __lock_acquire+0x8a0/0x4a00 [ 666.865887][T17839] ? rcu_read_unlock+0x16/0x60 [ 666.870674][T17839] ? memcg_kmem_put_cache+0xad/0x1a0 [ 666.876097][T17839] ext4_file_read_iter+0x1db/0x640 [ 666.881229][T17839] generic_file_splice_read+0x4af/0x800 [ 666.886882][T17839] ? add_to_pipe+0x3b0/0x3b0 [ 666.891512][T17839] ? rw_verify_area+0x126/0x360 [ 666.896393][T17839] ? add_to_pipe+0x3b0/0x3b0 [ 666.901004][T17839] do_splice_to+0x127/0x180 [ 666.905527][T17839] splice_direct_to_actor+0x320/0xa30 [ 666.910918][T17839] ? generic_pipe_buf_nosteal+0x10/0x10 [ 666.916587][T17839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 666.922848][T17839] ? do_splice_to+0x180/0x180 [ 666.927546][T17839] ? rw_verify_area+0x126/0x360 [ 666.932588][T17839] do_splice_direct+0x1da/0x2a0 [ 666.937458][T17839] ? splice_direct_to_actor+0xa30/0xa30 [ 666.943060][T17839] ? rw_verify_area+0x126/0x360 [ 666.947934][T17839] do_sendfile+0x597/0xd00 [ 666.952436][T17839] ? do_compat_pwritev64+0x1c0/0x1c0 [ 666.957774][T17839] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 666.964040][T17839] ? _copy_from_user+0x12c/0x1a0 [ 666.969228][T17839] __x64_sys_sendfile64+0x15a/0x220 [ 666.974624][T17839] ? __ia32_sys_sendfile+0x230/0x230 [ 666.979932][T17839] ? do_syscall_64+0x26/0x790 [ 666.984631][T17839] ? lockdep_hardirqs_on+0x421/0x5e0 [ 666.990033][T17839] ? trace_hardirqs_on+0x67/0x240 [ 666.995084][T17839] do_syscall_64+0xfa/0x790 [ 666.999714][T17839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 667.005626][T17839] RIP: 0033:0x45aff9 [ 667.009569][T17839] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:07:33 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0xc000, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = fanotify_init(0x40, 0x800) r7 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r6, r7, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x0, 0x7, [0x4, 0x100, 0x9, 0x100, 0xa40b, 0x5, 0xfff]}, &(0x7f0000000240)=0x16) getsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000280)={r8, 0x2}, &(0x7f00000002c0)=0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000a00000/0x600000)=nil, &(0x7f0000bcc000/0x2000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000def000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000a6e000/0x4000)=nil, &(0x7f0000a2d000/0x3000)=nil, &(0x7f0000a39000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000000)="ec8913167563fefe4f74b8ccc3a4dc624ad9c7f9904d6ac134ac1d4d07cb2b57724661d73632e3b47397c4961367b65018300fe1d2cd58979584a15ae86aa6fcd447c14c302934a96a7e3f4b55375c419bced5f49d6619bd3ac489b8cb5131f431ced96088e3486f895abbca6ec3910422116567a9399e0634f2b907ae63cc052fba8f4f413564f4a4a3ea5fede9e138cd6f81c7bcef77353d9faa07fab05a686f50d552f0", 0xa5, r5}, 0x68) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r10, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r9, 0x8904, 0x0) getsockopt$IP_SET_OP_VERSION(r9, 0x1, 0x53, &(0x7f0000000300), &(0x7f0000000340)=0x8) sendfile(r1, r0, 0x0, 0x100000001) 05:07:33 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x2289, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 667.029428][T17839] RSP: 002b:00007ff0cfcffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 667.037877][T17839] RAX: ffffffffffffffda RBX: 00007ff0cfd006d4 RCX: 000000000045aff9 [ 667.045863][T17839] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 667.053850][T17839] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 667.061847][T17839] R10: 0000000100000001 R11: 0000000000000246 R12: 000000000000000a [ 667.069940][T17839] R13: 00000000000008a2 R14: 00000000004c9bce R15: 0000000000000006 05:07:34 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = fanotify_init(0x40, 0x800) r6 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r5, r6, 0x0) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f0000000440)={r9}, 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r9, @in={{0x2, 0x4e21, @multicast2}}, 0xfffffff7, 0x9, 0xef07, 0x2, 0x1e, 0x2}, &(0x7f0000000040)=0x9c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r6, 0x84, 0x78, &(0x7f00000000c0)=r10, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r13, 0x839}, 0x8) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r12, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) write$evdev(r12, &(0x7f0000000240)=[{{}, 0x1, 0x74, 0x2}, {{0x77359400}, 0x5, 0x3f, 0x1}], 0x30) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:34 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x3b70, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:34 executing program 0 (fault-call:13 fault-nth:7): r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:34 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x4000000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:34 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x5000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:34 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4600, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 667.407750][T17862] FAULT_INJECTION: forcing a failure. [ 667.407750][T17862] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 667.463739][T17862] CPU: 1 PID: 17862 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 667.472580][T17862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 667.482742][T17862] Call Trace: [ 667.486203][T17862] dump_stack+0x197/0x210 [ 667.490569][T17862] should_fail.cold+0xa/0x15 [ 667.495193][T17862] ? fault_create_debugfs_attr+0x180/0x180 [ 667.501022][T17862] ? ___might_sleep+0x163/0x2c0 [ 667.505910][T17862] should_fail_alloc_page+0x50/0x60 [ 667.511298][T17862] __alloc_pages_nodemask+0x1a1/0x910 [ 667.516716][T17862] ? __alloc_pages_slowpath+0x2900/0x2900 [ 667.522482][T17862] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 667.528758][T17862] alloc_pages_current+0x107/0x210 [ 667.534079][T17862] __page_cache_alloc+0x29d/0x490 [ 667.539132][T17862] ? __lock_acquire+0x8a0/0x4a00 [ 667.544087][T17862] ? lock_downgrade+0x920/0x920 [ 667.548960][T17862] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 667.555392][T17862] __do_page_cache_readahead+0x1c9/0x5d0 [ 667.561064][T17862] ? read_pages+0x610/0x610 [ 667.565610][T17862] ondemand_readahead+0x55c/0xd30 [ 667.570787][T17862] page_cache_sync_readahead+0x27c/0x510 [ 667.576444][T17862] generic_file_read_iter+0x180f/0x2cf0 [ 667.582259][T17862] ? mark_lock+0xc2/0x1220 [ 667.586733][T17862] ? save_stack+0x23/0x90 [ 667.591308][T17862] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 667.597141][T17862] ? kasan_kmalloc+0x9/0x10 [ 667.601866][T17862] ? filemap_write_and_wait_range+0x1d0/0x1d0 [ 667.607963][T17862] ? __kasan_check_read+0x11/0x20 [ 667.613010][T17862] ? __lock_acquire+0x8a0/0x4a00 [ 667.617967][T17862] ? __lock_acquire+0x16f2/0x4a00 [ 667.623014][T17862] ? rcu_read_unlock+0x16/0x60 [ 667.627799][T17862] ? memcg_kmem_put_cache+0xad/0x1a0 [ 667.633243][T17862] ext4_file_read_iter+0x1db/0x640 [ 667.638377][T17862] generic_file_splice_read+0x4af/0x800 [ 667.645268][T17862] ? add_to_pipe+0x3b0/0x3b0 [ 667.649894][T17862] ? rw_verify_area+0x126/0x360 [ 667.654770][T17862] ? add_to_pipe+0x3b0/0x3b0 [ 667.659390][T17862] do_splice_to+0x127/0x180 [ 667.664046][T17862] splice_direct_to_actor+0x320/0xa30 [ 667.669442][T17862] ? generic_pipe_buf_nosteal+0x10/0x10 [ 667.675030][T17862] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 667.681448][T17862] ? do_splice_to+0x180/0x180 [ 667.686158][T17862] ? rw_verify_area+0x126/0x360 [ 667.691028][T17862] do_splice_direct+0x1da/0x2a0 [ 667.695912][T17862] ? splice_direct_to_actor+0xa30/0xa30 [ 667.701485][T17862] ? rw_verify_area+0x126/0x360 [ 667.706365][T17862] do_sendfile+0x597/0xd00 [ 667.710823][T17862] ? do_compat_pwritev64+0x1c0/0x1c0 [ 667.716141][T17862] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 667.722400][T17862] ? _copy_from_user+0x12c/0x1a0 [ 667.727444][T17862] __x64_sys_sendfile64+0x15a/0x220 [ 667.732816][T17862] ? __ia32_sys_sendfile+0x230/0x230 [ 667.738152][T17862] ? do_syscall_64+0x26/0x790 [ 667.743008][T17862] ? lockdep_hardirqs_on+0x421/0x5e0 [ 667.748322][T17862] ? trace_hardirqs_on+0x67/0x240 [ 667.753372][T17862] do_syscall_64+0xfa/0x790 [ 667.757901][T17862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 667.763810][T17862] RIP: 0033:0x45aff9 [ 667.767745][T17862] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 667.787455][T17862] RSP: 002b:00007ff0cfcffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 667.795879][T17862] RAX: ffffffffffffffda RBX: 00007ff0cfd006d4 RCX: 000000000045aff9 [ 667.803994][T17862] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 667.811985][T17862] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 667.820093][T17862] R10: 0000000100000001 R11: 0000000000000246 R12: 000000000000000a [ 667.828086][T17862] R13: 00000000000008a2 R14: 00000000004c9bce R15: 0000000000000007 05:07:34 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x4800000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:34 executing program 5: creat(&(0x7f0000000040)='.\x00', 0x2) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/211) r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000000)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fanotify_init(0x40, 0x800) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000040), 0xc) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f00000001c0)) dup3(r4, 0xffffffffffffffff, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(r3, 0x0, r2) sendfile(r1, r0, 0x0, 0x100000001) 05:07:34 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:34 executing program 0 (fault-call:13 fault-nth:8): r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:34 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x6000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:35 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3f, 0x0) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:35 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4603, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:35 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x4c00000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 668.219737][T17886] FAULT_INJECTION: forcing a failure. [ 668.219737][T17886] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 668.273993][T17886] CPU: 1 PID: 17886 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 668.283044][T17886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 668.293120][T17886] Call Trace: [ 668.296445][T17886] dump_stack+0x197/0x210 [ 668.300810][T17886] should_fail.cold+0xa/0x15 [ 668.305434][T17886] ? fault_create_debugfs_attr+0x180/0x180 [ 668.311358][T17886] ? ___might_sleep+0x163/0x2c0 [ 668.316250][T17886] should_fail_alloc_page+0x50/0x60 [ 668.321465][T17886] __alloc_pages_nodemask+0x1a1/0x910 [ 668.326869][T17886] ? __alloc_pages_slowpath+0x2900/0x2900 [ 668.332870][T17886] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 668.339141][T17886] alloc_pages_current+0x107/0x210 [ 668.344400][T17886] __page_cache_alloc+0x29d/0x490 [ 668.349435][T17886] ? __lock_acquire+0x8a0/0x4a00 [ 668.354399][T17886] ? lock_downgrade+0x920/0x920 [ 668.359279][T17886] __do_page_cache_readahead+0x1c9/0x5d0 [ 668.364940][T17886] ? read_pages+0x610/0x610 [ 668.369470][T17886] ondemand_readahead+0x55c/0xd30 [ 668.374520][T17886] page_cache_sync_readahead+0x27c/0x510 [ 668.380183][T17886] generic_file_read_iter+0x180f/0x2cf0 [ 668.385758][T17886] ? mark_lock+0xc2/0x1220 [ 668.390208][T17886] ? save_stack+0x23/0x90 [ 668.394602][T17886] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 668.400446][T17886] ? kasan_kmalloc+0x9/0x10 [ 668.404987][T17886] ? filemap_write_and_wait_range+0x1d0/0x1d0 [ 668.411201][T17886] ? __kasan_check_read+0x11/0x20 [ 668.416429][T17886] ? __lock_acquire+0x8a0/0x4a00 [ 668.421598][T17886] ? rcu_read_unlock+0x16/0x60 [ 668.426389][T17886] ? memcg_kmem_put_cache+0xad/0x1a0 [ 668.432148][T17886] ext4_file_read_iter+0x1db/0x640 [ 668.437303][T17886] generic_file_splice_read+0x4af/0x800 [ 668.442967][T17886] ? add_to_pipe+0x3b0/0x3b0 [ 668.449648][T17886] ? rw_verify_area+0x126/0x360 [ 668.455120][T17886] ? add_to_pipe+0x3b0/0x3b0 [ 668.459881][T17886] do_splice_to+0x127/0x180 [ 668.464965][T17886] splice_direct_to_actor+0x320/0xa30 [ 668.470358][T17886] ? generic_pipe_buf_nosteal+0x10/0x10 [ 668.476319][T17886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.482588][T17886] ? do_splice_to+0x180/0x180 [ 668.487301][T17886] ? rw_verify_area+0x126/0x360 [ 668.492175][T17886] do_splice_direct+0x1da/0x2a0 [ 668.497066][T17886] ? splice_direct_to_actor+0xa30/0xa30 [ 668.502778][T17886] ? rw_verify_area+0x126/0x360 [ 668.507687][T17886] do_sendfile+0x597/0xd00 [ 668.512140][T17886] ? do_compat_pwritev64+0x1c0/0x1c0 [ 668.517587][T17886] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 668.523867][T17886] ? _copy_from_user+0x12c/0x1a0 [ 668.528837][T17886] __x64_sys_sendfile64+0x15a/0x220 [ 668.534070][T17886] ? __ia32_sys_sendfile+0x230/0x230 [ 668.539378][T17886] ? do_syscall_64+0x26/0x790 [ 668.544079][T17886] ? lockdep_hardirqs_on+0x421/0x5e0 [ 668.549473][T17886] ? trace_hardirqs_on+0x67/0x240 [ 668.554704][T17886] do_syscall_64+0xfa/0x790 [ 668.559237][T17886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 668.565344][T17886] RIP: 0033:0x45aff9 [ 668.569252][T17886] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 668.588870][T17886] RSP: 002b:00007ff0cfcffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 668.597505][T17886] RAX: ffffffffffffffda RBX: 00007ff0cfd006d4 RCX: 000000000045aff9 [ 668.605512][T17886] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 668.613501][T17886] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 05:07:35 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) [ 668.621494][T17886] R10: 0000000100000001 R11: 0000000000000246 R12: 000000000000000a [ 668.629477][T17886] R13: 00000000000008a2 R14: 00000000004c9bce R15: 0000000000000008 05:07:35 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x7000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:35 executing program 0 (fault-call:13 fault-nth:9): r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:35 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4604, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:35 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x4}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:35 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x6800000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:35 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file1\x00', 0xffffffffffff18d1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) sendfile(r1, r0, 0x0, 0x100000001) [ 668.991024][T17912] FAULT_INJECTION: forcing a failure. [ 668.991024][T17912] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 669.005002][T17912] CPU: 1 PID: 17912 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 669.013798][T17912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.023873][T17912] Call Trace: [ 669.027209][T17912] dump_stack+0x197/0x210 [ 669.031560][T17912] should_fail.cold+0xa/0x15 [ 669.036337][T17912] ? fault_create_debugfs_attr+0x180/0x180 [ 669.042155][T17912] ? ___might_sleep+0x163/0x2c0 [ 669.047049][T17912] should_fail_alloc_page+0x50/0x60 [ 669.052387][T17912] __alloc_pages_nodemask+0x1a1/0x910 [ 669.057803][T17912] ? __alloc_pages_slowpath+0x2900/0x2900 [ 669.063557][T17912] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 669.069830][T17912] alloc_pages_current+0x107/0x210 [ 669.075224][T17912] __page_cache_alloc+0x29d/0x490 [ 669.080404][T17912] ? __lock_acquire+0x8a0/0x4a00 [ 669.085364][T17912] ? lock_downgrade+0x920/0x920 [ 669.090226][T17912] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 669.096488][T17912] __do_page_cache_readahead+0x1c9/0x5d0 [ 669.102286][T17912] ? read_pages+0x610/0x610 [ 669.106829][T17912] ondemand_readahead+0x55c/0xd30 [ 669.111887][T17912] page_cache_sync_readahead+0x27c/0x510 [ 669.117554][T17912] generic_file_read_iter+0x180f/0x2cf0 [ 669.123140][T17912] ? save_stack+0x23/0x90 [ 669.127491][T17912] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 669.133491][T17912] ? kasan_kmalloc+0x9/0x10 [ 669.138033][T17912] ? filemap_write_and_wait_range+0x1d0/0x1d0 [ 669.144240][T17912] ? __kasan_check_read+0x11/0x20 [ 669.149283][T17912] ? __lock_acquire+0x8a0/0x4a00 [ 669.154342][T17912] ? cache_grow_end+0xa4/0x190 [ 669.159145][T17912] ? memcg_kmem_put_cache+0xad/0x1a0 [ 669.164453][T17912] ext4_file_read_iter+0x1db/0x640 [ 669.169591][T17912] generic_file_splice_read+0x4af/0x800 [ 669.175163][T17912] ? add_to_pipe+0x3b0/0x3b0 [ 669.179870][T17912] ? rw_verify_area+0x126/0x360 [ 669.184748][T17912] ? add_to_pipe+0x3b0/0x3b0 [ 669.189371][T17912] do_splice_to+0x127/0x180 [ 669.194637][T17912] splice_direct_to_actor+0x320/0xa30 [ 669.200032][T17912] ? generic_pipe_buf_nosteal+0x10/0x10 [ 669.205605][T17912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 669.211876][T17912] ? do_splice_to+0x180/0x180 [ 669.216595][T17912] ? rw_verify_area+0x126/0x360 [ 669.221474][T17912] do_splice_direct+0x1da/0x2a0 [ 669.226367][T17912] ? splice_direct_to_actor+0xa30/0xa30 [ 669.231961][T17912] ? rw_verify_area+0x126/0x360 [ 669.236846][T17912] do_sendfile+0x597/0xd00 [ 669.241296][T17912] ? do_compat_pwritev64+0x1c0/0x1c0 [ 669.246617][T17912] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 669.252880][T17912] ? _copy_from_user+0x12c/0x1a0 [ 669.257862][T17912] __x64_sys_sendfile64+0x15a/0x220 [ 669.263111][T17912] ? __ia32_sys_sendfile+0x230/0x230 [ 669.268415][T17912] ? do_syscall_64+0x26/0x790 [ 669.273115][T17912] ? lockdep_hardirqs_on+0x421/0x5e0 [ 669.278420][T17912] ? trace_hardirqs_on+0x67/0x240 [ 669.283591][T17912] do_syscall_64+0xfa/0x790 [ 669.288134][T17912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 669.294742][T17912] RIP: 0033:0x45aff9 [ 669.298661][T17912] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 669.318395][T17912] RSP: 002b:00007ff0cfcffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 669.326831][T17912] RAX: ffffffffffffffda RBX: 00007ff0cfd006d4 RCX: 000000000045aff9 [ 669.334918][T17912] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000004 05:07:36 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4605, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 669.342907][T17912] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 669.350894][T17912] R10: 0000000100000001 R11: 0000000000000246 R12: 000000000000000a [ 669.358994][T17912] R13: 00000000000008a2 R14: 00000000004c9bce R15: 0000000000000009 05:07:36 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x8000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:36 executing program 0 (fault-call:13 fault-nth:10): r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:36 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x800, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x6dbf57c862df236a, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) 05:07:36 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x18, 0x74, 0x2}], 0x18) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r5, 0x8904, 0x0) r8 = socket$inet6(0xa, 0x400000000001, 0x0) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r13, 0x839}, 0x8) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) r14 = socket$inet6(0xa, 0x400000000001, 0x0) close(r14) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r14, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r16, 0x839}, 0x8) ftruncate(r15, 0x200004) sendfile(r14, r15, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r15, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r15, 0x84, 0x1d, &(0x7f0000000240)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r12, 0x84, 0x18, &(0x7f0000000000)={r17, 0x8}, &(0x7f0000000040)=0x8) r18 = socket$inet6(0xa, 0x400000000001, 0x0) close(r18) r19 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r18, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r20, 0x839}, 0x8) ftruncate(r19, 0x200004) sendfile(r18, r19, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r19, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r19, 0x84, 0xa, &(0x7f00000000c0)={0x2, 0xa, 0x8000, 0x8, 0xffffffff, 0x3ed, 0x7ffe, 0x8, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r21, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000180)={0x0, 0x0, [0x1a9c, 0xfffffffffffffffb, 0x7f, 0x5]}) close(r8) r22 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r23, 0x839}, 0x8) ftruncate(r22, 0x200004) sendfile(r8, r22, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r22, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0xfffffffffffffe45) dup2(r5, r22) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:36 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4606, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:36 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x6c00000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:36 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4608, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 669.752088][T17932] FAULT_INJECTION: forcing a failure. [ 669.752088][T17932] name failslab, interval 1, probability 0, space 0, times 0 [ 669.780986][T17932] CPU: 1 PID: 17932 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 669.789885][T17932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.799943][T17932] Call Trace: [ 669.803233][T17932] dump_stack+0x197/0x210 [ 669.807582][T17932] should_fail.cold+0xa/0x15 [ 669.812174][T17932] ? fault_create_debugfs_attr+0x180/0x180 [ 669.818245][T17932] ? ___might_sleep+0x163/0x2c0 [ 669.823107][T17932] __should_failslab+0x121/0x190 [ 669.828162][T17932] should_failslab+0x9/0x14 [ 669.832667][T17932] __kmalloc+0x2e0/0x770 [ 669.836921][T17932] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 669.843514][T17932] ? ext4_find_extent+0x76e/0x9d0 [ 669.848538][T17932] ext4_find_extent+0x76e/0x9d0 [ 669.853651][T17932] ext4_ext_map_blocks+0x1dc/0x3ac0 [ 669.858858][T17932] ? mark_held_locks+0xf0/0xf0 [ 669.863620][T17932] ? ext4_ext_release+0x10/0x10 [ 669.868609][T17932] ? __kasan_check_write+0x14/0x20 [ 669.873722][T17932] ? down_read+0x109/0x430 [ 669.878159][T17932] ? down_read_killable+0x490/0x490 [ 669.883443][T17932] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 669.889699][T17932] ? ext4_es_lookup_extent+0x426/0xd40 [ 669.895164][T17932] ? find_held_lock+0x35/0x130 [ 669.899946][T17932] ext4_map_blocks+0xdc7/0x17e0 [ 669.904807][T17932] ? ext4_issue_zeroout+0x190/0x190 [ 669.910341][T17932] ext4_mpage_readpages+0xeb5/0x2220 [ 669.915661][T17932] ? mpage_end_io+0xf0/0xf0 [ 669.920342][T17932] ? debug_smp_processor_id+0x33/0x18a [ 669.925803][T17932] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 669.931976][T17932] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 669.937548][T17932] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 669.943527][T17932] ? __kasan_check_read+0x11/0x20 [ 669.948731][T17932] ext4_readpages+0xe7/0x130 [ 669.953329][T17932] ? ext4_bh_unmapped+0x50/0x50 [ 669.958251][T17932] read_pages+0x108/0x610 [ 669.962583][T17932] ? read_cache_pages+0x740/0x740 [ 669.967602][T17932] ? __page_cache_alloc+0x116/0x490 [ 669.972794][T17932] ? __lock_acquire+0x8a0/0x4a00 [ 669.977745][T17932] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 669.983979][T17932] __do_page_cache_readahead+0x4e0/0x5d0 [ 669.989623][T17932] ? read_pages+0x610/0x610 [ 669.994152][T17932] ondemand_readahead+0x55c/0xd30 [ 669.999189][T17932] page_cache_sync_readahead+0x27c/0x510 [ 670.004910][T17932] generic_file_read_iter+0x180f/0x2cf0 [ 670.010471][T17932] ? mark_lock+0xc2/0x1220 [ 670.014917][T17932] ? save_stack+0x23/0x90 [ 670.019249][T17932] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 670.025052][T17932] ? kasan_kmalloc+0x9/0x10 [ 670.029675][T17932] ? filemap_write_and_wait_range+0x1d0/0x1d0 [ 670.035859][T17932] ? __kasan_check_read+0x11/0x20 [ 670.040885][T17932] ? __lock_acquire+0x8a0/0x4a00 [ 670.045932][T17932] ? rcu_read_unlock+0x16/0x60 [ 670.050700][T17932] ? memcg_kmem_put_cache+0xad/0x1a0 [ 670.056118][T17932] ext4_file_read_iter+0x1db/0x640 [ 670.061238][T17932] generic_file_splice_read+0x4af/0x800 [ 670.066844][T17932] ? add_to_pipe+0x3b0/0x3b0 [ 670.071557][T17932] ? rw_verify_area+0x126/0x360 [ 670.076562][T17932] ? add_to_pipe+0x3b0/0x3b0 [ 670.081162][T17932] do_splice_to+0x127/0x180 [ 670.085697][T17932] splice_direct_to_actor+0x320/0xa30 [ 670.091100][T17932] ? generic_pipe_buf_nosteal+0x10/0x10 [ 670.096676][T17932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.102931][T17932] ? do_splice_to+0x180/0x180 [ 670.107619][T17932] ? rw_verify_area+0x126/0x360 [ 670.112599][T17932] do_splice_direct+0x1da/0x2a0 [ 670.117471][T17932] ? splice_direct_to_actor+0xa30/0xa30 [ 670.123031][T17932] ? rw_verify_area+0x126/0x360 [ 670.127891][T17932] do_sendfile+0x597/0xd00 [ 670.132327][T17932] ? do_compat_pwritev64+0x1c0/0x1c0 [ 670.137728][T17932] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 670.143961][T17932] ? _copy_from_user+0x12c/0x1a0 [ 670.148905][T17932] __x64_sys_sendfile64+0x15a/0x220 [ 670.154101][T17932] ? __ia32_sys_sendfile+0x230/0x230 [ 670.159924][T17932] ? do_syscall_64+0x26/0x790 [ 670.164593][T17932] ? lockdep_hardirqs_on+0x421/0x5e0 [ 670.169899][T17932] ? trace_hardirqs_on+0x67/0x240 [ 670.174919][T17932] do_syscall_64+0xfa/0x790 [ 670.179440][T17932] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.185319][T17932] RIP: 0033:0x45aff9 [ 670.189219][T17932] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 670.208949][T17932] RSP: 002b:00007ff0cfcffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 670.217491][T17932] RAX: ffffffffffffffda RBX: 00007ff0cfd006d4 RCX: 000000000045aff9 [ 670.225578][T17932] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 670.233726][T17932] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 670.241731][T17932] R10: 0000000100000001 R11: 0000000000000246 R12: 000000000000000a [ 670.250081][T17932] R13: 00000000000008a2 R14: 00000000004c9bce R15: 000000000000000a 05:07:37 executing program 0 (fault-call:13 fault-nth:11): r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:37 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x9000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:37 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4609, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:37 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x7400000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 670.555166][T17954] FAULT_INJECTION: forcing a failure. [ 670.555166][T17954] name failslab, interval 1, probability 0, space 0, times 0 [ 670.567919][T17954] CPU: 0 PID: 17954 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 670.576621][T17954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.587002][T17954] Call Trace: [ 670.590524][T17954] dump_stack+0x197/0x210 [ 670.594904][T17954] should_fail.cold+0xa/0x15 [ 670.599672][T17954] ? fault_create_debugfs_attr+0x180/0x180 [ 670.605570][T17954] __should_failslab+0x121/0x190 [ 670.610549][T17954] should_failslab+0x9/0x14 [ 670.615083][T17954] kmem_cache_alloc+0x47/0x710 [ 670.623545][T17954] ? __kasan_check_write+0x14/0x20 [ 670.628685][T17954] ? do_raw_write_lock+0x124/0x290 [ 670.633860][T17954] __es_insert_extent+0x2cc/0xf20 [ 670.638926][T17954] ext4_es_insert_extent+0x2d2/0xa70 [ 670.644265][T17954] ? ext4_es_scan_clu+0xe0/0xe0 [ 670.649143][T17954] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 670.655164][T17954] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 670.661431][T17954] ? ext4_es_find_extent_range+0x131/0x660 [ 670.667269][T17954] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 670.672839][T17954] ? ext4_rereserve_cluster+0x240/0x240 [ 670.678411][T17954] ? ext4_find_extent+0x76e/0x9d0 [ 670.683468][T17954] ? ext4_find_extent+0x6a6/0x9d0 [ 670.688528][T17954] ext4_ext_map_blocks+0x1930/0x3ac0 [ 670.693863][T17954] ? ext4_ext_release+0x10/0x10 [ 670.698754][T17954] ? __kasan_check_write+0x14/0x20 [ 670.703887][T17954] ? down_read+0x109/0x430 [ 670.708338][T17954] ? down_read_killable+0x490/0x490 [ 670.713672][T17954] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 670.719939][T17954] ? ext4_es_lookup_extent+0x426/0xd40 [ 670.725604][T17954] ? find_held_lock+0x35/0x130 [ 670.730520][T17954] ext4_map_blocks+0xdc7/0x17e0 [ 670.735410][T17954] ? ext4_issue_zeroout+0x190/0x190 [ 670.740657][T17954] ext4_mpage_readpages+0xeb5/0x2220 [ 670.745986][T17954] ? mpage_end_io+0xf0/0xf0 [ 670.750508][T17954] ? debug_smp_processor_id+0x33/0x18a [ 670.756014][T17954] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 670.762201][T17954] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 670.767772][T17954] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 670.773783][T17954] ? __kasan_check_read+0x11/0x20 [ 670.778847][T17954] ext4_readpages+0xe7/0x130 [ 670.783476][T17954] ? ext4_bh_unmapped+0x50/0x50 [ 670.788381][T17954] read_pages+0x108/0x610 [ 670.792751][T17954] ? read_cache_pages+0x740/0x740 [ 670.797900][T17954] ? __page_cache_alloc+0x116/0x490 [ 670.803128][T17954] ? __lock_acquire+0x8a0/0x4a00 [ 670.808094][T17954] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 670.814499][T17954] __do_page_cache_readahead+0x4e0/0x5d0 [ 670.820164][T17954] ? read_pages+0x610/0x610 [ 670.824724][T17954] ondemand_readahead+0x55c/0xd30 [ 670.829820][T17954] page_cache_sync_readahead+0x27c/0x510 [ 670.835490][T17954] generic_file_read_iter+0x180f/0x2cf0 [ 670.841064][T17954] ? mark_lock+0xc2/0x1220 [ 670.845508][T17954] ? save_stack+0x23/0x90 [ 670.849994][T17954] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 670.855826][T17954] ? kasan_kmalloc+0x9/0x10 [ 670.860487][T17954] ? filemap_write_and_wait_range+0x1d0/0x1d0 [ 670.866578][T17954] ? __kasan_check_read+0x11/0x20 [ 670.871748][T17954] ? __lock_acquire+0x8a0/0x4a00 [ 670.876714][T17954] ? rcu_read_unlock+0x16/0x60 [ 670.881615][T17954] ? memcg_kmem_put_cache+0xad/0x1a0 [ 670.886936][T17954] ext4_file_read_iter+0x1db/0x640 [ 670.892075][T17954] generic_file_splice_read+0x4af/0x800 [ 670.897649][T17954] ? add_to_pipe+0x3b0/0x3b0 [ 670.902275][T17954] ? rw_verify_area+0x126/0x360 [ 670.907305][T17954] ? add_to_pipe+0x3b0/0x3b0 [ 670.911939][T17954] do_splice_to+0x127/0x180 [ 670.916477][T17954] splice_direct_to_actor+0x320/0xa30 [ 670.921882][T17954] ? generic_pipe_buf_nosteal+0x10/0x10 [ 670.927465][T17954] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.933736][T17954] ? do_splice_to+0x180/0x180 [ 670.938442][T17954] ? rw_verify_area+0x126/0x360 [ 670.943461][T17954] do_splice_direct+0x1da/0x2a0 [ 670.948797][T17954] ? splice_direct_to_actor+0xa30/0xa30 [ 670.954392][T17954] ? rw_verify_area+0x126/0x360 [ 670.959277][T17954] do_sendfile+0x597/0xd00 [ 670.963825][T17954] ? do_compat_pwritev64+0x1c0/0x1c0 [ 670.969149][T17954] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 670.975559][T17954] ? _copy_from_user+0x12c/0x1a0 [ 670.980538][T17954] __x64_sys_sendfile64+0x15a/0x220 [ 670.985774][T17954] ? __ia32_sys_sendfile+0x230/0x230 [ 670.991167][T17954] ? do_syscall_64+0x26/0x790 [ 670.995969][T17954] ? lockdep_hardirqs_on+0x421/0x5e0 [ 671.001282][T17954] ? trace_hardirqs_on+0x67/0x240 [ 671.006360][T17954] do_syscall_64+0xfa/0x790 [ 671.010893][T17954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.016808][T17954] RIP: 0033:0x45aff9 [ 671.020724][T17954] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 671.043088][T17954] RSP: 002b:00007ff0cfcffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 05:07:37 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x460f, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 671.051542][T17954] RAX: ffffffffffffffda RBX: 00007ff0cfd006d4 RCX: 000000000045aff9 [ 671.059643][T17954] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 671.067639][T17954] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 671.075781][T17954] R10: 0000000100000001 R11: 0000000000000246 R12: 000000000000000a [ 671.084056][T17954] R13: 00000000000008a2 R14: 00000000004c9bce R15: 000000000000000b 05:07:38 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xa000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:38 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4610, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:38 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x7a00000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:38 executing program 0 (fault-call:13 fault-nth:12): r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:38 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080), 0x0) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) socket$bt_hidp(0x1f, 0x3, 0x6) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r8, 0x0, 0x81, &(0x7f0000000900)={'broute\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000700)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x9000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="90040000", @ANYRES16=r9, @ANYBLOB="020b2bbd7000fddbdf251b00000005009200040000004c0022000800020005000000080005000600000008000200400000000800030000020000080003000700000008000100ff0f00000800010003000000080007000900000008000100030000000400cc0005009200d80000001c002200080001000002000008000500070000000800010003000000"], 0x90}, 0x1, 0x0, 0x0, 0xb6bab691d7cf8b72}, 0x80000) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000280)='./file0\x00', 0x7fff, 0x6, &(0x7f0000000600)=[{&(0x7f00000002c0)="52ea6fddd630cf47c51404ff10e4f71ac3f70275c86703c7920adb77e23111fcd1ef76b91d05f69c986d4e143ca52633849c28c8e7da118c7e3109db046935b236db1574146e0f66e01d8c7909234d", 0x4f, 0x20000}, {&(0x7f0000000340)="ce082f30066444a2efafd9d4ed1f48a989224710da9538763f540e50bb4a15fa5f965ea0a3bce9cfd7c736f0fda96954c3db4e", 0x33}, {&(0x7f0000000480)="2602615ae5b76dbbea9c04481a0997727dc4ffd16c1ef3af1f3ef5474af246dcf1b587b5a378d59f21831545f6df621355a29b4a664c2d138735cca31717a4527aef29f2c3e8e9b13214c40db4279dfb211ba01bf2ccfa43b318d6d0a287ce2de8946abb8dac20c98dcaa4a49268d55fd535267ca4606709af771b600e133eb836dd05caf206beffc013f3604229005bc08dbae37580ba69fbcf325184139f24c7d2b41012e8ff834e6fc1c269d5ac3987c38fd8fab89c39057eeec0bc5e9a4bc9fd8a155dfb961b65faf2e9b61bce134c2aab0ac74a920578f4e4c819aeaa95", 0xe0, 0x4}, {&(0x7f0000000380)="0ae911", 0x3, 0x1ff}, {&(0x7f00000003c0)="4e5dc86201e7059a001b3dce7bafe5614f7010e8f4b056f626", 0x19, 0x2}, {&(0x7f0000000580)="5f7cc66236f6f3ad3957e1004d3662ae45564b88a1c60b17b5e2603e3c9c97b403a74d0ba5c76b1dee3c34519e41995913ce7686af1a17dd6ddeb77de4ec6df8ca556e1d381ae831f932", 0x4a, 0xfffffffffffffeff}], 0x820, &(0x7f0000000400)={[{@noinline_data='noinline_data'}, {@norecovery='norecovery'}], [{@smackfsdef={'smackfsdef', 0x3d, '*security{\\'}}]}) r10 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40, 0x0) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_REVISION_TARGET(r10, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000001c0)=0x1e) [ 671.516718][T17977] FAULT_INJECTION: forcing a failure. [ 671.516718][T17977] name failslab, interval 1, probability 0, space 0, times 0 [ 671.529759][T17977] CPU: 1 PID: 17977 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 671.538464][T17977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.548622][T17977] Call Trace: [ 671.551950][T17977] dump_stack+0x197/0x210 [ 671.556312][T17977] should_fail.cold+0xa/0x15 [ 671.561038][T17977] ? fault_create_debugfs_attr+0x180/0x180 05:07:38 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4611, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 671.566900][T17977] __should_failslab+0x121/0x190 [ 671.572009][T17977] should_failslab+0x9/0x14 [ 671.576789][T17977] kmem_cache_alloc+0x47/0x710 [ 671.581804][T17977] ? __kasan_check_write+0x14/0x20 [ 671.586956][T17977] ? do_raw_write_lock+0x124/0x290 [ 671.592268][T17977] __es_insert_extent+0x2cc/0xf20 [ 671.597429][T17977] ext4_es_insert_extent+0x2d2/0xa70 [ 671.602756][T17977] ? ext4_es_scan_clu+0xe0/0xe0 [ 671.607787][T17977] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 671.613798][T17977] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 671.620061][T17977] ? ext4_es_find_extent_range+0x131/0x660 [ 671.625916][T17977] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 671.631870][T17977] ? ext4_rereserve_cluster+0x240/0x240 [ 671.637447][T17977] ? ext4_find_extent+0x76e/0x9d0 [ 671.642501][T17977] ? ext4_find_extent+0x6a6/0x9d0 [ 671.647562][T17977] ext4_ext_map_blocks+0x1930/0x3ac0 [ 671.652885][T17977] ? ext4_ext_release+0x10/0x10 [ 671.657912][T17977] ? __kasan_check_write+0x14/0x20 [ 671.663087][T17977] ? down_read+0x109/0x430 [ 671.667580][T17977] ? down_read_killable+0x490/0x490 [ 671.672800][T17977] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 671.679071][T17977] ? ext4_es_lookup_extent+0x426/0xd40 [ 671.684557][T17977] ? find_held_lock+0x35/0x130 [ 671.689451][T17977] ext4_map_blocks+0xdc7/0x17e0 [ 671.694327][T17977] ? ext4_issue_zeroout+0x190/0x190 [ 671.699569][T17977] ext4_mpage_readpages+0xeb5/0x2220 [ 671.704999][T17977] ? mpage_end_io+0xf0/0xf0 [ 671.709527][T17977] ? debug_smp_processor_id+0x33/0x18a [ 671.715121][T17977] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 671.721302][T17977] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 671.726876][T17977] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 671.733485][T17977] ? __kasan_check_read+0x11/0x20 [ 671.738535][T17977] ext4_readpages+0xe7/0x130 [ 671.743138][T17977] ? ext4_bh_unmapped+0x50/0x50 [ 671.748005][T17977] read_pages+0x108/0x610 [ 671.752386][T17977] ? read_cache_pages+0x740/0x740 [ 671.757628][T17977] ? __page_cache_alloc+0x116/0x490 [ 671.762849][T17977] ? __lock_acquire+0x8a0/0x4a00 [ 671.767821][T17977] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 671.774120][T17977] __do_page_cache_readahead+0x4e0/0x5d0 [ 671.779884][T17977] ? read_pages+0x610/0x610 [ 671.784520][T17977] ondemand_readahead+0x55c/0xd30 [ 671.789964][T17977] page_cache_sync_readahead+0x27c/0x510 [ 671.795619][T17977] generic_file_read_iter+0x180f/0x2cf0 [ 671.801314][T17977] ? mark_lock+0xc2/0x1220 [ 671.806234][T17977] ? save_stack+0x23/0x90 [ 671.810700][T17977] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 05:07:38 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dri/renderD128\x00', 0x22200, 0x0) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r10, 0x839}, 0x8) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r11 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000480)={r12, &(0x7f00000003c0)=""/141}) ioctl$DRM_IOCTL_LOCK(r11, 0x4008642a, &(0x7f0000000140)={r12, 0x1}) fsetxattr(0xffffffffffffffff, &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000280)='keyringvboxnet1\\%-\aposix_acl_access/D\x00', 0x26, 0xb8559555e76d9c4e) ioctl$DRM_IOCTL_LOCK(r9, 0x4008642a, &(0x7f00000001c0)={r12, 0x8}) ioctl$TUNGETSNDBUF(r6, 0x800454d3, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) [ 671.816719][T17977] ? kasan_kmalloc+0x9/0x10 [ 671.821251][T17977] ? filemap_write_and_wait_range+0x1d0/0x1d0 [ 671.827352][T17977] ? __kasan_check_read+0x11/0x20 [ 671.832417][T17977] ? __lock_acquire+0x8a0/0x4a00 [ 671.837771][T17977] ? rcu_read_unlock+0x16/0x60 [ 671.842674][T17977] ? memcg_kmem_put_cache+0xad/0x1a0 [ 671.847992][T17977] ext4_file_read_iter+0x1db/0x640 [ 671.853130][T17977] generic_file_splice_read+0x4af/0x800 [ 671.858790][T17977] ? add_to_pipe+0x3b0/0x3b0 [ 671.863522][T17977] ? rw_verify_area+0x126/0x360 [ 671.868396][T17977] ? add_to_pipe+0x3b0/0x3b0 [ 671.873014][T17977] do_splice_to+0x127/0x180 [ 671.877574][T17977] splice_direct_to_actor+0x320/0xa30 [ 671.882966][T17977] ? generic_pipe_buf_nosteal+0x10/0x10 [ 671.888541][T17977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 671.894885][T17977] ? do_splice_to+0x180/0x180 [ 671.899594][T17977] ? rw_verify_area+0x126/0x360 [ 671.904621][T17977] do_splice_direct+0x1da/0x2a0 [ 671.909491][T17977] ? splice_direct_to_actor+0xa30/0xa30 [ 671.915078][T17977] ? rw_verify_area+0x126/0x360 [ 671.920073][T17977] do_sendfile+0x597/0xd00 [ 671.924532][T17977] ? do_compat_pwritev64+0x1c0/0x1c0 [ 671.929865][T17977] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 671.936211][T17977] ? _copy_from_user+0x12c/0x1a0 [ 671.941169][T17977] __x64_sys_sendfile64+0x15a/0x220 [ 671.946388][T17977] ? __ia32_sys_sendfile+0x230/0x230 [ 671.951953][T17977] ? do_syscall_64+0x26/0x790 [ 671.956846][T17977] ? lockdep_hardirqs_on+0x421/0x5e0 [ 671.962178][T17977] ? trace_hardirqs_on+0x67/0x240 [ 671.967313][T17977] do_syscall_64+0xfa/0x790 [ 671.971927][T17977] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.977827][T17977] RIP: 0033:0x45aff9 [ 671.981734][T17977] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 672.001669][T17977] RSP: 002b:00007ff0cfcffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 672.010195][T17977] RAX: ffffffffffffffda RBX: 00007ff0cfd006d4 RCX: 000000000045aff9 [ 672.018278][T17977] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 672.026280][T17977] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 672.034269][T17977] R10: 0000000100000001 R11: 0000000000000246 R12: 000000000000000a [ 672.042256][T17977] R13: 00000000000008a2 R14: 00000000004c9bce R15: 000000000000000c 05:07:38 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x7fffffffffffffff, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:39 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xb000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:39 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4615, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:39 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:39 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendfile(r1, r0, 0x0, 0x100000001) 05:07:39 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r4 = fanotify_init(0x40, 0x800) r5 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r4, r5, 0x0) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r8, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r6, 0x8904, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r10 = fcntl$dupfd(r9, 0x80c, r2) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:39 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xc000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:39 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4619, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:39 executing program 0 (fault-call:13 fault-nth:13): r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:39 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x9591225e00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:39 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) 05:07:39 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4b47, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:39 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x10000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 672.995912][T18024] FAULT_INJECTION: forcing a failure. [ 672.995912][T18024] name failslab, interval 1, probability 0, space 0, times 0 [ 673.008582][T18024] CPU: 1 PID: 18024 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 673.018645][T18024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 673.028710][T18024] Call Trace: [ 673.032036][T18024] dump_stack+0x197/0x210 [ 673.036402][T18024] should_fail.cold+0xa/0x15 [ 673.041012][T18024] ? __lock_acquire+0x8a0/0x4a00 [ 673.046006][T18024] ? fault_create_debugfs_attr+0x180/0x180 [ 673.051847][T18024] ? __kasan_check_read+0x11/0x20 [ 673.056895][T18024] ? mark_lock+0xc2/0x1220 [ 673.061336][T18024] ? percpu_ref_tryget+0xea/0x230 [ 673.066391][T18024] __should_failslab+0x121/0x190 [ 673.071350][T18024] should_failslab+0x9/0x14 [ 673.076035][T18024] kmem_cache_alloc+0x47/0x710 [ 673.080825][T18024] ? __kasan_check_read+0x11/0x20 [ 673.085877][T18024] xas_alloc+0x346/0x460 [ 673.090141][T18024] xas_create+0x5b2/0x1060 [ 673.094605][T18024] ? mark_held_locks+0xf0/0xf0 [ 673.099419][T18024] xas_store+0x9a/0x1a00 [ 673.103697][T18024] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 673.110070][T18024] ? xas_start+0x166/0x560 [ 673.114527][T18024] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 673.120967][T18024] ? xas_load+0x67/0x150 [ 673.125240][T18024] __add_to_page_cache_locked+0x5d8/0xec0 [ 673.130988][T18024] ? __filemap_set_wb_err+0x2b0/0x2b0 [ 673.136490][T18024] ? ext4_es_lookup_extent+0x426/0xd40 [ 673.141968][T18024] ? find_held_lock+0x35/0x130 [ 673.146765][T18024] ? shadow_lru_isolate+0x430/0x430 [ 673.151990][T18024] ? ext4_map_blocks+0xaa8/0x17e0 [ 673.157042][T18024] add_to_page_cache_lru+0x1d8/0x790 [ 673.162492][T18024] ? add_to_page_cache_locked+0x40/0x40 [ 673.168059][T18024] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 673.174326][T18024] ext4_mpage_readpages+0x46d/0x2220 [ 673.179780][T18024] ? mpage_end_io+0xf0/0xf0 [ 673.184293][T18024] ? debug_smp_processor_id+0x33/0x18a [ 673.189781][T18024] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 673.195960][T18024] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 673.201550][T18024] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 673.207560][T18024] ? __kasan_check_read+0x11/0x20 [ 673.212700][T18024] ext4_readpages+0xe7/0x130 [ 673.217314][T18024] ? ext4_bh_unmapped+0x50/0x50 [ 673.222188][T18024] read_pages+0x108/0x610 [ 673.226546][T18024] ? read_cache_pages+0x740/0x740 [ 673.231609][T18024] ? __page_cache_alloc+0x116/0x490 [ 673.236818][T18024] ? __lock_acquire+0x8a0/0x4a00 [ 673.241909][T18024] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 673.248173][T18024] __do_page_cache_readahead+0x4e0/0x5d0 [ 673.253995][T18024] ? read_pages+0x610/0x610 [ 673.258535][T18024] ondemand_readahead+0x55c/0xd30 [ 673.263605][T18024] page_cache_sync_readahead+0x27c/0x510 [ 673.269377][T18024] generic_file_read_iter+0x180f/0x2cf0 [ 673.274981][T18024] ? save_stack+0x23/0x90 [ 673.279348][T18024] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 673.285177][T18024] ? kasan_kmalloc+0x9/0x10 [ 673.289728][T18024] ? filemap_write_and_wait_range+0x1d0/0x1d0 [ 673.295830][T18024] ? __kasan_check_read+0x11/0x20 [ 673.300879][T18024] ? __lock_acquire+0x8a0/0x4a00 [ 673.305847][T18024] ? cache_grow_end+0xa4/0x190 [ 673.310646][T18024] ? memcg_kmem_put_cache+0xad/0x1a0 [ 673.316107][T18024] ext4_file_read_iter+0x1db/0x640 [ 673.321273][T18024] generic_file_splice_read+0x4af/0x800 [ 673.326855][T18024] ? add_to_pipe+0x3b0/0x3b0 [ 673.331521][T18024] ? rw_verify_area+0x126/0x360 [ 673.336401][T18024] ? add_to_pipe+0x3b0/0x3b0 [ 673.341049][T18024] do_splice_to+0x127/0x180 [ 673.345724][T18024] splice_direct_to_actor+0x320/0xa30 [ 673.351115][T18024] ? generic_pipe_buf_nosteal+0x10/0x10 [ 673.356773][T18024] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 673.363047][T18024] ? do_splice_to+0x180/0x180 [ 673.367757][T18024] ? rw_verify_area+0x126/0x360 [ 673.372632][T18024] do_splice_direct+0x1da/0x2a0 [ 673.377514][T18024] ? splice_direct_to_actor+0xa30/0xa30 [ 673.383098][T18024] ? rw_verify_area+0x126/0x360 [ 673.387966][T18024] do_sendfile+0x597/0xd00 [ 673.392422][T18024] ? do_compat_pwritev64+0x1c0/0x1c0 [ 673.397746][T18024] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 673.404019][T18024] ? _copy_from_user+0x12c/0x1a0 [ 673.408982][T18024] __x64_sys_sendfile64+0x15a/0x220 [ 673.414372][T18024] ? __ia32_sys_sendfile+0x230/0x230 [ 673.419709][T18024] ? do_syscall_64+0x26/0x790 [ 673.424409][T18024] ? lockdep_hardirqs_on+0x421/0x5e0 [ 673.429724][T18024] ? trace_hardirqs_on+0x67/0x240 [ 673.434784][T18024] do_syscall_64+0xfa/0x790 [ 673.439433][T18024] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 673.445435][T18024] RIP: 0033:0x45aff9 [ 673.449345][T18024] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 673.468980][T18024] RSP: 002b:00007ff0cfcffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 673.477535][T18024] RAX: ffffffffffffffda RBX: 00007ff0cfd006d4 RCX: 000000000045aff9 [ 673.485549][T18024] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 673.494099][T18024] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 673.502107][T18024] R10: 0000000100000001 R11: 0000000000000246 R12: 000000000000000a [ 673.510194][T18024] R13: 00000000000008a2 R14: 00000000004c9bce R15: 000000000000000d 05:07:40 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xeb10000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:40 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:40 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r3, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_AGEING_TIME={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x44}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_AGEING_TIME={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x44}}, 0x0) sendmmsg$inet6(r2, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="ece2d88b3f7a3f2177afba458752e6d156fd1aa976e470c4f18fb9aed2a0832c397cb68e6ef83a669b5eba76caa436950ac4ef2dcb312d49217f291b7acbd136e04a536016e7dda926", 0x49}, {&(0x7f00000002c0)="51ab93a80af12834c78c53914b2d19f79555ae6e8662c23b57204ad8ec68eadef0d54af3c5728b4a04ffee4efc78cd39c6b3d7e07249858869afb4480daa4561502f843b819bd720a5f0e9c76d4b942771d417fe3ed6f85872ca5465c2be4cc38046276cca6f68f72a7c8bcdf25d12d15d16287f9c17f32a41135b78", 0x7c}], 0x2, &(0x7f0000000480)=[@pktinfo={{0x24, 0x29, 0x32, {@empty, r6}}}, @hopopts_2292={{0x50, 0x29, 0x36, {0x32, 0x6, [], [@padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @jumbo={0xc2, 0x4, 0x7fffffff}, @hao={0xc9, 0x10, @rand_addr="a42548f3a328ed98a0828cc668fe19ec"}, @pad1, @padn={0x1, 0x2, [0x0, 0x0]}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast1, r9}}}, @hopopts={{0x98, 0x29, 0x36, {0x74, 0xf, [], [@padn={0x1, 0x1, [0x0]}, @calipso={0x7, 0x30, {0x3, 0xa, 0x0, 0xa6, [0xd3, 0x15, 0x5, 0x4, 0x5]}}, @calipso={0x7, 0x28, {0x1, 0x8, 0x80, 0xff45, [0xfffffffffffffc01, 0x7, 0x8001, 0x7d3d6a7c]}}, @padn={0x1, 0x1, [0x0]}, @calipso={0x7, 0x18, {0x0, 0x4, 0x81, 0x7, [0x3ff, 0xfffffffffffffeff]}}, @enc_lim={0x4, 0x1, 0xac}]}}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x2c, 0x4, 0x1, 0x56, 0x0, [@mcast2, @remote]}}}], 0x170}}, {{&(0x7f0000000340)={0xa, 0x4e24, 0x80000001, @mcast1, 0x40}, 0x1c, &(0x7f0000000400)=[{&(0x7f0000000380)="86b8087a8a15ebdda4b9bf1903", 0xd}, {&(0x7f0000000600)="6727f40c0d4807e5c19bb9334b101884a07b07dfff99668af312df5fffc4a57cea1e7dd31c16800b856d40e5f975b506711b3585c9da2c5632b9e98c10b0ed8086de0ab1ee3ba468feb99ad9b5fd0fb92062660142b22630d875e3a0fc5e386d6ae9798dc62809ad609da79c823babf668ca3ecc8fe69cf22c03a4f2b33836f942b173729d9b6301d67cc33e9af97da79b46512ddbd53b9df5d3054178bcba388831f99aa9f651184d676cc90f7e9ba0482094697db05654b7", 0xb9}, {&(0x7f00000003c0)="4c84be92a4ee74c4ed857254", 0xc}], 0x3, &(0x7f00000006c0)=[@dstopts_2292={{0x30, 0x29, 0x4, {0x92, 0x2, [], [@pad1, @pad1, @jumbo={0xc2, 0x4, 0x2}, @generic={0x4}, @enc_lim={0x4, 0x1, 0x7}]}}}, @tclass={{0x14}}, @rthdrdstopts={{0x58, 0x29, 0x37, {0xd3c52d4ae81f893b, 0x7, [], [@generic={0x1, 0x30, "8a08d23ac0c1587e02496d25e7e8d248c66688ea347f6e4081f4c4263334ade28d63695bb0c2be7dd0f89c6f26054a2b"}, @ra={0x5, 0x2, 0x3}, @generic={0xc5, 0x3, "7170e4"}]}}}, @hopopts={{0x190, 0x29, 0x36, {0x5c, 0x2e, [], [@generic={0x3, 0xf5, "427cd1e0e86d44324fd2aa81a294edd1fc55c55d6bf24ff0d812cb803fa3bccc5e2258f99683ef3f247fd9196bacb5ee709c41033fb5f18de1ee2ca4a6bc50cec12e9195d89b9d88f5193f5467e49102c030e143e590cd292b0f7934747c6d7c0709b3be79fea8033017bc01c8207e06f4b69a940b6ba65d8e7fd53af26b7e8336d9cfea300e5842357c8008aa2219dccad2e48dfa44bfcafc61191f183e006f86f911b513af64f7215d6454f6cc3ed6ee7bd18f1ab0b4d8d7a2f947412ed55ff8dbe0e4b76eefd2fa1b564715b5e91f7894e428e45e5e3bf05079e5cb15c6e4c587bb69377ac7f75b0d874ccabf094527d4ab844b"}, @enc_lim={0x4, 0x1, 0x4}, @jumbo={0xc2, 0x4, 0x3}, @hao={0xc9, 0x10, @ipv4={[], [], @multicast2}}, @pad1, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x48, {0x2, 0x10, 0xff, 0xd7d, [0x62d, 0x5d, 0x7ff, 0xdb6, 0x3, 0x7, 0x5, 0xfffffffffffffffc]}}, @pad1, @jumbo, @jumbo={0xc2, 0x4, 0x9}]}}}], 0x230}}], 0x2, 0x4000) r10 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) sendfile(r10, r0, 0x0, 0x100000001) r14 = socket$inet6(0xa, 0x400000000001, 0x0) syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x9, 0x4a00) close(r14) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r14, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r16, 0x839}, 0x8) ftruncate(r15, 0x200004) sendfile(r14, r15, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r15, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r15, 0xc04c5349, &(0x7f0000000000)={0xffff, 0x7, 0x855}) 05:07:40 executing program 0 (fault-call:13 fault-nth:14): r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:40 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r1, r3) write$evdev(r0, &(0x7f0000000140), 0x0) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) getsockopt$CAN_RAW_LOOPBACK(r4, 0x65, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 05:07:40 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x1f000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:40 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4b60, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:40 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xf5ffffff00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:40 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x20000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:41 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:41 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:41 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4c00, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:41 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r10, 0x839}, 0x8) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$sock_inet_SIOCDELRT(r9, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x4e20, @empty}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e20, @empty}, 0x40, 0x0, 0x0, 0x0, 0x2, 0x0, 0xb, 0xed, 0xf000}) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r6, 0x84, 0x1c, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 05:07:41 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4c01, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:41 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x20100000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:41 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xf9fdffff00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:41 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x541b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:41 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r10, 0x839}, 0x8) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) accept$packet(r9, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:41 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x12, 0x80010, r3, 0x10000000) 05:07:41 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x16, 0x40, 0xf4, &(0x7f0000000480)="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"}) r1 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r2, r1, &(0x7f0000000000), 0x100000001) 05:07:42 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x5421, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 675.237607][ T26] audit: type=1400 audit(1579324062.062:157): avc: denied { map } for pid=18312 comm="syz-executor.5" path="socket:[91046]" dev="sockfs" ino=91046 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=unix_stream_socket permissive=1 05:07:42 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xfbffffff00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:42 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x23000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:42 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r5, 0x839}, 0x8) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendfile(r6, r3, 0x0, 0x100000001) 05:07:42 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x5423, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:42 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00002903000000dbdf2502000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:42 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000040)=0x3ff) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:42 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x5450, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:42 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x130062}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x8c, r6, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x18, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_BEARER={0x2c, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1000}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000}, 0x4000) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:42 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f00000002c0)={0x9, 0x0, [{0xc0000000, 0x80000000, 0x1, 0x1, 0x9, 0x3, 0x1}, {0x40000001, 0x2, 0x4029041c712ce7c8, 0xadb1, 0x1, 0x46f, 0x1f}, {0x7, 0x6, 0x8, 0x4, 0x9, 0x40, 0x7fffffff}, {0x1, 0x0, 0x0, 0x401, 0x2, 0x3ff, 0x2}, {0x6, 0xfffffe00, 0x4, 0x1, 0x5, 0x69d, 0xff}, {0x40000000, 0x800, 0x5, 0xccf, 0x6, 0x58, 0xffffffe1}, {0x7, 0x0, 0x4, 0x100, 0x7, 0x146, 0x8d}, {0xb, 0x8001, 0x4, 0x8, 0x10000, 0x3, 0x1}, {0xd, 0x800, 0x1, 0x3f, 0x80000000, 0x10001, 0x7f}]}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0xce6eb8e6e84d53f7) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = fanotify_init(0x40, 0x800) r6 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r5, r6, 0x0) r7 = epoll_create(0x1) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000240)={0x800, 0xffffffffffffffe1, 0x2, 0x0, 0x0, [{{r6}, 0x2}, {{r7}, 0xbf}]}) ioctl$TIOCEXCL(r3, 0x540c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:42 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xfeffffff00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:42 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x5451, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:42 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x3f000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:42 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r8, 0x839}, 0x8) ftruncate(r7, 0x200004) r9 = fanotify_init(0x40, 0x800) r10 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f0000000040)={0x1, 0x0, 0x4}, 0xc) dup3(r9, r10, 0x0) sendfile(r10, r7, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r6, 0x8904, 0x0) ioctl$sock_SIOCGIFCONF(r6, 0x8912, &(0x7f0000000080)) r11 = socket$unix(0x1, 0x2, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r12}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:42 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x5452, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 675.975889][ T26] audit: type=1800 audit(1579324062.802:158): pid=18424 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=16533 res=0 05:07:42 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r3, 0x0, 0x100000003) 05:07:42 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xff00000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:42 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000140)="2a8e079ce61c8493a82efec4529b73872b392311b7ec0cf7c7e558f28950506c3235aa41e67c0525d8d6e5076486ae7f747f3d3ed9f0c5e1a7a81505e48864c0fe3a81a821d7c66ca5e9d8d7e241f256a842b0e931098ceb133a73a73a263989c2448306e802978f24be474b43fba7547f734fbd11b50af9059482790664126f7ce8edc16aff18fa91efbc3cdb76132e6be9d79b0121c6671e135759213aaee795775b559783277943157b269435d24e87029c58bb899cf9b309d923aa", 0xbd, 0x2e674352e6614b19, 0x0, 0x0) 05:07:43 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x40000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:43 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x5460, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:43 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xff0f000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:43 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x54e3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:43 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r2 = syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20, 0x82000) vmsplice(r2, &(0x7f0000000240)=[{&(0x7f0000000300)="fcf51de66a7f691ad1d3067786cba26e1062860a1c277b2e3a9c33729b37edb78cb1260b8d6f1fbc710c79ea64477b3b222f74b224440d312f26090d9dae8482f81d3f48bdc493103b8bdbf21f74ca15af07909a5878d5fae3a8450e0169118ba13fa2d7fda5b692a6d54cdd13e580f9a594240255c39d703132f1eaa48c92c84ac1bdf7a33c2f97e1906a67e6de4f023fde3e2b629562fca3725d3e2fc2fa9caecf2217b60e580a058c166f7e8c268ceb06e9cd0d328230181dfdadf6ced5eb173131", 0xc3}, {&(0x7f0000000140)="6e4fdcf33f9618f446a136c65b196ee40a360b", 0x13}, {&(0x7f0000000580)="9164ed4445ee25b5fb7844e121ec6305e77ae3e7e406e78a23fbac8fe5d9ca8502102fdef1caa46c31f4577ac139397746c4f1741cd856703b57a6a5b9990cbc96f452d7f1b5678c2b7d49ca878bf8847f21b79b8f91ea716c45ebf9ea96c2882861656e91bc78dc6cffc542bb2e09b4334952240eadc1430b0545aa99ca94464c5c896b7c369a39a51b5566e9dfecae0310eec35e09d3c67c42cfa10727a859d00b9ae1059ae110cb31271b610c606ec9f1652f097db7c24b0e1e64d7921cf24ad9f05f1e54bb9ed0a7105435b58e3155a4836d178441ae9d0a7b9e0c835d37751af7f54d5eafe61d1a129b15f1b1a29500db092b", 0xf5}, {&(0x7f0000000680)="471be66fb6201f59a2e1030360eeb8da1561b38679c977a2042be45cb14242c8190eb584ba704f56992f3779a82c121ba65bbcbf64711b9cecf0dc8884cf075ed56b660067e7a1a3e13c5187c2ba8a085e6c3b3ead4d5205eb5dbc2a7647d9c87ac1f435c4c35fb11b4c15d8e4646e4c34d112b20e16e1c36eaaa592695b81454031df943288119b0d2a0c4e192c942bc37420167e9f421a11efca9acd0340b761204a90021c5187e6f1c77b75841560359bfe41ad81110ca14c47bd107a4d0554d86356426b19fe1c4e745d4d49c57486df1f59f0b2843c6715ee9f66aeee1316a5a1f4fd7bc4", 0xe7}], 0x4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x9, 0x3, 0x268, 0x100, 0x100, 0x0, 0x100, 0x0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x3, &(0x7f0000000280), {[{{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x2}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x2, 0x7, 0x7, 0xe1, 'snmp_trap\x00', 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0xffffffff, 0xffffffff, 'vxcan1\x00', 'veth1_to_bridge\x00', {}, {}, 0x1f, 0x2, 0x4}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x4, [0x7, 0x4, 0x1, 0x4, 0x1, 0xc], 0x4}, {0x2, [0x4, 0x2, 0x2, 0x0, 0x5], 0x4, 0x4}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c8) r8 = fcntl$dupfd(r4, 0x0, r3) r9 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r9) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r10 = socket$unix(0x1, 0x2, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0x48, &(0x7f0000000500)={&(0x7f0000000780)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=r11, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) ioctl$KVM_IRQFD(r11, 0x4020ae76, &(0x7f0000000080)={0xffffffffffffffff, 0x7ff, 0x1, r11}) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:43 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x15984a, 0x10) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:43 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x508480, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @remote}, 0x10) prctl$PR_SET_TIMERSLACK(0x1d, 0x80) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x24c2dfbc8442b1ad, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) 05:07:43 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x48000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:43 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x6364, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:43 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) socket$inet6(0xa, 0x5, 0x8) 05:07:43 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xffefffff00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:43 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x15984a, 0x80) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) accept4$unix(r6, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0x80000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:43 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x4c000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:43 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x10000, 0x0) write$evdev(r4, &(0x7f00000000c0)=[{{}, 0x1f, 0x1435, 0x75}], 0x18) r5 = fcntl$dupfd(r3, 0x0, r2) r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:43 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x890b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:43 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:43 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) sendfile(r1, r0, 0x0, 0x100000001) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x82) 05:07:43 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x890c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:43 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r4) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0xe5f) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="0800040000000000060006000000000008000900010000000507b4a178823e0b660f7a5e2477dbe60ca09769f617b2f0bb6ded9db7bdfc40dc9051967e06ef8d2bcd3c5ce04c3b1704395efecac41cc6439713863d234046bd705b0b22002296e5feda1f3243fa0e9f69ce98bf146d472a8079a746fda726"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:43 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x5e2291ae, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:43 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x8912, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:44 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:44 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000240)=[{{r5, r6/1000+10000}, 0x1, 0x2, 0x53d7}, {{r7, r8/1000+30000}, 0x2, 0x20, 0x5}, {{r9, r10/1000+30000}, 0x15, 0x200, 0x1}, {{r11, r12/1000+30000}, 0x12, 0xffff, 0x6}, {{r13, r14/1000+10000}, 0x15, 0x6, 0x7}, {{}, 0x30, 0x0, 0x9}, {{0x77359400}, 0x12, 0x40, 0x8}, {{r15, r16/1000+10000}, 0x16, 0xc0d9, 0x80000001}], 0xc0) sendfile(r1, r0, 0x0, 0x100000001) 05:07:44 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.impure\x00') truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) getdents64(r0, &(0x7f0000000140)=""/146, 0x92) 05:07:44 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x2000000400a) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r10, 0x839}, 0x8) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$BLKROSET(r9, 0x125d, &(0x7f0000000340)) r11 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r12, 0x839}, 0x8) ftruncate(r11, 0x200004) sendfile(r7, r11, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r11, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_DMA(r11, 0xc0406429, &(0x7f0000000300)={r13, 0xa, &(0x7f00000000c0)=[0xbe51, 0xffffffff, 0x0, 0x2, 0x6, 0xb90, 0x80, 0x5, 0x9, 0x81], &(0x7f0000000140)=[0x400, 0x0], 0x1, 0x1, 0x81, &(0x7f0000000240)=[0x100], &(0x7f0000000280)=[0x8, 0x8, 0x10000, 0x81, 0x7f41, 0x1]}) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r6, @ANYBLOB="080004000000000006006d969e4ff9cf180a090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:44 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x8933, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:44 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x68000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:44 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xffffffffffff0700, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:44 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = socket(0x22, 0x2, 0x1) ioctl$IMGETVERSION(r2, 0x80044942, &(0x7f0000000000)) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) 05:07:44 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x8934, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:44 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000040)) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:44 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x6c000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:44 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r10, 0x839}, 0x8) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) setsockopt$kcm_KCM_RECV_DISABLE(r9, 0x119, 0x1, &(0x7f0000000080)=0x9, 0x4) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:44 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0xae01, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:44 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000040)={0x9a0000, 0x5, 0x81, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x9f0903, 0x7230, [], @ptr=0x5}}) setsockopt$ax25_int(r3, 0x101, 0x2, &(0x7f0000000080)=0x7e, 0x4) r4 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r8, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$RTC_PLL_GET(r7, 0x80207011, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) sendfile(r5, r4, 0x0, 0x100000001) 05:07:44 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xffffffffffffff7f, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:44 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0xae41, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:44 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x74000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:45 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000080)={0x0, 0x7}, 0x2) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f00000000c0)) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7075d17de728bf3eb6480a2100fd250200004fbc0000", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:45 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:45 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x40044145, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:45 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x7a000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:45 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x102) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(0xffffffffffffffff, r5) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) bind$tipc(r4, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x1, {0xc2, 0x2, 0x1}}, 0x10) 05:07:45 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="006f29bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:45 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x400454ca, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:45 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota', 0x22}, {@gid={'gid'}}]}) [ 678.636547][T18916] jfs: Unrecognized mount option "noquota"gid=0x0000000000000000" or missing value 05:07:45 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x8cffffff, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:45 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x40049409, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:45 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r3, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$VIDIOC_DECODER_CMD(r2, 0xc0485660, &(0x7f0000000080)={0x4, 0x1, @stop_pts=0x5}) r4 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r8) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r9 = socket$unix(0x1, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf250200000008000400000000000800070079163ce14d7d2035d9cc44f06e2fb312a5f6662cdeda0256cddafd6ebd9376977df52f0db91a59ed506e74e5fecc29965e9ef7753744b8013af476151e3d3bff7f0000c1b9f94f8a77e95ca095ade119430f72c869af41ef9c15c1bdf38eb0bc47c7d9d125105f48c6be4a3f267cd8d4405e6614bdd7e838aaaeaa7626521cd4224daff614b920add3f927aca4390430d1b6b45d787b1b960ea64f4d6d756462", @ANYRES32=r10, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r4, r0, &(0x7f0000000000), 0x100000001) 05:07:45 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttynull\x00', 0x101000, 0x0) r4 = fanotify_init(0x40, 0x800) r5 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r4, r5, 0x0) sendfile(r2, r3, 0x0, 0x100000001) [ 678.709973][T18916] jfs: Unrecognized mount option "noquota"gid=0x0000000000000000" or missing value 05:07:45 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota', 0x3a}, {@gid={'gid'}}]}) 05:07:45 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x800, 0x0) write$evdev(r5, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) r6 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/mls\x00', 0x0, 0x0) setsockopt$netrom_NETROM_T4(r6, 0x103, 0x6, &(0x7f0000000300)=0x1, 0x4) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:45 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x9bef0700, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:45 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 678.927792][T18934] jfs: Unrecognized mount option "noquota:gid=0x0000000000000000" or missing value 05:07:45 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) [ 679.019449][T18934] jfs: Unrecognized mount option "noquota:gid=0x0000000000000000" or missing value 05:07:45 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x40087602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:45 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080), 0x0) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:45 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota', 0xff}, {@gid={'gid'}}]}) 05:07:46 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) uselib(&(0x7f00000001c0)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000180)) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r6, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000000)=0xffffffff, 0x4) r7 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) 05:07:46 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x15, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000240)={&(0x7f0000000140), &(0x7f0000000300)=""/190, 0xbe}) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x20000, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000080)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="08fddeb8d50000000000080009000100"/28], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:46 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xae91225e, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:46 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x40186366, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 679.330596][T19058] jfs: Unrecognized mount option "noquotaÿgid=0x0000000000000000" or missing value 05:07:46 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000100)=0x8000000000004, 0xfffffffd) [ 679.484170][T19058] jfs: Unrecognized mount option "noquotaÿgid=0x0000000000000000" or missing value 05:07:46 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x1) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x406, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000280)='./file1\x00', 0x6001, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r10, 0x839}, 0x8) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) setsockopt$PNPIPE_ENCAP(r9, 0x113, 0x1, &(0x7f0000000240), 0x4) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x303043, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r13, 0x839}, 0x8) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r12, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fd9eec5ae48ad861b000f1ffffffffff07000700", @ANYRES32=r7, @ANYBLOB="08000400000000000600060000feffff0700090001000000b0441a5335e241e6bd9f321d3ff6a8f1f334f22900040000a7eb73ab11c46a09a8b9b3076d8864b1f62c9cb31d27317ed940f478ee45f87693afcb7bd12df58e5b7fa1d85f27d0584bc5d87d071235bd04a6e01a182ce8617dcf60f449f9e39d7afaea50aae032b212b3c07d27aef201"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:46 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:46 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid', 0x22}}]}) 05:07:46 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4020940d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:46 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r2, r1, &(0x7f0000000000), 0x100000001) 05:07:46 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)=@ipv6_getroute={0x1c, 0x1a, 0x401, 0x0, 0x0, {0x2, 0x2}}, 0x1c}}, 0x0) keyctl$set_reqkey_keyring(0xe, 0xf1bd9851a7332d0b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r10, 0x839}, 0x8) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$EVIOCREVOKE(r9, 0x40044591, &(0x7f0000000180)=0x7) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$KVM_GET_NESTED_STATE(r7, 0xc080aebe, &(0x7f0000000480)={{0x0, 0x0, 0x80}}) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 679.750346][T19081] jfs: Unrecognized mount option "gid"0x0000000000000000" or missing value 05:07:46 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 679.873204][T19081] jfs: Unrecognized mount option "gid"0x0000000000000000" or missing value [ 679.928030][ T26] audit: type=1800 audit(1579324066.752:159): pid=19065 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=16550 res=0 05:07:46 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioperm(0x9, 0x7ff, 0x8) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) 05:07:46 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x800454d2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:46 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xeb100000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:46 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid', 0x25}}]}) 05:07:46 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x2001c3, 0x2e) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000080)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04000000000008000700c55f27670b65cd37b08fa53349337f56a8414aa8834502a57f59922b", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:47 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000080)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f00000000c0)={r8, 0x1, 0x1ff, 0x8}, 0x10) sendfile(r1, r0, 0x0, 0x100000001) 05:07:47 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x80086301, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 680.271806][T19210] jfs: Unrecognized mount option "gid%0x0000000000000000" or missing value 05:07:47 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r10, 0x839}, 0x8) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029fd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:47 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xf5ffffff, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 680.440364][T19210] jfs: Unrecognized mount option "gid%0x0000000000000000" or missing value 05:07:47 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x80086601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:47 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) rt_sigpending(&(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r6, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x301000, 0x0) ioctl$EVIOCGBITSND(r7, 0x80404532, &(0x7f0000000240)=""/100) ioctl$int_in(r5, 0x5421, &(0x7f00000000c0)=0x63) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) r8 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) sendfile(r8, r0, &(0x7f0000000000)=0xffffffff, 0x100000001) 05:07:47 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid', 0x2c}}]}) 05:07:47 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x80087601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 680.638488][ T26] audit: type=1800 audit(1579324067.462:160): pid=19218 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=16552 res=0 05:07:47 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xf6ffffff, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:47 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = shmget(0x2, 0x3000, 0x80, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_INFO(r2, 0x3, &(0x7f0000000000)=""/2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x10180, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r6, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4008814}, 0x18000) sendfile(r1, r0, 0x0, 0x100000001) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r9, 0x839}, 0x8) ftruncate(r8, 0x200004) sendfile(r7, r8, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r7, 0x8904, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) 05:07:47 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ustat(0x6, &(0x7f0000000080)) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 680.767314][T19334] jfs: Unrecognized mount option "gid" or missing value 05:07:47 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x8080aea1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:47 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x810c5701, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 680.936621][T19334] jfs: Unrecognized mount option "gid" or missing value 05:07:47 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x4, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c000080125a0e5ca735cf5b18d0d427b591ac0f8b63fa94c1e57693d6678a34934014ee1650e554d7affa9143a2ade817c761b1307be73f6c119940f67d5a23576c3ec46a9eec0e0636d3b1", @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700ad2b595162642900b8ba3af537d0d68b787fb55b8d46004f615bd7b903d271518a06cc27dcf81d20e59e233aae85438b18a15625072ee31b05f96df662e1bad65621b27043e4c016acbffaaaa9a7a71df2b450d23b0126acfada1c1b9a54cc00"/133, @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:47 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xf9fdffff, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:47 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid', 0xff}}]}) 05:07:48 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0xc0045878, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 681.239807][ T26] audit: type=1800 audit(1579324068.062:161): pid=19344 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16533 res=0 05:07:48 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000140)={0x78, 0x0, 0x0, {0xffffffff, 0x80000001}, 0x6, 0x2}) r1 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r2, r1, &(0x7f0000000000), 0x100000001) 05:07:48 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) utime(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x4, 0x4bd}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:48 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xfbffffff, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:48 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000001640)={0x2, 0x0, @loopback}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) r6 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x2428, 0x100) r7 = fanotify_init(0x40, 0x800) r8 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r7, r8, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000040)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x28) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r6, 0x84, 0x6c, &(0x7f0000000240)=ANY=[@ANYRES32=r9, @ANYBLOB="aa000000584046e81bc71fcaede2c00943015e054ef1961e848f7a0e3c49277c29a9d0479deadc4221437d4fac478c2497880a2497927f8db1a9f86177a8ccfc8b72d33808505aa688d6bcdede7eb65fcb8aec58d871a7c3f5b62bfdc38df2beee290b29205261067ed2b869250e2f23bbb2f4ede75563156446fbd6854387b9162bb0a6550c63a0e840501b1095903c0245c0fca5a59a6b07ff0173ad0676e66ecaa59cf255f5d87f3acf545356327d4ba34f90763aef3a5d5f0f6ab552047e4a6a85302d4e472dc01471a57f58033b73ea"], &(0x7f00000000c0)=0xb2) [ 681.406620][T19365] jfs: Unrecognized mount option "gidÿ0x0000000000000000" or missing value 05:07:48 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0xc0045878, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 681.521322][T19365] jfs: Unrecognized mount option "gidÿ0x0000000000000000" or missing value 05:07:48 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:48 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$KDSKBMODE(r6, 0x4b45, &(0x7f0000000040)=0x1) 05:07:48 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}, 0x22}]}) 05:07:48 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xfeffffff, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:48 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0xc008640a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 681.821488][T19391] jfs: Unrecognized mount option "gid=0x0000000000000000"" or missing value 05:07:48 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2000, 0x0) bind$vsock_stream(r4, &(0x7f0000000140)={0x28, 0x0, 0x2710, @local}, 0x10) 05:07:48 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00#', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:48 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0xc0189436, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 681.994910][T19391] jfs: Unrecognized mount option "gid=0x0000000000000000"" or missing value 05:07:48 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xff000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:48 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}, 0x3a}]}) 05:07:49 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2c}}], 0x10) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x4e1, @mcast1, 0x7fff}, 0x1c) r5 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) 05:07:49 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0xc0205648, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:49 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r4, &(0x7f0000000080)=[{{0x0, 0x2710}, 0x11, 0x4, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000)=0x5, 0x100000001) 05:07:49 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_init_net_socket$x25(0x9, 0x5, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="200029bd7000fddbdf2502000000d10000000000000008000700", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r10, 0x839}, 0x8) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r8, 0x8904, 0x0) ioctl$sock_ifreq(r8, 0x8929, &(0x7f0000000080)={'veth0_to_hsr\x00', @ifru_ivalue=0x1}) 05:07:49 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 682.318548][T19414] jfs: Unrecognized mount option "gid=0x0000000000000000:" or missing value 05:07:49 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xff0f0000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:49 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) pidfd_open(r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) [ 682.462686][T19414] jfs: Unrecognized mount option "gid=0x0000000000000000:" or missing value 05:07:49 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000040)={0x6, 0x1, 0x3ff, {0x6, 0x6}, {0x6, 0x9}, @const={0x766, {0x0, 0x9, 0x2, 0x8}}}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:49 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0xc0502100, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:49 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}, 0xff}]}) 05:07:49 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xffefffff, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 682.707745][T19522] jfs: Unrecognized mount option "gid=0x0000000000000000ÿ" or missing value 05:07:49 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = fanotify_init(0x40, 0x800) r6 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r5, r6, 0x0) sync_file_range(r5, 0x10000, 0x59, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r9, 0x839}, 0x8) ftruncate(r8, 0x200004) sendfile(r7, r8, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r8, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r10 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x2) ioctl$FS_IOC_MEASURE_VERITY(r10, 0xc0046686, &(0x7f0000000340)={0x1, 0x59, "c9fceac4f2e12d69f23d9a8273f3109c61b5b431ead63c3c0942d48e2489bee05869dfcb30c3932b8091dbbb98e06bb06a0a1d826d97314fafa47f53a35ec34eeabb48745323492604bf16aaf4077e390625de52e89aa87571"}) sendfile(r1, r0, 0x0, 0x100000001) 05:07:49 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=ANY=[@ANYBLOB="3c0000003358794509146c0ab7819ea143a6ff3467676bafb3a8f550cca70ff5dd5721d52363f9a5be21ab33f0", @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_DELAY(r8, 0x80084121, &(0x7f0000000280)) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) r10 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r9, 0x84, 0x75, &(0x7f0000000440)={r11}, 0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000300)={r11, @in6={{0xa, 0x4e21, 0x1ff, @mcast2}}, [0x8, 0xc1, 0x0, 0x80000001, 0x8, 0x1, 0x9, 0x0, 0x1, 0x8e5, 0x4, 0x1, 0x8, 0x81, 0xbb99]}, &(0x7f00000000c0)=0x100) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r8, 0x84, 0x77, &(0x7f0000000140)={r12}, &(0x7f0000000240)=0x8) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 682.780873][T19522] jfs: Unrecognized mount option "gid=0x0000000000000000ÿ" or missing value 05:07:49 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0xc058560f, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:49 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r8, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$DRM_IOCTL_AGP_INFO(r7, 0x80386433, &(0x7f0000000080)=""/37) r9 = socket$unix(0x1, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r10}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:49 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:49 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xffffefff, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:49 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0xc0684608, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:50 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_AGEING_TIME={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) sendmsg$can_j1939(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x1d, r10, 0x2, {0x1, 0x1, 0x2}, 0xfd}, 0x18, &(0x7f00000001c0)={&(0x7f0000000240)="7d190ffc1d4a4e1f9ad25c1de00ad401bac5eacdfcbb73e8334abbb5176e013081a247dfe78271e74ca388143190b28b55fa5a1d79ea32a5499137559e76e32ef146e96a566cd1b0716975dc112398743c91bd0c21165e47e581ef007bcf2af0973dfb6724984c7f4edc09b3f87403e94ef95eeb114d84aab5d1d0e0370532b0ce539bc452bbc76979be05c4a74ebfa7d587a7c6118ceb9bf93279ac6529e7e4859123d60a60b0e9e97bf5e0bf4f4b263aa2f17ebe8fee64e5cd7a04869a997b3373ff218c5b263f502175d22461c33fbe43a2b865915c21", 0xd8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r13, 0x839}, 0x8) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r12, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$DRM_IOCTL_RES_CTX(r12, 0xc0106426, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{}, {0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000140)={r14, 0x1}) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:50 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:50 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x2}) 05:07:50 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xfffffdf9, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:50 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x100000001, 0x448040) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r8 = fanotify_init(0x40, 0x800) r9 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r9, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r8, r9, 0x0) ioctl$FICLONE(r6, 0x40049409, r8) 05:07:50 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c100000911e25bfaaa5b89b10acd17b4d5582c36b60d3a989997f6c7e8541fa43d5fe8c2b5a1e7fd817bb0c491c4b630b27e28c4eb23d966494545d0e72ca994a05e524ca0651057d05b036a2f7e63576f30f9c27851965448f564615f34f5151c4dd26fb1784a0efc24b9e43025bb0ed", @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="080004000000000006000000000008000900010000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:50 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x3}) [ 683.538803][T19686] jfs: Unrecognized mount option "" or missing value [ 683.583031][T19686] jfs: Unrecognized mount option "" or missing value 05:07:50 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xffffff7f, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:50 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r9, 0x839}, 0x8) ftruncate(r8, 0x200004) sendfile(r7, r8, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r8, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$NBD_DISCONNECT(r8, 0xab08) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r6, r10, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$VIDIOC_S_EXT_CTRLS(r10, 0xc0205648, &(0x7f0000000140)={0x980000, 0x6, 0x7, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x990a66, 0x9, [], @string=&(0x7f0000000080)}}) ioctl$VIDIOC_SUBDEV_S_SELECTION(r10, 0xc040563e, &(0x7f0000000380)={0x1, 0x0, 0x100, 0x1, {0xffff, 0x2ab, 0x2, 0x101}}) r13 = socket$kcm(0x10, 0x2, 0x10) r14 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r13, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x68, r14, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {0x0, 0x4107}, {0x4c, 0x18, {0x60, @media='eth\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r12, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x1c, r14, 0x800, 0x70bd27, 0x1f, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r15 = socket$unix(0x1, 0x2, 0x0) r16 = fcntl$dupfd(r15, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r16}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 683.791044][T19801] jfs: Unrecognized mount option "" or missing value [ 683.870250][T19801] jfs: Unrecognized mount option "" or missing value 05:07:50 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x4}) 05:07:50 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:50 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xffffff8c, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 684.082944][T19811] jfs: Unrecognized mount option "" or missing value [ 684.141336][T19811] jfs: Unrecognized mount option "" or missing value 05:07:51 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x10) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20080) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) 05:07:51 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x5}) 05:07:51 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0xf713, &(0x7f0000000040)=0x0) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x4, 0xc0) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r8, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r10 = socket$inet6(0xa, 0x400000000001, 0x0) close(r10) r11 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r12, 0x839}, 0x8) ftruncate(r11, 0x200004) sendfile(r10, r11, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r10, 0x8904, 0x0) r13 = socket$inet6(0xa, 0x400000000001, 0x0) close(r13) r14 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r13, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r15, 0x839}, 0x8) ftruncate(r14, 0x200004) sendfile(r13, r14, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r14, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r17 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000007000000e9ffffff010000060400000008000000000000000000615fc32f00"], 0x0, 0x33}, 0x20) r18 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r18, 0x4000, 0x111, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r18, 0xc0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x5, 0x1}, 0x0, 0x0, &(0x7f0000000540)={0x2, 0x10, 0x77, 0x52}, &(0x7f0000000580)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x541a}}, 0x10) r20 = fanotify_init(0x4, 0x80800) r21 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r21, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r20, r21, 0x0) r22 = getpid() sched_setscheduler(r22, 0x5, &(0x7f0000000380)) r23 = socket$inet6(0xa, 0x400000000001, 0x0) close(r23) r24 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r23, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r25, 0x839}, 0x8) ftruncate(r24, 0x200004) sendfile(r23, r24, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r23, 0x8904, 0x0) r26 = socket$inet6(0xa, 0x400000000001, 0x0) close(r26) r27 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r26, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r28, 0x839}, 0x8) ftruncate(r27, 0x200004) sendfile(r26, r27, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r27, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r29 = fanotify_init(0x40, 0x800) r30 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r30, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r29, r30, 0x0) r31 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x1, &(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f00000019c0)=ANY=[@ANYRES16=r21, @ANYRESOCT=0x0, @ANYRESHEX=r30, @ANYRES32=r22, @ANYPTR=&(0x7f0000001940)=ANY=[@ANYRES64=r17, @ANYPTR, @ANYRES64=r23], @ANYRES32=r27, @ANYRES64, @ANYPTR64=&(0x7f0000001980)=ANY=[@ANYRES16, @ANYPTR64, @ANYPTR, @ANYRESHEX=r16, @ANYRES16=0x0, @ANYRES16, @ANYRESDEC=r9], @ANYRES16=r16, @ANYRES32=r14]], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r31, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x9, 0x6, &(0x7f0000000040)=@raw=[@ldst={0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffffffffffc}, @ldst={0x0, 0x2, 0x1, 0x2, 0x1, 0x18, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xcb, 0x0, 0x0, 0x0, 0x9}, @exit, @exit], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x37773f62a08bd2c3, [], 0x0, 0x0, r17, 0x8, &(0x7f0000000440)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, r19, r31}, 0x78) r32 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400)=r19, 0x4) r33 = socket$inet6(0xa, 0x400000000001, 0x0) close(r33) r34 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r33, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r35, 0x839}, 0x8) ftruncate(r34, 0x200004) sendfile(r33, r34, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r34, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r36 = socket$inet6(0xa, 0x400000000001, 0x0) close(r36) r37 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r36, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r38, 0x839}, 0x8) ftruncate(r37, 0x200004) sendfile(r36, r37, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r37, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r39 = socket$inet6(0xa, 0x400000000001, 0x0) close(r39) r40 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r39, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r41, 0x839}, 0x8) ftruncate(r40, 0x200004) sendfile(r39, r40, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r39, 0x8904, 0x0) r42 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001780)='/dev/sequencer2\x00', 0x181801, 0x0) io_submit(r4, 0x8, &(0x7f0000001900)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x5, r5, &(0x7f0000000480)="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", 0x1000, 0x7, 0x0, 0x1, r7}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x3, r2, &(0x7f0000000240)="8cf2d4accfdf6ac93ff314ba9320e21557cf4467843cc342b08e6fc967aa05f409d77376e39b18ed786e79e09258269fa62141f201ae0a1f1c3ca59407b3d1fd83765c47caafbfc763fe1c48c54ccfadd7e0702c7bb110dcd62bfb20b02a18ba5a74a3241a9c186cb0d4c96b1698b63a62f921767d735a9616bff058db1ea1e763bac2dc0b17c8ba79ed29833fb798cc6d326eb0dabe15979577f34e969ca936ae9d7c1258c62d8d0d6093d47c0791de3db066e49e388d501119d42e0786", 0xbe, 0xffffffffffff8000}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x2, r10, &(0x7f0000000300)="518d154890bdee5c92d525f615d58a5dac3e697cd6db09e3e164a829735bdbdf268d481c29913bee8b7c20d7384a8b37170dffa3d835d6240896dd23399504c3f1d69f5ebe77a152f221f690e584244aee54f6c5a4cbf58abb7de8c55c8e63a7231618e136b1596977c4dec809974dc999b97d03eca4896d6cfebc9354df51beb4b9e8711c95fd04bc17b916383907cb4056e7aba0e3fe3938fd9f667434b51e5402621d6f3c49427fe5dc98b7de382bad2b6718d9754055c47b4e22de978f9a65fe8069c75baa1191691818189ba5", 0xcf, 0x0, 0x0, 0x3, r14}, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x6, 0xfeff, r32, &(0x7f0000001480)="2ea3", 0x2, 0x0, 0x0, 0x1, r34}, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000001500)="5ccd86a3296ab08b1f9f73548e5110e8625f4d8bcf1852e96f166fd80ce9d5cc006d6ac643ae7e099cce71641c09874cbe6b6fef0d1d098516738b0c42189842bdc2ddf5edc404fd0b1dcb5c9516aa66681ec78f111c95a1fb81ca457f875f5c2880197f930b26c0d78bf58237264c4b3761c0b186b42217690044bd67b71e9c7ed8657c7549ff0d05da3dfa92f16e03fef2bf9608bd3117ca755285c153acb5a5de63a5b8caf880b626c5befa8c2bb5c59063c1497f44cc33b16dbb52bd9818612b70b2078edd7bebc08609c01872a45ff4a2a43c07878721fbff6110af90537c94f038786c38522e4f6440cf0e3f7e95729c", 0xf3, 0xfffffffffffeffff, 0x0, 0x1, r37}, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x5, 0x9, r39, &(0x7f0000001640)="8f56406547035f959efb283446d99fac5cd3ed8bab9742d49e7983ebb4ea905bb5fdfd066f4f18da62007866141933edc3436eb6e2583938ca8a3c850cd330276a50d40cc066cd973200a5a970f19e3440e426c74afe837ab0dfae45c2995711f440d4eaf5f47b0d697d384be4df54c7f2a4646df3a6470488db0d4e8787f0b576a85ced26f9f187b0edd885e29ee3cd644989d1a25330477f4b3373", 0x9c, 0x2, 0x0, 0x2, r0}, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x6, 0x8000, 0xffffffffffffffff, &(0x7f0000001740)="b2ddbb766545282615724e7771a31a0c4191457aa3529767787f0273f598666635f3c853b74e89efb5e53565f7afe7aa09baaa6074a0d1a9a5", 0x39, 0x4, 0x0, 0x2, r42}, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x8, 0x8, 0xffffffffffffffff, &(0x7f0000001800)="9e77299e7df07ba83dd4a7fe02410edd6d354848ed3c7bf61acce4f84cbbcfaf0fab715d8e5bb4e3c01fa188832792b60a3d751548dadf0bacdb99b2d37c5de3b1c55df44e0f85d5aa09d070db3746fb548f530be1e79fb7b92bb1720f639824455ca1feb7d5f718ae7838c3788e17597a1c9858862d00721d54aa3ab96939719828e14f669b46f0769504d6b55c5d79d0716894e6", 0x95, 0x40, 0x0, 0x2, r0}]) r43 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r43, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:51 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r10, 0x839}, 0x8) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r9, 0xc0506617, &(0x7f0000000080)={{0x2, 0x0, @descriptor="55274194966dd886"}, 0x9, [], "9f365423e6abe4ef3c"}) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:51 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xfffffff5, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:51 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x6}) [ 684.380422][T19925] jfs: Unrecognized mount option "" or missing value [ 684.434545][T19925] jfs: Unrecognized mount option "" or missing value 05:07:51 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r2 = fanotify_init(0x40, 0x800) r3 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r2, r3, 0x0) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r8 = socket$inet6(0xa, 0x400000000001, 0xfe) close(r8) r9 = open(&(0x7f0000000180)='./file1\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x5, 0x6, 0x8000, 0x7fffffff, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r10, 0x839}, 0x8) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) accept4$phonet_pipe(r9, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x800) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) r11 = fcntl$dupfd(0xffffffffffffffff, 0x2e7362857e29fddf, r1) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) 05:07:51 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xfffffff6, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:51 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x8, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(0xffffffffffffffff, r0, &(0x7f0000000080), 0x100000001) r8 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x5501c8b5dd584093) getsockopt$inet6_int(r8, 0x29, 0xd1, &(0x7f00000000c0), &(0x7f0000000140)=0x4) [ 684.672307][T20033] jfs: Unrecognized mount option "" or missing value [ 684.752745][T20033] jfs: Unrecognized mount option "" or missing value 05:07:51 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x7}) 05:07:51 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:51 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xfffffffb, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:51 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 685.001301][T20059] jfs: Unrecognized mount option "" or missing value 05:07:52 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xfffffffe, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 685.203036][T20059] jfs: Unrecognized mount option "" or missing value [ 685.253393][ T26] audit: type=1800 audit(1579324072.082:162): pid=20051 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=16550 res=0 05:07:52 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:52 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x4, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) creat(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) 05:07:52 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x8}) 05:07:52 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x1000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:52 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:52 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000480)={r8, &(0x7f00000003c0)=""/141}) ioctl$DRM_IOCTL_LOCK(r7, 0x4008642a, &(0x7f0000000140)={r8, 0x1}) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, &(0x7f0000000080)={r8, 0x2}) r9 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000017152df1d95bc493aff00275000000000000000000", @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r9, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:53 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000240)='./file0\x00', 0x141042, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000000)=0x10001) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) [ 686.255134][T20092] jfs: Unrecognized mount option "" or missing value 05:07:53 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xedc000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:53 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000580)=0x4) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_AGEING_TIME={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xfffffc00}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}, @generic={0x80, 0x8, 0x8, 0xffff, 0xfffffffb}, @ldst={0x1, 0x3, 0x0, 0x0, 0x9, 0x20}, @jmp={0x5, 0x1, 0x5, 0xa060d0db31410241, 0xb, 0xffffffffffffffe0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x10001}, @exit, @alu={0x4, 0x0, 0x1, 0x6, 0x2, 0xfffffffffffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0xc, 0x17, 0x1d057b5a6681a00, 0xffffffffffffffc0, 0x10}]}, &(0x7f0000000140)='syzkaller\x00', 0x80000001, 0xf7, &(0x7f0000000300)=""/247, 0x41000, 0x0, [], r8, 0x9, r10, 0x8, &(0x7f0000000240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x10, 0xb696, 0x800}, 0x10, 0xffffffffffffffff, r0}, 0x78) r12 = socket$unix(0x1, 0x2, 0x0) r13 = fcntl$dupfd(r12, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r13}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:53 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x9}) [ 686.315226][T20092] jfs: Unrecognized mount option "" or missing value 05:07:53 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000040)=[{{}, 0x1, 0x74, 0x2}, {{0x0, 0x7530}, 0xa, 0x4, 0x8}], 0x30) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:53 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:53 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_MIXER_READ_RECMASK(r3, 0x80044dfd, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) [ 686.585809][T20114] jfs: Unrecognized mount option " " or missing value 05:07:53 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000440)={r5}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={r5, 0xcc, &(0x7f0000000240)=[@in={0x2, 0x4e24, @rand_addr=0x7}, @in6={0xa, 0x4e23, 0x5, @empty, 0x7fffffff}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x10}, 0x101}, @in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @local}, 0x2}, @in6={0xa, 0x4e22, 0xfff, @remote, 0x3}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000340)={r6, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r7}, 0x8) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x4) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) prctl$PR_SVE_GET_VL(0x33, 0x112d7a) sendfile(r1, r0, &(0x7f0000000000), 0x100000004) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000480)={0x89, 0x2, 'client1\x00', 0x2, "297dc66c14b766d9", "c2f84f467f424129110cddddfa855bd5651bf2e9b10d8b26e595290cc80ea64e", 0x8000, 0x4}) 05:07:53 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x1000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:53 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0xa}) [ 686.684879][T20114] jfs: Unrecognized mount option " " or missing value 05:07:53 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:53 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x4800000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:53 executing program 0: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r6}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) [ 686.920596][T20234] jfs: Unrecognized mount option " [ 686.920596][T20234] " or missing value 05:07:53 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) clone3(&(0x7f00000004c0)={0x7260000, &(0x7f00000000c0)=0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000240), {0x1a}, &(0x7f0000000280)=""/223, 0xdf, &(0x7f0000000380)=""/170, &(0x7f0000000480)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x50) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) accept$packet(r0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r5, 0x839}, 0x8) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r6 = fcntl$dupfd(r4, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000140)=""/91, &(0x7f0000000040)=0x5b) [ 687.008874][T20234] jfs: Unrecognized mount option " [ 687.008874][T20234] " or missing value 05:07:53 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0xb}) 05:07:54 executing program 0: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700e014a881ecfbc97ed2696f67fb75b2e5de9ba32ebb5b25c0965abd704c0000010000000000da9d8a32b3ef35eb5c4ff1ff4831fd880ea29e282fb56ae415ad87d48a662dd4519e36114ae4241d6b5c993b506bc1ba7907c601974c563f29ddec9afc59562652efa8ee7de733a07a2107532b8fe13c9c7dec105eb724e41b21d77032a81a4b0d60c5cf4dd00ebac5880c5e2f4b941ce00243fe5848bdb17e278c9f28804c7daca47c4d0f988587e35e8bd24160e90c87eb69075e24cdd2af9143ce4442", @ANYRES32=r6, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r7 = fanotify_init(0x40, 0x800) r8 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r7, r8, 0x0) socket$l2tp6(0xa, 0x2, 0x73) r9 = fanotify_init(0x40, 0x800) r10 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r9, r10, 0x0) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r13, 0x839}, 0x8) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r12, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) sendfile(0xffffffffffffffff, r12, &(0x7f0000000280)=0x80000104, 0x2000100000011) r14 = socket$inet6(0xa, 0x400000000001, 0x0) close(r14) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r14, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r16, 0x839}, 0x8) ftruncate(r15, 0x200004) sendfile(r14, r15, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r15, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$SO_J1939_ERRQUEUE(r15, 0x6b, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r17 = socket$inet6(0xa, 0x400000000001, 0x0) close(r17) r18 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r17, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r19, 0x839}, 0x8) ftruncate(r18, 0x200004) sendfile(r17, r18, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r18, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SNDRV_CTL_IOCTL_PVERSION(r18, 0x80045500, &(0x7f0000000240)) 05:07:54 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) clock_getres(0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r6, 0x40106614, &(0x7f0000000000)) [ 687.207476][ T26] audit: type=1800 audit(1579324074.032:163): pid=20235 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=16552 res=0 05:07:54 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x7ffffffffffff, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 687.279192][T20255] jfs: Unrecognized mount option " " or missing value [ 687.326823][T20255] jfs: Unrecognized mount option " " or missing value 05:07:54 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0xc}) 05:07:54 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x100000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 687.630080][T20334] jfs: Unrecognized mount option " " or missing value [ 687.658887][ T26] audit: type=1800 audit(1579324074.482:164): pid=20247 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16557 res=0 05:07:54 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:54 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) chmod(&(0x7f0000000040)='./file0\x00', 0x111e82b5777a151c) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:54 executing program 0: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114}, &(0x7f0000000100)=0x20) write$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='threaded\x00', 0x9) splice(0xffffffffffffffff, &(0x7f0000001280)=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) getpriority(0x0, 0x0) r6 = semget(0x2, 0x3, 0x55d52e70b8058272) semctl$SEM_INFO(r6, 0x0, 0x13, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x101000, 0x0) ioctl$SG_GET_NUM_WAITING(r7, 0x227d, &(0x7f0000000080)) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000180), 0x0) splice(r8, &(0x7f0000001280), r7, 0x0, 0xfffffffffffff808, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x800000a, 0x0) add_key$user(&(0x7f00000002c0)='user\x00', 0x0, &(0x7f00000005c0)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c8278759", 0x2c, 0xfffffffffffffffe) lstat(0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) [ 687.755935][T20334] jfs: Unrecognized mount option " " or missing value 05:07:54 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x10}) 05:07:54 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x200000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 688.015773][T20420] jfs: Unrecognized mount option "" or missing value 05:07:54 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x2402, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000140)='./file0\x00', 0x10008000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f0000000040), &(0x7f0000000080)=0x4) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40, 0x0) ioctl$SIOCX25GCALLUSERDATA(r5, 0x89e4, &(0x7f0000000240)={0x57, "ce6d9750acc5289fdf4f918d52c0b1e634e039e3ec58be0cc3390290dc9b3b3c9d2a2d335c443d776fc6f47f9211fe61e8b49e9780d80b348dd3b247c9be3c92d09712504fa7a176e15621415968494164423f238918caae170ee787049c9c5e66d8c98c64b9ea74756f393f0236c41a55cf93d2615c6fb4348395d63261f9ed"}) fcntl$dupfd(r3, 0x0, r2) sendfile(r1, r0, 0x0, 0x100000001) 05:07:54 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000280)={0x1e2e3ba1a99088ab, 0x416, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r8) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000080)=0x60, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x1, 0xffffffe9}, {0x7fff, 0x401}]}, 0x14, 0x2) r9 = socket$unix(0x1, 0x2, 0x0) r10 = fanotify_init(0x40, 0x800) r11 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r10, r11, 0x0) r12 = socket$inet6(0xa, 0x400000000001, 0x0) close(r12) r13 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r12, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r14, 0x839}, 0x8) ftruncate(r13, 0x200004) sendfile(r12, r13, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r13, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r15 = fcntl$dupfd(r9, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:55 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r6, 0xc080661a, &(0x7f0000000140)={{0x1, 0x0, @reserved="59a14f6d3b1993f927df4a57aa76c76be6f96a2e9b233581029270845ef5c0f1"}}) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:55 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x23}) [ 688.083161][T20420] jfs: Unrecognized mount option "" or missing value 05:07:55 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:55 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x300000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 688.351281][T20501] jfs: Unrecognized mount option "#" or missing value 05:07:55 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x48}) 05:07:55 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r6, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r9, 0x839}, 0x8) ftruncate(r8, 0x200004) sendfile(r7, r8, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r8, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r10 = socket$inet6(0xa, 0x400000000001, 0x0) close(r10) r11 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x4c, &(0x7f0000000380)=[@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e20, 0x4, @loopback, 0xfa}, @in6={0xa, 0x4e20, 0x3, @remote, 0x3}, @in={0x2, 0x4e23, @local}]}, &(0x7f0000000340)=0xfffffffffffffef0) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r12, 0x4) ftruncate(r11, 0x200004) sendfile(r10, r11, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r11, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000240)={0x65, 0x2, 0x4, 0x0, 0xffffff5e, {0x0, 0x7530}, {0x1, 0xc, 0x20, 0x2, 0x5, 0x3, "db8b5462"}, 0x8000, 0x4, @planes=&(0x7f0000000180)={0x7, 0x40, @userptr=0x4ce, 0xffff8000}, 0x81, 0x0, r11}) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x59) r14 = socket$inet6(0xa, 0x400000000001, 0x0) close(r14) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r14, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r16, 0x839}, 0x8) ftruncate(r15, 0x200004) sendfile(r14, r15, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r15, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$TIOCGICOUNT(r15, 0x545d, 0x0) sendfile(r1, r0, 0x0, 0x100000001) [ 688.413884][T20501] jfs: Unrecognized mount option "#" or missing value 05:07:55 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x400000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:55 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) write$P9_RREADLINK(r2, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:55 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x4c}) [ 688.640802][T20618] jfs: Unrecognized mount option "H" or missing value [ 688.735440][T20618] jfs: Unrecognized mount option "H" or missing value 05:07:55 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:55 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) syncfs(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x28, r6, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x5}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x4c}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1108000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0xd0, r6, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xfff8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x91}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x69, 0x60}}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x10040040}, 0x24000810) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:55 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000440)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080)={r4, 0xffffffff}, &(0x7f00000000c0)=0x8) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r8) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r9 = socket$unix(0x1, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r13 = socket$inet6(0xa, 0x400000000001, 0x0) close(r13) r14 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r13, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r15, 0x839}, 0x8) ftruncate(r14, 0x200004) sendfile(r13, r14, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r14, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) bind(r14, &(0x7f0000000240)=@phonet={0x23, 0x4, 0x2, 0x2e}, 0x80) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r16, 0x839}, 0x8) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r12, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r12, @ANYBLOB="0600060001000000060006000000000008000900010000dd"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:55 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x500000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 688.956389][T20634] jfs: Unrecognized mount option "L" or missing value 05:07:55 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x68}) [ 689.064083][T20634] jfs: Unrecognized mount option "L" or missing value [ 689.173138][T20657] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 05:07:56 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x600000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 689.260634][T20693] jfs: Unrecognized mount option "h" or missing value 05:07:56 executing program 1: openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) fspick(r5, &(0x7f0000000140)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r8, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$KVM_GET_API_VERSION(r7, 0xae00, 0x0) 05:07:56 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) ptrace$pokeuser(0x6, r8, 0x0, 0xffffffffffffff4e) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40140010}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 689.349040][T20693] jfs: Unrecognized mount option "h" or missing value 05:07:56 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) syz_open_procfs(r8, &(0x7f00000001c0)='pagemap\x00') r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r12 = socket$inet6(0xa, 0x400000000001, 0x0) close(r12) r13 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r12, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r14, 0x839}, 0x8) ftruncate(r13, 0x200004) sendfile(r12, r13, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r13, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x40018) sendfile(r1, r0, 0x0, 0x100000001) 05:07:56 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:56 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x6c}) 05:07:56 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:56 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000080)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES16=r7, @ANYBLOB="08000400000000000600"/24], 0x5}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:56 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0xfffffffffffdf2d3, 0x102) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000080)={0x2, 0x2, 0x7}) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000001c0)={0x6, 0x3, 0x4}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000140)=[{{0x77359400}, 0x16, 0x7, 0x30000}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r8 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) ioctl$FIBMAP(r8, 0x1, &(0x7f00000000c0)=0x2) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)=@ccm_128={{0x303}, "a887b69425e8c795", "fa84f14c5d37a28b1c3962df33ab71f6", "e9c2f3a3", "4ef77895e652bf2c"}, 0x28) 05:07:56 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000280)={0x7170a75c3c9b1c36, 0x77, &(0x7f0000000300)="7e18ce676294ab2e26066973ad29979cce30622ef1cbe339ac4c670945c8bf9a31e824c63c19a2bbf1886335d0db845b85877d265c7e4c48153028cdf410ce00f61dab18f049a03f0f959d317750336fa08266ac44229429f7f4a8dee5bb5ac558409605201acbd00f386ae811bb4da1e1e61fa2081ebb"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r8, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$DRM_IOCTL_ADD_MAP(r7, 0xc0286415, &(0x7f0000000380)={&(0x7f0000ffc000/0x3000)=nil, 0x2, 0x0, 0x0, &(0x7f0000ffd000/0x1000)=nil}) r9 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r9) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r10 = socket$unix(0x1, 0x2, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) r12 = socket$inet6(0xa, 0x400000000001, 0x0) close(r12) r13 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r12, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r14, 0x839}, 0x8) ftruncate(r13, 0x200004) sendfile(r12, r13, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r13, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$KVM_SET_CLOCK(r13, 0x4030ae7b, &(0x7f0000000080)={0x9, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0xc0000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r11}, @GTPA_O_TEI={0x8, 0x9, 0x2}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 689.813909][T20772] jfs: Unrecognized mount option "l" or missing value 05:07:56 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x800000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:56 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 689.958501][T20772] jfs: Unrecognized mount option "l" or missing value 05:07:56 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x74}) 05:07:57 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:57 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x900000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 690.234820][T20800] jfs: Unrecognized mount option "t" or missing value [ 690.344107][T20800] jfs: Unrecognized mount option "t" or missing value 05:07:57 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r3, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) bind$l2tp6(r2, &(0x7f0000000000)={0xa, 0x0, 0x10000, @local, 0x9, 0x1}, 0x20) r4 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendfile(r4, r0, 0x0, 0x100000001) 05:07:57 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f00000001c0)) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0xfffffffd}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000140)={r5, 0x8}, &(0x7f0000000180)=0x8) 05:07:57 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:57 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x7a}) 05:07:57 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15184a, 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x200400, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000280)={0x14, 0xcb6a3b32094d5d1e, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r6) r7 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r6) open(&(0x7f00000000c0)='./file0\x00', 0x24080, 0x1) keyctl$clear(0x7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r8 = socket$unix(0x1, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x406, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000180)={0x40, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_TID={0xc, 0x3, 0x1}, @GTPA_NET_NS_FD={0x8, 0x7, r9}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0xc1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:57 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xa00000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 690.875342][T20915] jfs: Unrecognized mount option "z" or missing value 05:07:57 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 690.903684][ T26] audit: type=1804 audit(1579324077.732:165): pid=20921 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir720864866/syzkaller.GDqkZT/876/file0" dev="sda1" ino=16625 res=1 05:07:57 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x200000000, 0x2002) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) semctl$SEM_STAT(0xffffffffffffffff, 0x2, 0x12, &(0x7f0000000140)=""/146) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:57 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xb00000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 691.089288][T20915] jfs: Unrecognized mount option "z" or missing value 05:07:57 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000300)={{{@in=@multicast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r7) lchown(&(0x7f0000000240)='./file1\x00', r5, r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) r11 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r12 = socket$inet6(0xa, 0x400000000001, 0x0) close(r12) r13 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r12, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r14, 0x839}, 0x8) ftruncate(r13, 0x200004) sendfile(r12, r13, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r13, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$VT_WAITACTIVE(r13, 0x5607) keyctl$clear(0x7, r11) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r15 = socket$unix(0x1, 0x2, 0x0) r16 = fcntl$dupfd(r15, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r16}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:58 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:58 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0xff}) [ 691.347392][ T26] audit: type=1800 audit(1579324078.172:166): pid=20928 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=16538 res=0 [ 691.378069][T20980] jfs: Unrecognized mount option "ÿ" or missing value 05:07:58 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000180)={'bridge0\x00', 0x2}) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {}, 0x1110002, 0xffffffffffffffff}}}, 0x90) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {r6, 0x0, 0x0, @ib={0x1b, 0x4247, 0x0, {"7dd3a2cc4b08e7c00d11ac792276f3f1"}, 0x7, 0x3f, 0x8}}}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) [ 691.432851][T20980] jfs: Unrecognized mount option "ÿ" or missing value 05:07:58 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xc00000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:58 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:58 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:58 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2140, 0x0) 05:07:58 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0006dcdf250200c9eb08000400880007000000000000000000006bbf09a08433dd69a0b9f9828c38d6c9e3e2ad052f7ff9e6b054673b727c4cb1b9f1e1cce1473ce3c42124ca94124f8db815cc2f3727d33fb3af6e58fa5e2cb7ec43589f92b77c788fb8a516ffd2ebd06b1341a678c3bbb5b527a5c926fb04bb965ca11b43aa650fc80388b3b1e92e4879887f3fd876ef738a6e18db0e12ca51f23a31f9765d3ec3a7c4e80dd6ae0213fcb59dd3f12f1bc422783ed1f85d5b953310c92e24a7a46ea7a48a8b6ab701118a87ef", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:58 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:58 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x1000000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:58 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0xff01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:58 executing program 4: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000440)={r5}, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000040)={r5, 0x8, 0xe3}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={r6, 0x8}, 0x8) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRESHEX=0x0, @ANYBLOB=',\x00']) 05:07:58 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x101000, 0x0) sendto$l2tp6(r2, &(0x7f0000000240)="41d6385aeabf6b1549f92097a1ed7f6a5f5c3b9c2cb04615c7a2eda0b452879481c8e179fa6305e8f05c4e285e979eaa39941325570d0206496f3d67c32b36e6d7f1019c0b22d09c0bc0583c304fe0f84138e2267166acf718a5b6fde27fec75381845b98920aa07e1de99b1524f65bd19f12539f1a6c86a88281ec8a287a90eadd2dbc955f0e44cd134057de307c0aa870513d82a09700fa99ec360e07439f42b6197b242daf47fdf78afcd7b03954d604fcea68fc5813c6ce22b35505474969ddc12946b18d5d9ee3e9b72b19d3eb7751ec3be461f665d7e7aae64ca35c3a58cd4d51a357e926283a73584efbbb7f7a3863454584c8694", 0xf8, 0x44000000, &(0x7f00000000c0)={0xa, 0x0, 0xfffffffe, @rand_addr="5dcf4594c50acaaac6dd90f446f03b63", 0x2, 0x1}, 0x20) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:58 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x4001fd) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="003ba38575d74916e77f0029bd7000fddbdf2502000000080004", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:59 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0xfffffffffffeffff) sendfile(r1, r0, 0x0, 0x100000001) [ 692.119484][ T26] audit: type=1800 audit(1579324078.942:167): pid=21066 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=16609 res=0 05:07:59 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:59 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x1f00000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:59 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:59 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000140)={'icmp\x00'}, &(0x7f0000000240)=0x1e) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r4) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x404800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x410000288c) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r7, 0xc05c5340, &(0x7f0000000300)={0x8001, 0x0, 0x269b013e, {0xc9, 0xfff}, 0x9, 0x153}) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 692.201258][T21089] jfs: Unrecognized mount option "0x0000000000000000" or missing value 05:07:59 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x64080, 0x0) ioctl$USBDEVFS_CONTROL(r5, 0xc0185500, &(0x7f0000000140)={0x4, 0x16, 0x1ff, 0x9, 0x1f, 0x7, &(0x7f00000000c0)="cebb627fef97f612cafd6f874da1ccba705e2bce19675a1f5d2f9c8ff0fcd7"}) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:59 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x2000000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:59 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:59 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100000001) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/consoles\x00', 0x0, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f00000001c0)=0x1, 0x4) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r8, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$KVM_SET_VCPU_EVENTS(r7, 0x4040aea0, &(0x7f00000002c0)={0x1, 0x7f, 0x3, 0x0, 0x4, 0x80, 0x5, 0x81, 0x5, 0x3f, 0x7, 0xfe, 0x0, 0x4, 0x2e54, 0x5b, 0x4, 0x4, 0x1, [], 0x3, 0xff}) ioctl$VIDIOC_G_EXT_CTRLS(r5, 0xc0205647, &(0x7f0000000080)={0x980000, 0x4, 0x9, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x983bd0a6241b7cc0, 0x401, [], @p_u8=&(0x7f0000000180)=0x3}}) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000300)=""/137, &(0x7f00000003c0)=0x89) stat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000240)) [ 692.565357][ T26] audit: type=1800 audit(1579324079.392:168): pid=21089 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16549 res=0 05:07:59 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000000)) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000440)={r5}, 0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000040)={r5, 0x864, 0x1, [0x9]}, &(0x7f0000000080)=0xa) 05:07:59 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r2 = fanotify_init(0x40, 0x800) r3 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r2, r3, 0x0) fcntl$notify(r2, 0x402, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:59 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:59 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:59 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x2010000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:07:59 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat(r0, &(0x7f0000000280)='./file0\x00', 0xa040, 0x2) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f00000001c0)='/dev/input/event#\x00', &(0x7f0000000240)='./file0\x00', r4) r5 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = fanotify_init(0x40, 0x800) r7 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r6, r7, 0x0) r8 = dup(r7) sendmsg$IPSET_CMD_DEL(r8, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, 0xa, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x9}, [@IPSET_ATTR_ADT={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR={0x5, 0x3, 0xfe}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1000}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x40c0010) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) write$evdev(r0, &(0x7f00000002c0)=[{{r9, r10/1000+10000}, 0x4, 0x2}, {{0x0, 0x2710}, 0x5, 0x80}, {{0x0, 0x2710}, 0x14, 0x1, 0xffffff93}, {{0x77359400}, 0x1f, 0x40}], 0x60) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:59 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf250200000008bc9135e3646a3e70bd77f6fa0c00fce4babe93a40750b8c4df0400000000000800070098e8cd60e12e7a9a4b2c43950a8af32958f694b73714e9fa4a6a24feea13bbabf271311c0710384c6f0d5a6223076e8b245778e7f84fb895ba7c6500302079663ab7028bbb11190e609b49fd437a60161b32879e27e9c14df469583b122b5caab1f4085994142f1b0325b1c3cc7d600743457ea5174c36cbfa445b38ee3b1b0c9952e57a4e3a285ef24061d5ae909c3bd9ba3c4156865bc1", @ANYRES32=r7, @ANYBLOB="0800042ca12bcff5e1af8400000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:59 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:07:59 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x3, 0xfa00, {&(0x7f0000000480)}}, 0x2ca) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:07:59 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) r2 = fanotify_init(0x40, 0x800) r3 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r2, r3, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r3) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = socket$unix(0x1, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c000000198fb27d56fc7b51abf2a2c70c145e8781b26a5387531ea3977123110621fbe93298abc167972087807bd8e3f04ecab585c7b00d7eaada7e", @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r9, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r10 = socket$inet6(0xa, 0x400000000001, 0x0) close(r10) r11 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) accept4$rose(r0, &(0x7f0000000240)=@full={0xb, @dev, @rose, 0x0, [@default, @default, @remote, @netrom, @remote, @netrom]}, &(0x7f0000000280)=0x40, 0x800) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r12, 0x839}, 0x8) ftruncate(r11, 0x200004) sendfile(r10, r11, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r11, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$PPPIOCSFLAGS1(r11, 0x40047459, &(0x7f0000000080)=0x10001) r13 = socket$inet6(0xa, 0x400000000001, 0x0) close(r13) r14 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r13, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r15, 0x839}, 0x8) ftruncate(r14, 0x200004) sendfile(r13, r14, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r14, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) fsconfig$FSCONFIG_SET_BINARY(r14, 0x2, &(0x7f0000000300)='keyring\x00', &(0x7f0000000580)="952649e8ffaf18ad5b9405ca1f71ef09d0aba6e441d61aa652631283f70c597bfb57182f36d1408e9680270e7ec3dd08a86a424955a0be40378c9ba132bf61fb512f123441ace2e572019946033c9397daf269b25fbc9f95a6b665f90269213077b081b24c8047020abb60c5e9878585ff722b3d705d1131e29b0b7631ed6f2f110c30a0331e7ca57b479936471308cea22c5020a67bfaf57ea01bd40fa44bbe018565341797ef275a067937a20de84a2275d651d8e2bca6791430fef809c4d8afaa8d6a030bf042d5ae859e2416969bc11eecb759d2a426575bfa29911760510f88f3f73d6268b1f8f3763e63650a16342cf1f3e6d7ce13f8867dea4ae13649f67e2895ef693c8cc274a58e8e48545340d0fc6f57861ccd1436f17140a526b1ff80abd9c546eedefcfa504b301e254299a920b07f755b10f37016160209de0b44d6879e689e5656453417003373593f0b450f8c63118597aa6441ccacea76bc81a59ad72894395057a74f77a03c064432becd14801e73c1c0f83e1e4e8aa79c577adfacd7ac91757c2683447d2ae9f34eff6790d096c07717cb012510134537aaa84ea7a4db81180e1675ea71bf0cd906a3f8e6b500fa0e709171099a40dabdcdfd71c5245fc773cc021eec32e191357e087d103774703efc1fc5661460ebfeaddf768541723aa63181e4371461372578d7048d878484a83c433ef0e15c049693f7c555e2fa14438835faa1c13f8e58cf9a0fa0f3f2aa3724d483cf75d3be7bb1c01c9a74503eea767f8dafd0f526e55bcca68681542bb77103805f9667e957b099f58bcacf4d10a1a63f0c1c9275046258d5506959a11fb264fff4fb0081ef65552d0e3c7cbfe12cb02f603d9cf34768288adcae423b8bb4692a4783fab7029c4bee03e6c0ad0941e807bde12b924f0699c3344d96edc90218c8b604de263b226133a83db37b3279b0110561a4aa202a135aad63437027cf7310775392f0838a87564467fc0204cad0575a901fc6da2ff93be2233590a90ed77950d9a210a242afa8b02fb41aeb8596550c7a1c2e8d2bfdff1d013b68b9474d56f4db602038aadd0b1b2477abdeafb57be0fdcaa6270b6a489e379ea08d58b834f2aa86173e025d0413ace4357fe6aa73a7e50b6f7f9a9e78756c1876964570a81ec63146356e4fc4e4e8e90623abe842e3c4a17e1d83a28cdb6299e246961e9089ee53db6c838beec4baa5e6639458f28e3d4f53c1bf62c584955849d3181d226f06644df3c713014f229c21378604b55a66a93c51acbdfb6e7941d1a07957fe09c7c036d7258e382bd3a3ed33fe1918fb295d1d318031ee97bac34b2697ba7dbeefd7612cc5c4ea82429c94c7ce1eebb1b45ad72342579bd663dabdc3fd09efa5e438bb1d540fa5138eb4ab0cd0921cf67ac3955fa1a9407947ef2c31b787bb6620bf53d83579a4a4f8825377d0bc37c7b4e83a26dca2c4c11c1e861c7020bf1521d78774247d2f6dfdff126d9077a466d33bbb9646806e3c881c22329fab108708d00a1c5f1024b9e8a7bea8172aa8bd7ffd57be0c72dc4c696d924267e9d8243fc938121549f76fd677dc6a7b90bf52c87cabab06932be1b664dd0b3817276762fbcb0482dbfd39d5d442c052a5ccf3642d49a9c06e9a83a44d54933b06644cc25000edeaa148c63dc6517247b8641b9b3cc59930fbdea18575c3a097fd0e13fcaa4d8387ae402a1379a577d6c61bba5ae31fc95550a098c57d284931f9666eac6b5c746e305b819710e4ffab04c6d1d17788c2b71844f3a97c7dad24994821d4a0ffb7c0d5527d2dc222a5e2c98c1c0acbdf7eec8f2708e768a922ebe1348b5aa46bc4ae33e72cbd1f2250edc87a5035e7b2b76d5f5f52a38ea8204509c77e08e4defd45ef309df1a208a7c8f4b88aa3365e351a5f2d25f4516005f66d1e841ea036019c188e00c3154b41f8e2cad5eee6f1447c5ee82f0d77053523b0836ad8e0baae080ba6d7c5ece4c3b5abbf0d73d17b66a3fb516a514b6a8831fac49324ab63b7f88453826daa71ff7b7eea29ee416e848f777daa5f1f0ce891d742526f77a948251ebf99466bd857f88a8c4b634f6c0ce54c33d6825d4cbd95f936221ea8d6e7dd579fc335e7b5ae4de753cd17e8bc0831699ed5c368b15d56aa0e8e91084fae50ef43179697af7bc73d95717ef2d27fe8ae6d0d4178e9b9605f877cf46bf8a543d61269a47c307841d692e8e632c7ad1b49094a077be22059dc6d5f88f00406c61372ee074e9a79b3620041429d4380a78569788d1dd4bf2f835ad849f70f94aebf0326a748c831c22e35d36c58c613a460d9ab1e4931bc61b8f7ecad765b15c1accbe52e1fe595acc81657a59476012e76472ef4e71e836fc532c7dd7deeda77c7b5391110f481b2dab744907b69702ad4d1bcf000edd8e953a229f2265383ce87e654223c8a8878502a0bcf1b22afdb510076fd2376106f20f2ee472f54eee8e38508aac51e9f6362ec9b4f6851975577da4410897af0b5b134161d18d5a7aa792fdb9b15dbf816bbc6aaca57a280a92f91c98d5a374779d651911ccb75592d29d88186e6f0c0807c1ae25f14354df5e46fd7e6ccc56271a8443f5443a636de77cba15beb7a8e2520ad3fd710b3bc1e0a061c6b84fcbf12fb83d5e241550456fa03963aafc3b788bba064a32975fb23d5c7ea8e516bb312f6ba8f78d81c74468c8d97ca419a1e84dc082cd35f2dc87521fe6e73d7402a9f73471f3b8492bcf05f1339d1fc8fe6772750d6fe3cb30839a5edaa8a7216eaefd15fd5e4c67d0588b8d594d13b41e6bab429900fe36ad0e1b6b6f4cb2771ae38fcba02ec89c92aba8229c562e2e72cbc2f2d66c0c396f7e9394dd754144d509927f51046b21f4a1ca8fa48ee8189f56e9fdb22578b9d651f28248ffba8fd6cd0590e352173a0c79e68c8d83465b22fd20621b5e088d85ba560ff5bdfd3a385b9b79e398b36fb12a495a7a5bf9b7b1249c5755c27114cd89f7c4c8e0a0c49d13833ae3f4726bf03ab62229db41b00c4fda76d02c7b4c03eb2c307440f23692417103795d09bceb9d2363f6b67becaad89a5dfa0c1408638be50d69413ad62f4faf23b901dd865f4dce81005bd0e50f38c9fb589bd7f05394159d7a056a5bbbe6ad2009ace0dd061c83ccb95f253a3d81924a4cb2eaad922666263f4de02f8a39eb2a0d7066af92c7cad9be514b1bd1d764f536096628bf8a102b01dad806556f1eff70be4ae9d0dbf9f735fe84896002b516b868caf234a1eed65ea48dc59724911c9cd48aa0f6bec057c46cb863176bdfa64dd5044237c189edfc6fcab762250c4f469e43476c03f2b69a921fe7207e7a552eea1dccd518a7fd9b72e398c30c47ddb9275fdb8f751cf58e8a4e5055f8dffde7996e9a668323d2bb0f8eb627a9a4e3889cd3d0dee678b448e2affe4e9a031f297a906e9c39d420e26382c203b55cee433e4687664af89f1317f8e3b8714a83113a1d09484ffe2057b8abace62ef107597ca12835b3445f012501a5d447a0a37a4c34409f4378f2759e65e06b6cfd3b31da44a1f20aef3fa2e3578217c80a6df733634336f4e7a1c0fbc55db5c91bd6e8fe5291f7b58b43b821a3c67dd7e42c5f54797b7d7b2ac49fed2ff3385d18a274f4d0ab5ab03f38236268ac2142773a1d8b1b37af021a3fa486e3d346a7278fd50671a6fdefe416441a8e3d732517d2bb52c7a2c60fa8c02bdbe6f4e0c2eddb698a1c126e9f984c7c838b82efbcf9fa0321e1263d71f765e5391a252d5b89b3400ed37b045d1fa156015aa1b3580bc031811a699b24f67e72462ce849da03e6a7dcea4198e5944e7cdc1b33f6a01cb2b0b44304015e1fc18fb3ec86074bac3e7783960d340e62280b9978b7ecb0a5c123c4b8b50361f3b89ff36b93e7454b29f084092fddc2a77fb8e18b00b905bae74755d2b82dd7085870edb976c1b6ebc37fc4b9c280f585e80da1e0c4868fc47472b0fea6261d530559227d5fbd1af7fdc930317f97f137d413c5176d74caa765655fa272c1b0e67e761381e2d60c7c74aa843abdff79ebd880ef92b5baab9c6d993b3f21310e1af5f11c20d3ac92149880f63ca88ebff6deceb05546f795d9a634348c40b45d75e6e0fa4922a780c986de8dd2d7d4fdd9bbd2ad9c2180fd01d78844411b3c9e3b0c0110b8ccc6bf97525e84d8867d8deb8110822d4d56c43f32d0b5a9cf5a30d32fc16064ee304e8dc5ea009fd2792e539e4bce14328ed73993d7e62e0c9067d11d278a5f905181943e6e07a5979b7c264cab4fe1aa3dfa54749480e2a569a1e399d33bb39ec605f3fe158ddd38f326762b7079c161f81c49fcfd9cde02127f25eda0b94ec6f387871de113d924696a6c543a6ad851a75dce7239fd70d0c310f3bd7289a582ca71f5d93fa9f1a47db0e09951dd9599aad06a63b81dc771b2e72bacd4563d488ed682755bebdd36d6bc51d31794e2aebb80be73fcfa61ba13a97496cbeea38da410484eab04dfe700e395995949a66a752ebae711f9c581e9ff3d7e42b680d2c8b88cd6edf9fb4efb10b48f269f4e2be1ee9242a526279e96165e075cf7771e1044af98ccecd8186ef27d5fa35ce354ab3a4880f7cb26cd44608448c765e3419e188a7992bb512259a019271e822c12e85d41c5cf886130cc91fa9882c8283b8441e10c518ed27b8afdf06065fe6fba3ed2c8a4b26891de9702f7f5df5d0fc8bd945ab180839a12007497318719612b77a948aae2a9c8dc965d22fc47a5febf96e277bef6431d4e936a80acaf0d8a5e9885694d3f12522f8b760961770b54675096a3ea3871e0587748cf294eb52ac3d8534af5364a81f34429c1baf594f49fb9a37e77a43e79f9bb5b8d985be35c28484b75ad9e4d77a197e7521bacdb3c7c66e193656b5cb7c4fbc5c7ce6dd57c3b8e651616122d1b2c4d0606a59b5762eace06871348e1deb64e9cf51cb7a24e7ea3e9eae3dd492d8c65d4e95e59ec7f9ad564c1271edaa30bcb2e2c56f66387744eaff012cdd3c68dc094bc2a37d74ef2c28fafa04a980edecea8130b2aa0158f0fb374b1b1fb4e2cac5e1db1c0dadcaff8bca8a2b5523b0afcfa9143c3f39f9e9fe72822a7ae903a79d191cebbd6b9c2ad0bd7b6a288316458bc99ce4c39503cb9fb571c4fd8e886f0870453d8529c50648c737ecb0c5b5555f19179db387d4c739a9391770673f2c7ad267fe28d7c1e5b5f612c191f7efb6da07dfc15cde69bed7825b875250f3d1aaf190011f166269a4e24b5579ff1f5528880b3f94274d75cd1555b7332de7aac17629c14ab2dfb0210da71f1ef53f1d8aed92e4a8df61e7b7c7a741daa9bf26fc323b10b6b3fe28efc3885f8ad202e7ffb6e32a7f056f4b9905be310d46c8cfb089c6f1d7736502ccb76de1cb922c1ae7513d2b9860330e154d244d67226a4f51cbf6ff291be25c3bf5c319e8a03ad2f19bdc10ea42f77da314da06ddc1f8f7b813368a9b7353da72a60caedf8d0e9da92f8b040e7e9a21ffed1973f13c90df653451c866474d47e9af7a89b12546374f0e76a42481cdb332d3135e75ceae2684df770d6eb012ae0de5c1425011874776edead9953a8f3c7a40a53d5d1fc154890acc592148d8d8e65371c0b9273a2a79b4bb80dac400eabf38b53c7b9bf7d6b6bf9f7bf4da9d57df0bb8dcd538b45b37b40a1513f7ef65e4d1610cc83e2982baa59deb33f1dbfc1e9f42ea287a4574ded6b7f946783882e0499d6d3604ec815d2171b1dd47ccde64cf5c73fd8995842b", 0x1000) 05:07:59 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x2300000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:00 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000440)={r5}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={r5, 0xcc, &(0x7f0000000240)=[@in={0x2, 0x4e24, @rand_addr=0x7}, @in6={0xa, 0x4e23, 0x5, @empty, 0x7fffffff}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x10}, 0x101}, @in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @local}, 0x2}, @in6={0xa, 0x4e22, 0xfff, @remote, 0x3}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000340)={r6, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r7}, 0x8) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x4) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) prctl$PR_SVE_GET_VL(0x33, 0x112d7a) sendfile(r1, r0, &(0x7f0000000000), 0x100000004) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000480)={0x89, 0x2, 'client1\x00', 0x2, "297dc66c14b766d9", "c2f84f467f424129110cddddfa855bd5651bf2e9b10d8b26e595290cc80ea64e", 0x8000, 0x4}) 05:08:00 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0xa2000, 0x0) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000002c0)={0x1, 0x1, 0x8eb2, 0x2, 0x7f, 0x0, 0xb8d54bdd82dcceb1}) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="5c0000000108010100000000000000000a0000002c03048008000540000000080800064000000004080002407fffffff0800064000000000080006400000010005000300010000000900010073797a3100000000060002404a3a0000"], 0x5c}}, 0x8000) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='noquota,gid=', @ANYRESHEX=0x0, @ANYBLOB='.\x00']) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f00000003c0)) r2 = socket$alg(0x26, 0x5, 0x0) bind(r2, &(0x7f0000000000)=@isdn={0x22, 0x8, 0x9, 0x7}, 0x80) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) rt_sigqueueinfo(r3, 0x32, &(0x7f0000000300)={0x6, 0x5, 0x10000}) 05:08:00 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 693.338782][T21160] jfs: Unrecognized mount option "gid=0x0000000000000000." or missing value 05:08:00 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:00 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:00 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 693.454219][T21160] jfs: Unrecognized mount option "gid=0x0000000000000000." or missing value 05:08:00 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x20000, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000040)=0x1, &(0x7f0000000080)=0x2) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000000c0)) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./bus\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x25008, &(0x7f0000000100)={[{@noquota='noquota'}, {@gid={'gid', 0x3d, r1}}]}) 05:08:00 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:00 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f00000000c0)={0x1, 0xa0, 0x6, 0x7}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r8) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r9 = socket$unix(0x1, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r10}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000080)={0x10000}, 0x4) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:00 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$key(0xf, 0x3, 0x2) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r5) r6 = getpid() r7 = fanotify_init(0x40, 0x800) r8 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r7, r8, 0x0) fcntl$setpipe(r7, 0x407, 0x1) pidfd_open(r6, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r9, 0x20000103, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r5, 0x0}]) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r10 = socket$inet6(0xa, 0x400000000001, 0x0) close(r10) r11 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r12, 0x839}, 0x8) ftruncate(r11, 0x200004) sendfile(r10, r11, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r11, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r13 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_DEL(r11, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x70, r13, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, [], 0x2e}}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_PEER_V6={0x14, 0x9, @loopback}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xd}}}]}, 0x70}, 0x1, 0x0, 0x0, 0x4001080}, 0x4) 05:08:00 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:00 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000440)={r5}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={r5, 0xcc, &(0x7f0000000240)=[@in={0x2, 0x4e24, @rand_addr=0x7}, @in6={0xa, 0x4e23, 0x5, @empty, 0x7fffffff}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x10}, 0x101}, @in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @local}, 0x2}, @in6={0xa, 0x4e22, 0xfff, @remote, 0x3}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000340)={r6, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r7}, 0x8) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x4) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) prctl$PR_SVE_GET_VL(0x33, 0x112d7a) sendfile(r1, r0, &(0x7f0000000000), 0x100000004) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000480)={0x89, 0x2, 'client1\x00', 0x2, "297dc66c14b766d9", "c2f84f467f424129110cddddfa855bd5651bf2e9b10d8b26e595290cc80ea64e", 0x8000, 0x4}) 05:08:00 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x4000000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:00 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:00 executing program 4: stat(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0xfffffdad, 0x0, 0x3880083, &(0x7f0000000000)=ANY=[@ANYBLOB='yid=', @ANYRESHEX=r0, @ANYBLOB=',grpquota,\x00']) 05:08:00 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:00 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x4800000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:00 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000440)={r5}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={r5, 0xcc, &(0x7f0000000240)=[@in={0x2, 0x4e24, @rand_addr=0x7}, @in6={0xa, 0x4e23, 0x5, @empty, 0x7fffffff}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x10}, 0x101}, @in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @local}, 0x2}, @in6={0xa, 0x4e22, 0xfff, @remote, 0x3}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000340)={r6, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r7}, 0x8) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x4) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) prctl$PR_SVE_GET_VL(0x33, 0x112d7a) sendfile(r1, r0, &(0x7f0000000000), 0x100000004) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000480)={0x89, 0x2, 'client1\x00', 0x2, "297dc66c14b766d9", "c2f84f467f424129110cddddfa855bd5651bf2e9b10d8b26e595290cc80ea64e", 0x8000, 0x4}) 05:08:01 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r4) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r10, 0x839}, 0x8) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x46a, 0x24f11923277d3f66) r11 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x7fff) r12 = socket$unix(0x1, 0x2, 0x0) r13 = fcntl$dupfd(r12, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r13}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:01 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:01 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x4c00000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:01 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000440)={r5}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={r5, 0xcc, &(0x7f0000000240)=[@in={0x2, 0x4e24, @rand_addr=0x7}, @in6={0xa, 0x4e23, 0x5, @empty, 0x7fffffff}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x10}, 0x101}, @in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @local}, 0x2}, @in6={0xa, 0x4e22, 0xfff, @remote, 0x3}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000340)={r6, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r7}, 0x8) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x4) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) prctl$PR_SVE_GET_VL(0x33, 0x112d7a) sendfile(r1, r0, &(0x7f0000000000), 0x100000004) 05:08:01 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:01 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x6800000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:01 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f00000001c0)=0x9) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) write$selinux_load(r7, &(0x7f0000000240)={0xf97cff8c, 0x8, 'SE Linux', "e7d4cc9b41a5c14513fd3ece6ffbfd18543cb53c5f65f6870b078c6b42388aa46fba9c6385453f03e24f459e64f5536fc63b71e6f044782de59ecbdeb6b20914b9bdc1775ea2451ed9ed2507f215292972d39c67269acd4c7e392f2b91968ef842f7ded5dc51f7d1132bfa999589a23625d0014aa56e604df98da2e72861dedc618f87064b81369b185d58aff8a76c9a04b99fb39e95f2014f765d878134b4ea47bded0c5ccad004b042efc3953e77960d1d1587421e25dc1c073722667bd6fbf8b507a02ce3"}, 0xd6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r10, 0x839}, 0x8) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r11 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x20000, 0x0) r12 = socket$inet6(0xa, 0x400000000001, 0x0) close(r12) r13 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r12, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r14, 0x839}, 0x8) ftruncate(r13, 0x200004) sendfile(r12, r13, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r13, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) connect$nfc_llcp(r13, &(0x7f0000000340)={0x27, 0x0, 0x0, 0x2, 0x7, 0xff, "7ce8cc80e549bea4254f1feb87d6886786fdaa25bf7efd03a34d0dc6cb2f0d8ebba21921c301f58760bd2cf2e3ae1860d076ec2ad38eec8cc0f0ab9459d199", 0x32}, 0x60) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r11, 0xc4c85512, &(0x7f0000001480)={{0x8, 0xd3871b1089dfb085, 0x8, 0x7, 'syz0\x00', 0x8}, 0x0, [0x3, 0x40b, 0x8, 0x800, 0x0, 0x80000000, 0x7fff, 0x0, 0xe52, 0x6, 0x37, 0x8000, 0x800, 0x0, 0xfffffffffffffffd, 0x5, 0xc6, 0x1, 0x8, 0x5, 0x4005, 0x4, 0x800, 0x5, 0x0, 0x4, 0x20, 0x2, 0x4, 0xfffffffffffffff9, 0x7a, 0x3, 0x44ef72c0, 0x3, 0x8, 0x6, 0x4, 0x7, 0x8ba8, 0x1, 0x9, 0xc5, 0x2, 0x1, 0xfff, 0x10001, 0x13, 0x5, 0x7, 0x2, 0xd11, 0x200, 0x81, 0x4, 0x2, 0xff, 0x6, 0x2, 0x0, 0x9, 0x2, 0x5, 0x3, 0x1ff, 0x80000001, 0x0, 0x9, 0x0, 0x203c, 0x1, 0xff, 0x4, 0xffffffffffffbddc, 0x7fff, 0xc0, 0x80000001, 0xbcc2, 0x2, 0x8, 0x4, 0x9, 0xd950, 0x8, 0x7, 0x1, 0x80000000, 0x0, 0x8, 0x1, 0x2, 0x6, 0x2, 0x800, 0x400, 0x8, 0xffffffffffffffff, 0x1ff, 0x4, 0x5, 0xffffffffffff8001, 0x4, 0x9812, 0x8001, 0xffffffff, 0x7, 0x83, 0x7, 0xfffffffffffffffe, 0xa0, 0x1ff, 0x2, 0x6da, 0x1, 0x101, 0x7, 0x0, 0x300, 0x4, 0x1, 0x1, 0xffffffff, 0x7ff, 0x1ff, 0x5, 0x2, 0x100000001, 0x8, 0x4]}) ioctl$EVIOCGKEY(r9, 0x80404518, &(0x7f0000000480)=""/4096) 05:08:01 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x44000, 0x0) fcntl$setlease(r8, 0x400, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x8000) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB="44050000", @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf250200", @ANYRES32=r7, @ANYBLOB="080004002000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:01 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6e6f71756f746da9ac96b68e5e477b99f0a29c0f94cd4a4f923f803870751c5c1f2b21f9afb00ead66221f31ddcb88dc89d4412ee58440b4ca992a0a51fd282bae27a801a39b1da745ce303a6659ca25e8637d204b1d9e97de6c7606a4679942738a0e2fd84af8c31e17dd3c089fd0a203948f07e0011e9191a7933deae2a4f92bd727190d606b96ed593ed286a7b82a4e73d903cebf350d15e7de4df5215f6eb3c95cb6721e0fdbcf14df7c12dd6aee4e17fad177140135", @ANYRESHEX=0x0, @ANYBLOB="2c005eeab27073cb1ecf2116acd5736ea16d9abc93499f7d59bc47b84ce6fea40a42b376f98206b57979986c545c1d230711bcf64dadf0bee95fa94dc28c3a4d3888e9"]) lstat(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/zoneinfo\x00', 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x3f505) 05:08:01 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0xff000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:01 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000440)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={r4, 0xcc, &(0x7f0000000240)=[@in={0x2, 0x4e24, @rand_addr=0x7}, @in6={0xa, 0x4e23, 0x5, @empty, 0x7fffffff}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x10}, 0x101}, @in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @local}, 0x2}, @in6={0xa, 0x4e22, 0xfff, @remote, 0x3}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000340)={r5, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r6}, 0x8) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x4) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) prctl$PR_SVE_GET_VL(0x33, 0x112d7a) 05:08:01 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x6c00000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:01 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/93, 0x5d}, {&(0x7f0000000300)=""/183, 0xb7}], 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r8) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r9 = socket$unix(0x1, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r10, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:01 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0xff010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 695.000232][T21554] jfs: Unrecognized mount option "noquotm©¬–¶Ž^G{™ð¢œ”ÍJO’?€8pu\+!ù¯°­f"1Ýˈ܉ÔA.å„@´Ê™* [ 695.000232][T21554] Qý(+®'¨£›§EÎ0:fYÊ%èc} Kž—Þlv¤g™BsŠ/ØJøÃÝ<ŸÐ¢”à‘‘§“=êâ¤ù+×' `k–íY>Ò†§¸*NsÙο5 çÞMõ!_n³É\¶rÛÏß|ÝjîNúÑw50x0000000000000000" or missing value 05:08:01 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000440)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={r4, 0xcc, &(0x7f0000000240)=[@in={0x2, 0x4e24, @rand_addr=0x7}, @in6={0xa, 0x4e23, 0x5, @empty, 0x7fffffff}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x10}, 0x101}, @in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @local}, 0x2}, @in6={0xa, 0x4e22, 0xfff, @remote, 0x3}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000340)={r5, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r6}, 0x8) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x4) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) [ 695.158131][T21554] jfs: Unrecognized mount option "noquotm©¬–¶Ž^G{™ð¢œ”ÍJO’?€8pu\+!ù¯°­f"1Ýˈ܉ÔA.å„@´Ê™* [ 695.158131][T21554] Qý(+®'¨£›§EÎ0:fYÊ%èc} Kž—Þlv¤g™BsŠ/ØJøÃÝ<ŸÐ¢”à‘‘§“=êâ¤ù+×' `k–íY>Ò†§¸*NsÙο5 çÞMõ!_n³É\¶rÛÏß|ÝjîNúÑw50x0000000000000000" or missing value 05:08:02 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x7400000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:02 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:02 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) getsockname$unix(r0, &(0x7f0000000080), &(0x7f0000000140)=0x6e) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r4) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r10, 0x839}, 0x8) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x102) r11 = socket$unix(0x1, 0x2, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000280)=ANY=[@ANYBLOB="53feffff", @ANYRES32, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r12, @ANYBLOB="08f2006a4c0eda35"], 0x5}, 0x1, 0x0, 0x0, 0x200000d1}, 0x1002) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:02 executing program 4: statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0, &(0x7f00000000c0)) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x802, &(0x7f0000000240)) 05:08:02 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x7a00000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:02 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_aout(r5, &(0x7f0000000480)={{0x108, 0x0, 0x5, 0x239, 0x3bb, 0x4958, 0x31e, 0x610f5594}, "ac1a3bbefa9e8121316b8116c5fa9512193d4b62b53ef5ed208cd1392a1e805cfad8ad416df2e4e4fb215678dd9f020d3eed02cc69af3fb8e5f60937640a099df5ab0c7a02cd8a5671ba8003950e1769c179b70404277f9c44acc68fefc560a44c32d85673ac5a50d140f606f34c8548e3ad22d76289f22c388c5ca6db9580d6576c56369da9", [[], [], []]}, 0x3a6) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:02 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000440)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={r4, 0xcc, &(0x7f0000000240)=[@in={0x2, 0x4e24, @rand_addr=0x7}, @in6={0xa, 0x4e23, 0x5, @empty, 0x7fffffff}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x10}, 0x101}, @in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @local}, 0x2}, @in6={0xa, 0x4e22, 0xfff, @remote, 0x3}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000340)={r5, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r6}, 0x8) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x4) 05:08:02 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x201002) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000080)=""/82) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r6, 0x84, 0x6c, &(0x7f0000000580)={0x0, 0xef, "7404bd1a057af916567ec39aa71ae38560cae483011beaacaba6978d5409433a4024e652b56f488b2349bd22258c82b3db9a65a6bb876e578641625f2afab172bd01a819d5b2732590d91784467466a1f7b3c513940dc756bd5e9a85c22154b13fc1aadba41450bcb28492e6306176564ca294ee4e24d746d6c8dff44c15d2119968d30c36fff718efcc17ab47edf7dfec603a9c8926a3ce4de45e87906d67f524025cdcb038d38049f8af59d574fe2f096fd0b068caa6acce23693b449d70a6c428f255b60658caa15cfae6d950874ab5e97d48ed2da932d4571fc9872d48c1fdcacbd749dc8e9cff0377a26ac38a"}, &(0x7f0000000140)=0xf7) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000680)={r8, @in={{0x2, 0x4e22, @remote}}}, 0x84) r9 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r10 = socket$unix(0x1, 0x2, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd70d600fddb5fc74097dc00", @ANYRES32=r11, @ANYBLOB="080004000000000006000600000000000800090001000000ba92e85d2251e165960a86c2992144ee3719550e638c3d597da02113b0ef73d92225250240561b80a67f9b5e5bd2eec8ecc9587ba48218349f5bcffc877d769cbb193305beea7c9a9667fea1d697f275188ac3799bc414f8b54049d2c8db3321286bad049ea5b858dc2fceaa16b668fed3d8537d95cfb59738ac6798a94a487993278f6f68b1627a47d86d10"], 0x5}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:02 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:02 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000440)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={r4, 0xcc, &(0x7f0000000240)=[@in={0x2, 0x4e24, @rand_addr=0x7}, @in6={0xa, 0x4e23, 0x5, @empty, 0x7fffffff}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x10}, 0x101}, @in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @local}, 0x2}, @in6={0xa, 0x4e22, 0xfff, @remote, 0x3}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000340)={r5, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r6}, 0x8) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) 05:08:02 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x7fffffffffffffff, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:02 executing program 4: newfstatat(0xffffffffffffff9c, &(0x7f0000000500)='./bus\x00', &(0x7f0000000040), 0x2d00) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) setitimer(0x1, &(0x7f00000003c0)={{0x77359400}}, 0x0) syz_kvm_setup_cpu$x86(r6, r5, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r2, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC, @ANYBLOB=',func=KEXEC_KERNEL']) lstat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f00000000c0)={[{@uid={'uid'}}, {@uid={'uid', 0x3d, r7}}]}) 05:08:02 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x15984a, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x100000001) 05:08:03 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:03 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r13, 0x839}, 0x8) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r12, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_MIXER_WRITE_RECSRC(r12, 0xc0044dff, &(0x7f0000000280)=0x7cd) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r14, r10, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r14, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r7, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r15, @ANYBLOB=',func=KEXEC_KERNEL']) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x284042, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC=r15, @ANYBLOB=',aname=/dev/ifput/event#\x00,\x00']) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:03 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:03 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="6475d8f4b251f85da247a665f77986cb8a53173ee24a37b193238e770b54f996a224b738754a8f2418abcd34401f8178e9930322154e9c233b11d9d5a023d19f992de524f271ca1b08b97a67ba25ee1c33d7d40c8da282eeaa16b8df01abbd16561e799188af1ca17e35183cc359db453083fd03d5ad8ab3076b5804971b2d7883561d54e6c73938d424d1918ead53cbd05ed54f0443210e8e0b0892d3e6b7806fe7540d888d2b8ac8dd5df209f8d17163307a8c4ea59cccb9a07a476aaa7dbf844d698500"/209, @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="080004000000000007000000000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:03 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000440)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={r4, 0xcc, &(0x7f0000000240)=[@in={0x2, 0x4e24, @rand_addr=0x7}, @in6={0xa, 0x4e23, 0x5, @empty, 0x7fffffff}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x10}, 0x101}, @in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @local}, 0x2}, @in6={0xa, 0x4e22, 0xfff, @remote, 0x3}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000340)={r5, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r6}, 0x8) fcntl$dupfd(r8, 0x0, r7) 05:08:03 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="6e6f71756f74612c671f003d", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) 05:08:03 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x9bef070000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:03 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000440)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={r4, 0xcc, &(0x7f0000000240)=[@in={0x2, 0x4e24, @rand_addr=0x7}, @in6={0xa, 0x4e23, 0x5, @empty, 0x7fffffff}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x10}, 0x101}, @in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @local}, 0x2}, @in6={0xa, 0x4e22, 0xfff, @remote, 0x3}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000340)={r5, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r6}, 0x8) [ 696.589986][T21990] jfs: Unrecognized mount option "g" or missing value 05:08:03 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000080)) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 696.714094][T21990] jfs: Unrecognized mount option "g" or missing value 05:08:03 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:03 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r9, 0x839}, 0x8) ftruncate(r8, 0x200004) sendfile(r7, r8, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r7, 0x8904, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0xfffffffe, 0x1, 0x4, 0x100108, 0x8597, {r5, r6/1000+10000}, {0x4, 0x1, 0x8, 0x1, 0x0, 0x6, "94cefb6d"}, 0x7fffffff, 0x2, @userptr=0xc14, 0x1, 0x0, r7}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r10, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x1f, 0x1, [0xfff]}, &(0x7f00000001c0)=0xa) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:03 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="882c6701000000000000000f99128a4192f2ebb678d2e3", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) 05:08:03 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000440)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={r4, 0xcc, &(0x7f0000000240)=[@in={0x2, 0x4e24, @rand_addr=0x7}, @in6={0xa, 0x4e23, 0x5, @empty, 0x7fffffff}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x10}, 0x101}, @in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @local}, 0x2}, @in6={0xa, 0x4e22, 0xfff, @remote, 0x3}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000340)={r5, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) 05:08:03 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xae91225e00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:03 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000140)={0x2}) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8003) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$IP_SET_OP_GET_FNAME(r5, 0x1, 0x53, &(0x7f0000000080)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f00000000c0)=0x2c) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r8, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r7, 0x4008ae48, &(0x7f0000000240)=0x2) r9 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r10 = socket$unix(0x1, 0x2, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r11}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:03 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000440)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={r4, 0xcc, &(0x7f0000000240)=[@in={0x2, 0x4e24, @rand_addr=0x7}, @in6={0xa, 0x4e23, 0x5, @empty, 0x7fffffff}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x10}, 0x101}, @in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @local}, 0x2}, @in6={0xa, 0x4e22, 0xfff, @remote, 0x3}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000340)={r5, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) [ 697.017589][T22055] jfs: Unrecognized mount option "ˆ" or missing value [ 697.095453][T22055] jfs: Unrecognized mount option "ˆ" or missing value 05:08:04 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='no1uota,gid\b', @ANYRESHEX=0x0, @ANYBLOB="08d987da388f4d31be393e170b5254376607c841d1eb7e02d72e5c1ea35743094b30c615cdaebce49c57c344c8c72f6f09cf4cd7393a71d09adf06af6052262fb6df1fe9a8bbc049"]) syz_mount_image$ocfs2(&(0x7f0000000080)='ocfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f00000022c0)=[{&(0x7f0000000240)="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", 0x1000, 0x4}, {&(0x7f0000000100)="b7ce0cf4309a4df32d3aaae0e9d06e207a03ffdf2432143c33215028dadfe7ec5d1ffc94f8643535a07ca21ac5d8f46d3feaf506c382171ded376b8b2c179a1aa37ce2298cdc104887dad56766b09be6d94b34feca544cd3a75151ab5cde8dd3eaf5b67f714d", 0x66, 0x2714}, {&(0x7f0000002340)="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", 0xfffffffffffffea8, 0x5}, {&(0x7f0000002240)="6da6e4b4863b268b271cea60e8c5be1a0ce8ebbb5b5dc818768da079203721fc19ad8e1ad643f4354d80552351b86fdac0e7a770f201d2ec37f08c00bab17ce0a439d624586364a61750f526adb6fee282b5434849353dfc8294fcf952dbc89c5505d0e9b7d4d78c86c6106ae8895d98b683", 0x72, 0x127}], 0x4000, &(0x7f0000003340)='\xbe\x92?\xb7/Z\x04\x80\xee\xa0\xad\x04\x12\x97K 1\xcb\x93\xe9d\bx\xba\xe0\xf3\xe6\x88\xd1\x15\xe7\x06\xee\xc3K\xe6 \x84\xfd\xb2\x99\x96\xfc<\t\xd0\xe8\x9dO~14\xbb/R\xe6\x80y\x8f\xbc\x00\xec\xf2\b\'') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000180), &(0x7f00000012c0)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000001240)={0x7, 0x7, 0x2, 0x2, 0x39, 0x5}) 05:08:04 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:04 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xeb10000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:04 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000440)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={r4, 0xcc, &(0x7f0000000240)=[@in={0x2, 0x4e24, @rand_addr=0x7}, @in6={0xa, 0x4e23, 0x5, @empty, 0x7fffffff}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x10}, 0x101}, @in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @local}, 0x2}, @in6={0xa, 0x4e22, 0xfff, @remote, 0x3}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000340)={r5, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) [ 697.360562][T22140] jfs: Unrecognized mount option "no1uota" or missing value 05:08:04 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyprintk\x00', 0x901, 0x0) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) clock_getres(0x5, &(0x7f00000000c0)) 05:08:04 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="0800040000000000060006000000000008000900010000003af6b726ec03f6af0e3e6de5742323eac8a3ce9384c6ca1bc04a98f5b7a7ff8fea5a5cf61203f74a15ab709991ac8b95f87a801aef9e04d18cf5e9dd9bf718aac835bbb172feb03abb42746f9a62af3637abd5bde8bbceed7853ee31107b54d6a92b6e0c215766"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 697.445047][ T26] audit: type=1800 audit(1579324084.272:169): pid=22057 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16571 res=0 05:08:04 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xf5ffffff00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:04 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000440)={r3}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:04 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:04 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x6, 0x800) r5 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x4, 0xa2100) ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(r5, 0x40184150, &(0x7f0000000180)={0x0, &(0x7f0000000140)="56a756223bf4c325b20c731252ac6402e759db1b557facb2d3e2e947bdb02e83299de5eaa4e8aefc8d637ab0350a75888c2ee6d8c4052e6e71780ce2", 0x3c}) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:04 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, &(0x7f0000000080)) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf25f5a50d587ef2eec80200100008000402", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:04 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 698.130714][T22140] jfs: Unrecognized mount option "no1uota" or missing value 05:08:05 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:05 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x5, 0x74}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:05 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080100000000000000000700", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:05 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='noquota,gid=', @ANYRESHEX=0x0, @ANYBLOB="2ca3"]) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./bus\x00', 0x5, 0x4, &(0x7f0000000100)=[{&(0x7f0000000080)="b9d0cecb9581cc51cbabfcaf702987d5e7a776bb732575d95094a6d9138da7378dec93ee0e816e684dd2a9ad15e522b2f08d11c507d0f4ed2a6111", 0x3b, 0x4}, {&(0x7f00000000c0)="6c616e8d2d5ae9eddfab1a3019d14467bfe9817a75ef06c8e97bb5635249ec86", 0x20, 0xf91}, {&(0x7f0000000680)="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", 0x1000, 0x2}, {&(0x7f0000000240)="bae6151cdee6315eda9e9a06f0acb93e108d26258cafec303d47c16133c1b6504ad8f07bd14806a694c648e4c132d3016607395de85af1b3752d0222c89f97fb7117522f9621154ad39e65c16a4d70eac346185e39b7f61e0f562a9d7f13c43f22999ded67314ecc6caa8fbbbed2e74446f2be79710acbd3d2562bc136e545d994c2577c9ac310c14cfc5d121f9df57bf69e8e76ec489a01bb8555c5273bb66eba9402096551d1c18afa2f878a26512437ba70f672b5c21103b141cfa3625b1e0271e5d3325b595fbd0c62a0c860b6e03db10612bcf8e9b089fe12b8cafa20", 0xdf, 0xfff}], 0x10800, &(0x7f0000000180)={[{@noquota='noquota'}], [{@dont_hash='dont_hash'}]}) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ptrace$peekuser(0x3, r0, 0xffffffffffffffc0) 05:08:05 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xf9fdffff00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:05 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:05 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:05 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080), 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r10, 0x839}, 0x8) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SNDRV_PCM_IOCTL_STATUS32(r9, 0x806c4120, &(0x7f0000000180)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000040)={0xfffffffa, 0x7, 0x4, 0x251035e5deed09a0, 0x728, {0x0, 0x2710}, {0x2, 0x0, 0x1, 0x82, 0x2, 0x6a, "b1f8ed17"}, 0x2, 0x2, @fd=r6, 0xe22, 0x0, 0xffffffffffffffff}) ioctl$SIOCPNGETOBJECT(r11, 0x89e0, &(0x7f00000000c0)=0xc79a) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 698.477130][T22320] jfs: Unrecognized mount option "£" or missing value 05:08:05 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40002001}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_I_TEI={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_FLOW={0x6, 0x6, 0x4000}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r10, 0x839}, 0x8) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r9, 0xc0305616, &(0x7f0000000080)={0x0, {0x2b}}) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) ioctl$VIDIOC_OVERLAY(r7, 0x4004560e, &(0x7f0000000240)=0xac) 05:08:05 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:05 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xfbffffff00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:05 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) [ 698.673081][T22329] jfs: Unrecognized mount option "dont_hash" or missing value [ 698.736789][T22320] jfs: Unrecognized mount option "£" or missing value 05:08:05 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) lstat(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000040)='./bus\x00', 0x8, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="7baea832208d4b7e9eab253381f825f6b0665098a62a269e116ca30fa6e10c6aec3a52b3937340d66d6ff186b002d6cc6430587d4ae58f77d7186f8a5ed54ca7da9d354bece2bfcac441f6ab17674bb345a70f195a26db97153778fc7be1b073730a52da3753a569e6d89edd04ef8ff975de81f8df7dfdc51006982a10e4ae66298fb80b4c7471808610ebf00a1ae0ab80a69d62c7", 0x95, 0x401}, {&(0x7f0000000140)="6c2c3b371b619ad66d38e6913c921cb6e38cdd795a3c647690afd25c5e5f0c2fc919bfc9a4066222a9a14533f5ef61b5962a27a3fa853d22b0ab07da65366eae5419ae55eecb498811d3e61ed12652018904cbadaccdb1244cdf2b30f1fd0a670d94a995365e499d1fa4a396fcc77bb663c2be81249516d4c1eb0f3b2a30", 0x7e, 0x3}, {&(0x7f0000000680)="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", 0x1000, 0x8}], 0x2, &(0x7f0000000380)={[{@user_xattr='user_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x1b}}, {@user_xattr='user_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x7ff}}, {@measure='measure'}, {@euid_gt={'euid>', r0}}, {@obj_user={'obj_user', 0x3d, '-%\x1f'}}]}) listxattr(&(0x7f0000000480)='./bus\x00', &(0x7f00000004c0)=""/190, 0xbe) 05:08:05 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:05 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xfeffffff00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:05 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:06 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000380)) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x18005, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r13, 0x839}, 0x8) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r12, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$EVIOCGABS3F(r12, 0x8018457f, &(0x7f0000000580)=""/4096) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)=ANY=[@ANYRESOCT=r10, @ANYRES16=0x0, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x5}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:06 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 699.182174][T22457] erofs: (device loop4): erofs_read_superblock: cannot find valid erofs superblock 05:08:06 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r6, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) write$evdev(r5, &(0x7f0000000080)=[{{}, 0x11, 0x74, 0x7}], 0x18) r7 = fanotify_init(0x40, 0x800) r8 = socket$inet6(0xa, 0x100000003, 0x3a) ioctl$RTC_IRQP_READ(r5, 0x8008700b, &(0x7f00000001c0)) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r7, r8, 0x0) sendfile(r0, r7, &(0x7f0000000180)=0x2, 0x100000001) 05:08:06 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:06 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xff00000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:06 executing program 4: getresuid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)) r1 = getegid() syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@gid={'gid', 0x3d, r1}}, {@uid={'uid', 0x3d, r0}}]}) 05:08:06 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:06 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 699.446139][T22465] erofs: (device loop4): erofs_read_superblock: cannot find valid erofs superblock 05:08:06 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xff0f000000000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:06 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f0000000000)=0x2, 0x4) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:06 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:06 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000240)=0x80) sendmsg$NFNL_MSG_ACCT_GET(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40002000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x1, 0x7, 0x101, 0x0, 0x0, {0x7, 0x0, 0x2}, [@NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x8}]}, 0x20}}, 0x4004080) close(r2) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r5, 0x839}, 0x8) ftruncate(r4, 0x200004) sendfile(r2, r4, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x9f, 0x8}]}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:06 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x8001, 0x800) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf25e6000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r8 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) vmsplice(r8, &(0x7f0000000140)=[{&(0x7f0000000300)="bbfeecf2731bac81dbc5622e8d26aff8b33a1073c4f9a671b005ddc79ae120490dc81230122439536d8e961884ee3265cac06c983d684da479170e7cb2705b0c87219ec2bc530f8c3206a0bb9e64d06957126ed7a386c11e17cd45c95633914223d29e11743392c2032e5ded788cc9dcc7bcfe29722b5f07058555bea8e443919942ae40b85258680892be4b433c2e060e2134fee84b2fec3cccf586d5a43d81349790bb59bffcd2d53302098b697dc8867708f4c2d2fde070d75b7ed9f617cbcec63b1ca8ad849d196287c58547f3115aee3b9c3da439772324", 0xda}, {&(0x7f0000000080)="2624aea00c52", 0x6}, {&(0x7f00000000c0)="92673f", 0x3}, {&(0x7f0000000580)="f200b7fe1453395a3c2ec81d7533d45177afba402d89fd8013fcbedf8341bf5725cd1c883707a334366a6d42cc6559392e0686c68bad324b2b3e78c3ba57407db78600c782968959e5d1799432cd98bc3c1aadc127eadb44bda22d01db17a949b669b042eac71a9b8257f17fbbbf6a3611266545243e6d2b8a437bec535e7d84e6c8ba920bc1fe295e8ecec0237e4b688c36795bad9b5fc59aee43e65626364932dd0c9d0033d86e4289cff4d96ebb65330bb8338196d0e4b36f6f3f728e02e0c5d2eaa8812513f72a203a362b5d97d78da6b733ac39b2bdfed1406abd76cb78e88a8ae18cf079470f099669053d16b29810ee5e5c06ed", 0xf7}], 0x4, 0x3) 05:08:06 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xffefffff00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:06 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:07 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:07 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(r5, 0x1, 0x14, &(0x7f0000000080), 0x10) connect$bt_l2cap(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, 0x9, {0x8, 0x2, 0x1, 0x3, 0x0, 0x2}, 0x9, 0x70}, 0xe) r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r8, @ANYBLOB="08006cd0fde07ff8f6f81a0de4ad7f042d2a040001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:07 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:07 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x3800, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000040)) socket$vsock_stream(0x28, 0x1, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:07 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:07 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:07 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="08000400000000000d000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r10, 0x839}, 0x8) connect$l2tp(r9, &(0x7f0000000240)={0x2, 0x0, @empty, 0x2}, 0x10) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r11 = accept$phonet_pipe(r9, &(0x7f0000000080), &(0x7f00000000c0)=0x10) sendfile(r6, r11, &(0x7f0000000140)=0x3f, 0x2) 05:08:07 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r6, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) r7 = fanotify_init(0x40, 0x800) r8 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r7, r8, 0x0) sendfile(r3, r7, &(0x7f0000000040)=0x1000, 0x1) ioctl$TUNDETACHFILTER(r5, 0x401054d6, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0xa6, 0x8, 0x9, 0x3, 0x2, 0x3, 0x3e, 0x7, 0x18e, 0x38, 0x1c8, 0x9, 0x8000, 0x20, 0x1, 0x540, 0xf5, 0x1f}, [{0x70000000, 0x200, 0x8, 0x0, 0x2, 0xd6, 0xc81, 0x3}, {0x6474e551, 0x4, 0x2, 0x6, 0x3, 0x8001, 0x9, 0x3}], "ccbf7a17fe2c99322f4807fd6e3d9e9243911d69fbcc4d4bcf9fef319c894ab71ffc4e1998d3fb6494948a179db43be7852a74176d4912955860a7c70aeb3277829083662e3beaff521ce1ec2dee3411a133934053cc79b4a9f0ed904808c3eff00afa7f9ad09ea2f383cad38385eabc2fa36ee870e20eadc12e18d2404cb0420e3c6d38f9348a490664dec0d16f0f55c4d03714ceac959b063900ef72246ce5317c972a4000b477a10159d8814fa901dd13ec2590072370276b819ea9990ad1c95a750e3daa27236ea4249a2b081f4dede543037ccaec1007", [[], [], [], [], [], [], []]}, 0x851) 05:08:07 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) [ 700.607916][ T26] audit: type=1800 audit(1579324087.432:170): pid=22617 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16574 res=0 05:08:07 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) sendto$inet(r1, &(0x7f0000000000)="60976862e4315a97e6d1140466bb5f30593ec5126f3d8cad76385c305803a86ecc4bec906f9c77d5ad48929872c98e6f7e1edfafdcfeec434010a643f8a924ab200d977a0b239ff4e1f1559cb80cef8b3a345e6ae2b74355bab2ef58ec14d7da5ab5c30ae227fe5cc5f9cd6841f7fd106fec554cdd6013e03fff588606a038d8a8d168", 0x83, 0x0, &(0x7f00000000c0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) 05:08:07 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB="4bd62e17010da9454da02091b36568eb0fe1b26a2972a2ff8da9be951778ab9c0349a4b17af533d03545d99446a72d91f216f96392148b064fb39ea313166888d36130ebcb9d07b0e2e9b5cfae0633fc5f016925f2c70503cf0af8be3af8f0d4ba09b00bd32d67a6fe5b3d605293d88c68498d19b71e25c1821ffc799b6fa02d6fac944c89f86f5106ec3f4dc9d326c5ddc8923aecfed547fbb091ce5437b0ac404ba24aea0c8183bc346f51b5d6b390370c047170a623e6322b570a4d0f45be68cf", @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:07 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:07 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xffffffffffff0700, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:07 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:08 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:08 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xffffffffffffff7f, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:08 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_PCM_READ_CHANNELS(r3, 0x80045006, &(0x7f00000000c0)) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r8) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r9 = socket$unix(0x1, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) fstatfs(r10, &(0x7f0000000080)=""/46) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r10}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:08 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x223, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:08 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:08 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15884a, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) r4 = fanotify_init(0x40, 0x800) r5 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r4, r5, 0x0) sendfile(r4, r0, &(0x7f0000000000)=0xffffffdffffffffe, 0x100000000) r6 = fanotify_init(0x40, 0x800) r7 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r6, r7, 0x0) write$binfmt_script(r7, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x10e) uselib(&(0x7f0000000040)='.\x00') 05:08:08 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:08 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:08 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="000029bd7000fddbdf2502000000ecff04000000000008000700", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x5}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:08 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota', 0x22}, {@gid={'gid'}}]}) 05:08:08 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x9, 0xffc0}, {0x1, 0x851f}, {0x6, 0x3}, {0x949, 0x8000}, {0x101, 0x800}]}) 05:08:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:08 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r2 = getuid() r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r9, r8, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r5, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r10, @ANYBLOB=',func=KEXEC_KERNEL']) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r13, 0x839}, 0x8) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r12, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) statx(r12, &(0x7f00000006c0)='./bus\x00', 0x6000, 0x800, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f00000004c0)='btrfs\x00', &(0x7f0000000540)='./bus\x00', 0x4, 0x2, &(0x7f0000000680)=[{&(0x7f0000000580)="7d55642640e130a0e9b3472f6d8e1140a8a2ce32f8a4c0cc3b15f28c87882c8230bc3b7b8054ecba3c2197e874fa21149906cb24b59891164deb916e693212db0d3ca5217573aea5c8912723cd54b60ba288d5b2987014b82b59c4244d23f514966a97db1fedda3e6b0fa28bb2bebcffb6407629ed0a310a07076319c932b1493d03a1a55b38d8cbe16589d1fbad65acb386c1bae746501002ed2b0568219d2fef5753777e567e3f7244", 0xaa, 0x207}, {&(0x7f0000000640)="d8f67add96c83446cf33983d42", 0xd, 0x4}], 0x80088, &(0x7f0000000800)={[{@skip_balance='skip_balance'}, {@compress='compress'}, {@inode_cache='inode_cache'}, {@check_int='check_int'}], [{@uid_eq={'uid', 0x3d, r2}}, {@uid_gt={'uid>', r4}}, {@euid_lt={'euid<', r14}}, {@fsname={'fsname', 0x3d, 'keyring.#system&proc//)em0&md5summime_type!'}}, {@dont_measure='dont_measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, '127.0.0.1\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = fcntl$dupfd(r16, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) r18 = socket$inet6(0xa, 0x400000000001, 0x0) close(r18) r19 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) r21 = socket$inet6(0xa, 0x400000000001, 0x0) close(r21) r22 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r21, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r23, 0x839}, 0x8) ftruncate(r22, 0x200004) sendfile(r21, r22, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r21, 0x8904, 0x0) finit_module(r21, &(0x7f0000000480)='sq', 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r18, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r20, 0x839}, 0x8) ftruncate(r19, 0x200004) sendfile(r18, r19, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r19, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r19, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@initdev}}, &(0x7f0000000340)=0xe8) mount$9p_rdma(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@sq={'sq', 0x3d, 0x171}}, {@rq={'rq', 0x3d, 0xdc0}}, {@sq={'sq', 0x3d, 0xe10f}}, {@rq={'rq', 0x3d, 0x2d}}], [{@fowner_gt={'fowner>', r24}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}]}}) clock_gettime(0x0, &(0x7f00000000c0)) write$evdev(r0, &(0x7f0000000500)=[{{}, 0x1, 0x74, 0x2}, {{}, 0xc40d9b69d632009a, 0x4, 0x2}], 0x30) r25 = open(&(0x7f0000000040)='./file0\x00', 0x7f041, 0x100) sendfile(r1, r25, &(0x7f0000000000), 0x1000) [ 701.873740][T22898] jfs: Unrecognized mount option "noquota"gid=0x0000000000000000" or missing value [ 701.952914][T22898] jfs: Unrecognized mount option "noquota"gid=0x0000000000000000" or missing value 05:08:08 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota', 0x3a}, {@gid={'gid'}}]}) 05:08:08 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r5 = open_tree(r3, &(0x7f0000000080)='./file0\x00', 0x8000) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) r9 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r9) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r10 = socket$unix(0x1, 0x2, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = fanotify_init(0x40, 0x800) r13 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r13, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r12, r13, 0x0) r14 = socket$inet6(0xa, 0x400000000001, 0x0) close(r14) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r14, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r16, 0x839}, 0x8) ftruncate(r15, 0x200004) sendfile(r14, r15, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r15, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r17 = socket$inet6(0xa, 0x400000000001, 0x0) close(r17) r18 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r17, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r19, 0x839}, 0x8) ftruncate(r18, 0x200004) sendfile(r17, r18, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r17, 0x8904, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYBLOB="7f61a6b0c64faf8374c0dc6e35de2317cd58503404c8e8a12768098d5d24455efee957cbb2577a28c7be43ede50afb06f6e59863f44533d384bb532c1e45048c0de87cf550743978a9a99fa7788669389c46f33eb8a911e1df655c1b3797662097e701825431b8112b8ee14edf58d4f325656c42459e13e2c73531f4e83685345deb0592396d440084f93072ab142776235bd5cb4910bd1760784b4bc6cead2748fc37a3016873887faa068a00229abe0f4162bf81907aec050bf5df50c7cfddb04835beb6d0643499d4619deb61b1aa33dc1e684aa936cdfd", @ANYPTR, @ANYBLOB="cf879aad136847c335cd9702ed5649c1ab5f81172a3b72ee076a79097af1348d3b5fd5eafb53e137bac7c897d3e9370cd030cec4b7d5c517aa5819d77ac6355c95f5c27aae7889b3b782deba2a806d4646d193ab18bc2a0aac76d018ddb8077590a66aad338b937b24c72c5e1d56ae3a171e6f870ff9cc2485c74eb7cd99fb77877cce1185becc3bc3fa52fae712894986b935f281fc9736cc741f6b6aa967c302c67981c526001e1f189ae37124d3290ef0dd766ffecdc34b560500e674f7ea", @ANYRES16=r13], @ANYPTR=&(0x7f0000000240)=ANY=[@ANYPTR64, @ANYRES32, @ANYRES64=r7, @ANYRES32=r15, @ANYRES32=0x0], @ANYRES16=r5, @ANYRES16=0x0, @ANYRES16=r17], @ANYRES16=0x0, @ANYBLOB='\x00\x00)\x00\x00\x00\x00\x00\b\x00\a\x00', @ANYRES32=r11, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x5}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:08 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:09 executing program 4: getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noquota='noquota'}, {@gid={'gid'}}], [{@appraise='appraise'}, {@pcr={'pcr', 0x3d, 0x18}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '[posix_acl_accesscgroupuserGPL&/!eth0vmnet1.userppp0\'\\+$'}}]}) [ 702.148275][T22917] jfs: Unrecognized mount option "noquota:gid=0x0000000000000000" or missing value 05:08:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:09 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 702.262309][T22917] jfs: Unrecognized mount option "noquota:gid=0x0000000000000000" or missing value 05:08:09 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota', 0xff}, {@gid={'gid'}}]}) [ 702.342662][T23028] jfs: Unrecognized mount option "appraise" or missing value 05:08:09 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x40, 0x0) ioctl$RTC_UIE_ON(r5, 0x7003) fadvise64(r3, 0x79, 0x9, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) r9 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r9) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r10 = socket$unix(0x1, 0x2, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r11}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:09 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffe4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfba99536b44bc79e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) recvmmsg(0xffffffffffffffff, &(0x7f0000006a80)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000480)=""/173, 0xad}, {&(0x7f00000000c0)=""/94, 0x5e}, {&(0x7f0000000540)=""/139, 0x8b}, {&(0x7f0000000300)=""/99, 0x63}, {&(0x7f0000000600)=""/184, 0xb8}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/8, 0x8}], 0x7, &(0x7f0000000840)=""/55, 0x37}, 0xea}, {{&(0x7f0000000880)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000900)=""/188, 0xbc}, {&(0x7f00000009c0)=""/255, 0xff}, {&(0x7f0000000ac0)=""/249, 0xf9}], 0x3}, 0x7728}, {{0x0, 0x0, &(0x7f0000005480)=[{&(0x7f0000000ec0)=""/243, 0xf3}, {0x0}, {&(0x7f0000001040)=""/25, 0x19}, {0x0}, {&(0x7f0000001180)=""/153, 0x99}, {0x0}, {&(0x7f0000004380)=""/4096, 0x1000}], 0x7, &(0x7f0000001280)}}, {{&(0x7f0000005540)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x80, &(0x7f00000012c0)=[{&(0x7f00000055c0)=""/240, 0xf0}], 0x1}}, {{&(0x7f0000005f00)=@alg, 0x80, &(0x7f0000006340)=[{&(0x7f0000006080)=""/159, 0x9f}, {&(0x7f0000006140)=""/87, 0x57}, {0x0}], 0x3}}, {{0x0, 0x0, &(0x7f00000069c0)=[{0x0}, {&(0x7f0000006580)=""/216, 0xd8}, {0x0}, {&(0x7f0000006740)=""/205, 0xcd}, {&(0x7f0000006840)=""/154, 0x9a}, {0x0}], 0x6, &(0x7f0000006a40)=""/22, 0x16}, 0xff}], 0x6, 0x40000201, &(0x7f0000006cc0)={0x0, 0x989680}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x1, 0x4}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000280)={r8, 0x4}, &(0x7f00000002c0)=0x8) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000006d00), &(0x7f0000006d40)=0x4) socket$alg(0x26, 0x5, 0x0) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) socket$inet_sctp(0x2, 0x1, 0x84) r9 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-monitor\x00', 0x105000, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r9, 0x119, 0x1, &(0x7f0000000400)=0xc88, 0x4) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 702.525000][T23041] jfs: Unrecognized mount option "noquotaÿgid=0x0000000000000000" or missing value [ 702.619293][T23041] jfs: Unrecognized mount option "noquotaÿgid=0x0000000000000000" or missing value 05:08:09 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x1000, 0xdc, &(0x7f0000000480)="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", &(0x7f0000000240)=""/220, 0x8, 0x0, 0xa0, 0x8, &(0x7f0000000140)="cde543cfff11b9eed4f4489f47837c5c628409a42f488948a1219751856b2c1a9846c73c8ee28dbfda310267afa33ceeeff78757a4a12529e95f11819bf59677ed4f0f70e47bb871e4142c048dbdb5ab142f06cea382c3d0233385f6c324cfcddf06be7e9ee7cdded82da9573a1dfb0b473c3e271d6051866ba7c1c84c3b3d3d5fe454642c24f213853ee3be078564bf94911a5dc78e41f706811c3ad4a5e00b", &(0x7f0000000040)="acb7fd18f2afa4ac"}, 0x40) r1 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x173401) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) r8 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r8, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r9, 0x8904, 0x0) ioctl$FICLONERANGE(r5, 0x4020940d, &(0x7f0000000380)={{r9}, 0x6, 0xdf, 0xfff}) sendfile(r8, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) setsockopt$TIPC_CONN_TIMEOUT(r6, 0x10f, 0x82, &(0x7f0000000340)=0x80000001, 0x4) 05:08:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:09 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0xff01, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:09 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid', 0x22}}]}) 05:08:09 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 703.042153][T23160] jfs: Unrecognized mount option "gid"0x0000000000000000" or missing value 05:08:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) [ 703.139382][T23160] jfs: Unrecognized mount option "gid"0x0000000000000000" or missing value 05:08:10 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:10 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid', 0x25}}]}) 05:08:10 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 703.463693][T23183] jfs: Unrecognized mount option "gid%0x0000000000000000" or missing value [ 703.524364][T23183] jfs: Unrecognized mount option "gid%0x0000000000000000" or missing value 05:08:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:10 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) accept$netrom(r6, &(0x7f0000000140)={{0x3, @rose}, [@rose, @default, @netrom, @remote, @default, @null, @default, @rose]}, &(0x7f0000000040)=0x48) 05:08:10 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:10 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid', 0x2c}}]}) 05:08:10 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x2, 0x0, 0x0, 0x300f7532820fec23, &(0x7f0000000000)={[{@resize='resize'}, {@resize_size={'resize', 0x3d, 0x6dd}}]}) r0 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x80, 0x4000) write$selinux_context(r0, &(0x7f0000000080)='system_u:object_r:apt_exec_t:s0\x00', 0x20) [ 703.953566][T23198] jfs: Unrecognized mount option "gid" or missing value 05:08:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:10 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 704.115530][T23198] jfs: Unrecognized mount option "gid" or missing value 05:08:11 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid', 0xff}}]}) 05:08:11 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='noquota,gid=', @ANYRESHEX=0x0, @ANYBLOB="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"]) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @loopback}, 0xfffffffffffffdc0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000140)=r1) 05:08:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:11 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:11 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000000)=0x200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='noquota,gid=', @ANYRESHEX=0x0, @ANYBLOB='\x00\x00']) [ 704.430062][T23221] jfs: Unrecognized mount option "gidÿ0x0000000000000000" or missing value [ 704.481010][T23221] jfs: Unrecognized mount option "gidÿ0x0000000000000000" or missing value 05:08:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:11 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:11 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x502002) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000340)={0x0, 0x5f1d4ca0a23701c, 0xb1, 0x3, @buffer={0x0, 0xf6, &(0x7f0000000240)=""/246}, &(0x7f0000000140)="c4d761857b01bab746d21b46af253d0e90afcade95da3e55b63e605b71e2b7dbee46e674df3fcb6e513eb9b394153de40916b07e299172c3fc5f2bc33bc41ce8754fc73f76a63c4f744c686addccd27f986ddede5a0a2348b25490b43ba8ecd5a641b5bef15108cfc5ec2a2276d4d1723458d297abe0c5ac43334b4f577eb50e09b57754c3a4230d7334f167ce5070f50ab618dcf503c4ff9517722b9ddde75f6d706ffd04e6ab65d906c15e92373751d9", &(0x7f0000000040)=""/62, 0x5, 0x1, 0x2, &(0x7f00000000c0)}) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:11 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}, 0x22}]}) 05:08:11 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) [ 704.826178][T23241] jfs: Unrecognized mount option "gid=0x0000000000000000"" or missing value 05:08:11 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f00000002c0)={0x828, 0x1, 0x4, 0x10, 0x8001, {r3, r4/1000+10000}, {0x3f278679115821d1, 0x8, 0x20, 0x1, 0x1, 0x9, "bc5d16f2"}, 0x20, 0x3, @fd, 0x3, 0x0, 0xffffffffffffffff}) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x20004004}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=@ipv6_delrule={0x0, 0x21, 0x20, 0x70bd27, 0x25dfdbfb, {0xa, 0x80, 0x14, 0x1, 0x5, 0x0, 0x0, 0x7, 0x8}, [@FIB_RULE_POLICY=@FRA_FWMASK={0x0, 0x10, 0x8a7}, @FRA_SRC={0x0, 0x2, @dev={0xfe, 0x80, [], 0x1c}}, @FRA_SRC={0x0, 0x2, @empty}, @FRA_SRC={0x0, 0x2, @mcast2}]}, 0x2c}}, 0xc002000) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000340)={@empty, @empty, @dev={0xfe, 0x80, [], 0x1a}, 0x9b685d0, 0x101, 0x4, 0x600, 0x6ef8, 0x8401004c, r8}) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) pipe2$9p(&(0x7f0000000240), 0x2000) write$FUSE_DIRENT(r1, &(0x7f0000000040)={0x98, 0x0, 0x1, [{0x4, 0x0, 0x4, 0x9, 'jfs\x00'}, {0x0, 0x80000000, 0x7, 0x2, 'noquota'}, {0x4, 0x0, 0x10, 0xf0, '.-systemuserbdev'}, {0x3, 0x2, 0x7, 0xc9, 'discard'}]}, 0x98) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000000)='./bus/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@discard='discard'}]}) [ 704.954756][T23241] jfs: Unrecognized mount option "gid=0x0000000000000000"" or missing value 05:08:11 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:11 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:11 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:12 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}, 0x3a}]}) 05:08:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:12 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 705.318017][T23266] jfs: Unrecognized mount option "gid=0x0000000000000000:" or missing value 05:08:12 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:12 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$TCGETA(r6, 0x5405, &(0x7f0000000040)) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:12 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 705.465918][T23266] jfs: Unrecognized mount option "gid=0x0000000000000000:" or missing value 05:08:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) [ 705.553409][T23252] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23252 comm=syz-executor.4 05:08:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x17}}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e22, 0x9, @empty, 0x81}], 0x5c) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f57c7f878d470d269643df51381ab15325247a8acfaf09f96b990f4d0a10ebd2f548e90b6107546275d4ad0e8ca39ff7423c652f97c9111fbcbe65a2c3dccdc2ea01a6e2129b798d129dacc8fe9b839b312142f2304a2ec1abdaa54390fa3b0f6ddeaaba0b6f7e2d5d4420e9d98e7d467ac34211997a0b32c1a14340cde8287", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) 05:08:12 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}, 0xff}]}) 05:08:12 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0xff000000, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:12 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0xff010000, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 705.801984][T23291] jfs: Unrecognized mount option "gid=0x0000000000000000ÿ" or missing value 05:08:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) [ 705.860142][T23291] jfs: Unrecognized mount option "gid=0x0000000000000000ÿ" or missing value 05:08:12 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:12 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 705.957940][T23297] jfs: Unrecognized mount option "noWÇøxÔpÒid=õ«2RG¨¬ú🖹ôС½/TŽ¶uF']JÐèÊ9ÿt#ÆRù|‘ûËæZ" or missing value 05:08:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:13 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = semget(0x3, 0x5, 0x2e3) r2 = semget(0x2, 0x0, 0x200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000600)) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) syz_open_pts(r6, 0x80) r8 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r8, &(0x7f00000000c0), 0x2e) r9 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r9, &(0x7f00005fafd2), 0x2e) ioctl$FS_IOC_FSSETXATTR(r9, 0x80487436, &(0x7f0000000000)={0x1fffd}) r10 = socket$inet6_udp(0xa, 0x2, 0x0) r11 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r11, &(0x7f00005fafd2), 0x2e) ioctl$FS_IOC_FSSETXATTR(r11, 0x80487436, &(0x7f0000000000)={0x1fffd}) r12 = socket$inet6_udp(0xa, 0x2, 0x0) r13 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r13, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r14 = socket$inet6(0xa, 0x400000000001, 0x0) close(r14) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114}, &(0x7f0000000100)=0x20) ftruncate(r15, 0x200004) sendfile(r14, r15, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r14, 0x8904, 0x0) connect$inet6(r14, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x12}}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r13, 0x84, 0x1d, &(0x7f00000004c0)=ANY=[@ANYBLOB="010020808a23363d3f00f8bd756d97fa1d8105ecb637cdbafe30647ec3684e54079e73814cdfdebf83f9299b3f26a0efb9339ce7d77329c536ecf827fd08fdbe9e48a7ad239634", @ANYRES32=0x0], &(0x7f0000000180)=0x8) r16 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r16, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000440)={r17}, 0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={r17, 0x7f}, 0x296) write$binfmt_aout(r3, &(0x7f0000000a00)=ANY=[@ANYPTR=&(0x7f0000000780)=ANY=[@ANYRES16=r8, @ANYRES16=r9, @ANYRESHEX, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r13, @ANYBLOB, @ANYRES32=r10, @ANYRESHEX=r11, @ANYRES64=r12, @ANYRESDEC=r4, @ANYBLOB="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", @ANYRES16=0x0], @ANYPTR=&(0x7f0000000700)=ANY=[@ANYRES32, @ANYRESDEC=r2], @ANYBLOB="92c9473a9ad2178b5f4ff4f740224984df2624e09cf12ae897908071d53820f5cc1ffe8ff01c3766256d90788c05f2660dd0158f61acb20bad476219b2a1aa6723c08cffba9f2d7ea91756d637cef46d4c9320a38015c03b93fe52c637e643fae61be08c097e8a4449458267054c7a669d5436fdfaf9ed1a795071301d212859cab4cb04a98d7a9e89910f53629473b9b2a22660b587fcbb6aa6e22a5d6c506db799e778611adbcf90b3bfa638d800215db9c53358a3a9d57f516c6ae241854bd42ab6d2e5a22f6b96b2fb33cc9cc43fdba5e9b0ea44424d29a720c9e5744f213d5eaa5fec36d0c82c07af3452dc8fc176d055", @ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRES32], @ANYRESDEC=r1], @ANYBLOB="07f5c4dcfc1487e3e44224ea90170954e4c884fce85ad6aaf51ac8041bc5fbebb5687bde082e0392874a365ae0daf3fe7a29cdf5fea229522dddb9e5ac46c11c60e76495858bc26a96fbf1a9852427143b6d067a12054d7af9f439d2b9067637f4e4609b645ac016e6a285e5594b3c77a3251973b0aaccfc59d6b6249cafceb9b39f88f4691f586c329486e06bf93b5b7f57deab47a544145e83dc99e7808c533e9d757e9487b78f2e0b0c21292d8db073e8a5b39b8b27cda2ea3b116f31905b933d54d6f8476b3fb8fc71d8012750d3bd69db8ce9fc5bc0e994"], 0xfffffffffffffd29) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYRES64=r1], 0x1}, 0x1, 0x0, 0x0, 0x4020005}, 0x1) semctl$GETNCNT(r1, 0x3, 0xe, &(0x7f0000000140)=""/124) r18 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r21 = fcntl$dupfd(r20, 0x0, r19) ioctl$PERF_EVENT_IOC_ENABLE(r21, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r18, r0, &(0x7f0000000000), 0x100000001) 05:08:13 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r1, 0x839}, 0x8) ftruncate(0xffffffffffffffff, 0x200004) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000240)={0x0, 0xb}, &(0x7f0000000180)=0xfffffffffffffff4) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000000)=0x3, 0x4) 05:08:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:13 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x2}) [ 706.059921][T23307] jfs: Unrecognized mount option "noWÇøxÔpÒid=õ«2RG¨¬ú🖹ôС½/TŽ¶uF']JÐèÊ9ÿt#ÆRù|‘ûËæZ" or missing value 05:08:13 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:13 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="6e1d96ab3d00000009000000", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./bus\x00', 0x4, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="18553ea44f3a27b9f0ac418bf59fd08684c6fc1573c5aab3f1a85cc8f52e765a17771baa6362cbe6ab1049ed5a82bedffee2ec810d019c26f8bd03d7627fa3ee83f72dcf3608d64a6765a790a9968b8e5ce43e8b6b", 0x55}, {&(0x7f0000000100)="879c76fe9f2f8fdd08086106ec330a7f7f1d46950bff928b9f924abe2e68e25a3472b549df46dea7a1a045089c08e61036855a856617f0e6f19c4cd04c5d1b91a0af1bfc48a9bd4fb9dec5f738bcc1a46855e23a652a69ebfa7231d63ffcec79e67ab002e248b55d7af47908294c44f9fa066b19b6f932b0f877541c6b274bed863cd33594d82fa7ece8f853877d57598a6c945d8de4913023c4b08da76223", 0x9f, 0x9}, {&(0x7f0000000680)="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", 0x1000, 0x5}, {&(0x7f0000000240)="2169330882dd41ba19fe170e88ac4bf90c6d2c484fa9404b3cfc6ed6205cc069b04ca0be1c780f11bf9a3a98b5d0ff5a2ec5ee74e83def57b8a353a691ee1d95a2ee99c686fa62b2a22920", 0x4b, 0x9}, {&(0x7f00000002c0)="b0010745ee0d8ca8cec55f39b85995c06d338495329575b3e456608d6095950a9e47d8a420b4af34b1c12023d17f4201ed648866d6b8353c5172e67fb59dc90c32f8b5bb0adf6975093d401ff3d94634a1b19735021b7d67a7c2f7ddf98bddb30b49d190e5efcac20c4b9dd23ab383104a5b725ff5751835e7c187f20ba272edf77360fd390529f9d91e79dcdaa0b6614fa10e7b5880dfd4a647965eb11db4511483548914464b785a88bb2ffb54d89c6ec8867ad8d9264b0dc68d30ce1e174c7c59d8c1bcfc9520ef11cbe99801800b8eae", 0xd2, 0x1}, {&(0x7f00000003c0)="b4c810ceb5bd583db2f3180f4c85d26d5d42d1b0339cc2f91662aaf9187775914e331b4f114974489015ca45adc1a67ffd6e9265f5a7bc1a68b43094df379fae386df83319f5907c0dbaf18097182c694deae2a33bf0c5f4706c8de954740c257ee52ca15386ac7f899c5fa67178f7f6f765722597def04440e0cf774c34a84d7c5f96f06702db2536d562ae0bcdf0b155ed5b4bd54ac9180ca41126f5d528205d24d17ae1e13c7f1c0b06aaffbb11d79bc6e33d72ed8b65f804bef4252e5ddaf789e04cd995c886d16c013e6bd6fd6f6c434afe993c1b648ccae9768eb32c0ca2c415c3", 0xe4, 0xf29}], 0x2a000, 0x0) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = accept4(r0, 0x0, &(0x7f0000000580), 0x800) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f00000005c0)=0x3, 0x4) 05:08:13 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x3}) [ 706.526808][T23328] jfs: Unrecognized mount option "" or missing value [ 706.567358][T23328] jfs: Unrecognized mount option "" or missing value 05:08:13 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r3, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) write$P9_RREADDIR(r2, &(0x7f0000000140)={0x68, 0x29, 0x2, {0x7fffffff, [{{0x40, 0x0, 0x8}, 0x2, 0x7f, 0x7, './file0'}, {{0x4, 0x4, 0x4}, 0x0, 0x3, 0x7, './file1'}, {{0x40, 0x2, 0x6}, 0xadb, 0x91, 0x7, './file0'}]}}, 0x68) r4 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r4, r0, &(0x7f0000000000), 0x100000001) 05:08:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:13 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 706.680048][T23340] jfs: Unrecognized mount option "n–«=" or missing value 05:08:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) [ 706.822974][T23340] jfs: Unrecognized mount option "n–«=" or missing value [ 706.834284][T23347] jfs: Unrecognized mount option "" or missing value 05:08:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:13 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xffffffffffffff6c, 0x0) ioctl$USBDEVFS_DISCSIGNAL(r0, 0x8010550e, &(0x7f0000000180)={0x40, &(0x7f0000000100)="05a26b52b329832fe8076a53a831994a054972ad7bfbd49fc3b2858aa29d5b022be78a749d9148e496cd2c97aa39b187d9d42d3ac3b664e517e597c9df6926fce7d028317c08be76d5eb8085b885486fd9ee"}) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='noquota,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0826ed9f75034323c4c9c51fc4872d89dd9c98efb0bfe25ae0b77bc521badc7b27d83b493d58d38ca858f0bbe531057fd8430635271fa4bf47de0254344257fc33d0731f4b075f69b651c97536d7a65e08f6c8b62eb2ae01fb760842b8588301b8ef888fc958b518391ab9216fab8ba2474af422edde7f0bf10654f64d09d96e89d5b18b91f752febe61"]) [ 706.942578][T23347] jfs: Unrecognized mount option "" or missing value 05:08:13 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x4}) 05:08:14 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:14 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 707.172064][T23365] jfs: Unrecognized mount option "&íŸuC#ÄÉÅć-‰Ýœ˜ï°¿âZà·{Å!ºÜ{'Ø;I=XÓŒ¨Xð»å1ØC5'¤¿GÞT4BWü3ÐsK_i¶QÉu6צ^öȶ.²®ûvB¸Xƒ¸ïˆÉXµ9¹!o«‹¢GJô"íÞ ñTöM Ùn‰Õ±‹‘÷Rþ¾a" or missing value [ 707.263079][T23368] jfs: Unrecognized mount option "" or missing value 05:08:14 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 707.334469][T23370] jfs: Unrecognized mount option "&íŸuC#ÄÉÅć-‰Ýœ˜ï°¿âZà·{Å!ºÜ{'Ø;I=XÓŒ¨Xð»å1ØC5'¤¿GÞT4BWü3ÐsK_i¶QÉu6צ^öȶ.²®ûvB¸Xƒ¸ïˆÉXµ9¹!o«‹¢GJô"íÞ ñTöM Ùn‰Õ±‹‘÷Rþ¾a" or missing value [ 707.374508][T23368] jfs: Unrecognized mount option "" or missing value 05:08:14 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xe1, "53926bbae3d16901e438bdd13891e3722823015f58b9e83abf393cc5e11094f59f57183ca49cc0aea0246f95e9cd7b429a5049cfb55df60c4d4a0818df66575fa7697370fe8231120b647ee49a0958c411c0e7a2e3d9848605e42e635566f264cf4d045dce42abb9962cb96b4d35667bcf31e85fa2ba6f69fa96bb553e190f6b8f67d29fd9347d725fdca573357c23ab21bac7089e485888a883434851cc109d091421dae2c2f8260f8caeaebbbe448c1474c34606f3769e59f58000a409f8f33e9fc817acef6787c99eb7a4fb7cf72522f2c153111e7537786e4eed552e626bdf"}, &(0x7f0000000140)=0xe9) 05:08:14 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x5}) 05:08:14 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x5c, "4e6ee986e6dacccad60a6be1dc501addaf912d613ab11262fd88b9addd1d628765e30a382b1e2f31dc68e5f1aefe3568ca2cb77f503d48fcde9ffff194dce8a65c4183040fa1a807b64b68c7ff8cb057d1e172922ff57b4eeac5c5cc"}, &(0x7f0000000080)=0x64) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0xecfa, 0xf597}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000240)={r3, 0xfffffffd, 0x6, 0x9852, 0x1, 0xb345, 0x401, 0x4, {r4, @in={{0x2, 0x4e20, @empty}}, 0x3e6f, 0xfffffffc, 0x0, 0x3da, 0xa3db}}, &(0x7f0000000140)=0xb0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:14 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, 0x0, &(0x7f0000000140)) 05:08:14 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 707.660769][T23383] jfs: Unrecognized mount option "" or missing value [ 707.719033][T23383] jfs: Unrecognized mount option "" or missing value 05:08:14 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, 0x0, &(0x7f0000000140)) 05:08:14 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x6}) 05:08:14 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:15 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x7}) 05:08:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, 0x0, &(0x7f0000000140)) [ 707.982221][T23398] jfs: Unrecognized mount option "" or missing value [ 708.044914][T23398] jfs: Unrecognized mount option "" or missing value 05:08:15 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@usrquota='usrquota'}, {@gid={'gid'}}]}) 05:08:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340), &(0x7f0000000140)=0x8) 05:08:15 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x8}) 05:08:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340), 0x0) [ 708.280548][T23408] jfs: Unrecognized mount option "" or missing value [ 708.340500][T23408] jfs: Unrecognized mount option "" or missing value 05:08:15 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 708.635789][T23419] jfs: Unrecognized mount option "" or missing value [ 708.717502][T23419] jfs: Unrecognized mount option "" or missing value 05:08:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340), 0x0) 05:08:15 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='resize=0x000000000000007f,gid=', @ANYRESHEX, @ANYBLOB]) uselib(&(0x7f0000000040)='./bus\x00') rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='\x00') r0 = socket$inet(0x2, 0xc5009b03bc6687e8, 0xf9) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r3, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SIOCRSSCAUSE(r2, 0x89e1, &(0x7f0000000140)=0x9) accept4(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000100)=0x80, 0x800) 05:08:15 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:15 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x9}) 05:08:15 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) 05:08:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340), 0x0) 05:08:15 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80ca0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{0x2, 0xdd, 0x1, 0x9}, {0x1000, 0x3, 0x6, 0xfffffffc}, {0x1, 0x1f, 0x9, 0x8}, {0xf32, 0x2, 0x4, 0x9}]}) read$midi(r0, &(0x7f0000000040)=""/179, 0xb3) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='noquota,gid=', @ANYRESHEX=0x0, @ANYBLOB="0600"]) socket$inet_udplite(0x2, 0x2, 0x88) 05:08:16 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0xa}) [ 709.014291][T23434] jfs: Unrecognized mount option " " or missing value [ 709.066640][T23434] jfs: Unrecognized mount option " " or missing value 05:08:16 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) 05:08:16 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='noquota,gid=', @ANYRESHEX=0x0, @ANYBLOB="6f299a17c73870ea1fb811f33de858861722162c00"]) 05:08:16 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r13, 0x839}, 0x8) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r12, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_MIXER_WRITE_RECSRC(r12, 0xc0044dff, &(0x7f0000000280)=0x7cd) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r14, r10, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r14, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r7, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r15, @ANYBLOB=',func=KEXEC_KERNEL']) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x284042, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC=r15, @ANYBLOB=',aname=/dev/ifput/event#\x00,\x00']) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 709.240165][T23448] jfs: Unrecognized mount option "gid=0x0000000000000000" or missing value [ 709.296589][T23454] jfs: Unrecognized mount option " [ 709.296589][T23454] " or missing value [ 709.363950][T23454] jfs: Unrecognized mount option " [ 709.363950][T23454] " or missing value 05:08:16 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0xb}) [ 709.527427][T23465] jfs: Unrecognized mount option "gid=0x0000000000000000o)šÇ8pê¸ó=èX†"" or missing value [ 709.596605][T23465] jfs: Unrecognized mount option "gid=0x0000000000000000o)šÇ8pê¸ó=èX†"" or missing value 05:08:16 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:16 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x840100, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x8) 05:08:16 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0xc}) [ 709.643870][T23468] jfs: Unrecognized mount option " " or missing value [ 709.695249][T23468] jfs: Unrecognized mount option " " or missing value [ 709.874941][T23480] jfs: Unrecognized mount option " " or missing value 05:08:16 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x10}) 05:08:16 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) [ 709.932105][T23480] jfs: Unrecognized mount option " " or missing value [ 710.121588][T23489] jfs: Unrecognized mount option "" or missing value 05:08:17 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x23}) 05:08:17 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x101040, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r8, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r9 = socket$netlink(0x10, 0x3, 0xf) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') sendmsg$TEAM_CMD_NOOP(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, r10, 0x1}, 0x14}}, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="c4000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c000200080004000000000008000a00", @ANYRES32=r13, @ANYBLOB], 0x44}}, 0x0) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_AGEING_TIME={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r16}]}, 0x44}}, 0x0) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f0000000280)=0x0, &(0x7f00000002c0)=0x4) r18 = socket$nl_route(0x10, 0x3, 0x0) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r21 = socket$nl_route(0x10, 0x3, 0x0) r22 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r22, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r22, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r21, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_AGEING_TIME={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r23}]}, 0x44}}, 0x0) sendmsg$nl_route(r18, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_AGEING_TIME={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r23}]}, 0x421}}, 0x0) r24 = socket$inet6(0xa, 0x400000000001, 0x0) close(r24) r25 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r24, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r26, 0x839}, 0x8) ftruncate(r25, 0x200004) sendfile(r24, r25, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r25, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r25, 0x29, 0x22, &(0x7f0000000d00)={{{@in6=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000000e00)=0xe8) r28 = socket$inet6(0xa, 0x400000000001, 0x0) close(r28) r29 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r28, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r30, 0x839}, 0x8) ftruncate(r29, 0x200004) sendfile(r28, r29, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r29, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r29, 0x29, 0x23, &(0x7f0000001080)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000001180)=0xe8) r32 = socket$nl_route(0x10, 0x3, 0x0) r33 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r33, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r33, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r32, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_AGEING_TIME={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r34}]}, 0x44}}, 0x0) sendmsg$TEAM_CMD_NOOP(r7, &(0x7f00000013c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x84}, 0xc, &(0x7f0000001380)={&(0x7f00000011c0)={0x1b4, r10, 0x400, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r13}, {0x108, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r17}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{0x6, 0x3f, 0x0, 0x80000001}, {0x4, 0x6, 0xfa, 0x4}, {0x4, 0x9, 0x8, 0x800}, {0xd54e, 0x3f, 0x2, 0x2}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r20}}}]}}, {{0x8, 0x1, r27}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r31}}, {0x8}}}]}}, {{0x8, 0x1, r34}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3ff}}}]}}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x48802}, 0x4080) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000440)={r35}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r35, @in={{0x2, 0x4e21, @remote}}, 0x0, 0x5, 0x0, 0x4, 0x7ff}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000140)={r36, 0x7fff}, &(0x7f0000000180)=0x8) 05:08:17 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:17 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 710.204359][T23489] jfs: Unrecognized mount option "" or missing value [ 710.371350][T23498] jfs: Unrecognized mount option "#" or missing value 05:08:17 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r13, 0x839}, 0x8) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r12, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_MIXER_WRITE_RECSRC(r12, 0xc0044dff, &(0x7f0000000280)=0x7cd) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r14, r10, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r14, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r7, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r15, @ANYBLOB=',func=KEXEC_KERNEL']) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x284042, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC=r15, @ANYBLOB=',aname=/dev/ifput/event#\x00,\x00']) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 710.449355][T23498] jfs: Unrecognized mount option "#" or missing value 05:08:17 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x48}) 05:08:17 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 710.558783][T23507] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23507 comm=syz-executor.4 [ 710.720770][T23517] jfs: Unrecognized mount option "H" or missing value [ 710.785805][T23517] jfs: Unrecognized mount option "H" or missing value 05:08:17 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x4c}) 05:08:17 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 711.049953][T23526] jfs: Unrecognized mount option "L" or missing value [ 711.095372][T23526] jfs: Unrecognized mount option "L" or missing value 05:08:18 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x68}) 05:08:18 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:08:18 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r13, 0x839}, 0x8) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r12, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_MIXER_WRITE_RECSRC(r12, 0xc0044dff, &(0x7f0000000280)=0x7cd) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r14, r10, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r14, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r7, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r15, @ANYBLOB=',func=KEXEC_KERNEL']) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x284042, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC=r15, @ANYBLOB=',aname=/dev/ifput/event#\x00,\x00']) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 711.306867][T23521] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23521 comm=syz-executor.4 [ 711.317211][T23534] jfs: Unrecognized mount option "h" or missing value 05:08:18 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x6c}) [ 711.388747][T23534] jfs: Unrecognized mount option "h" or missing value [ 711.602053][T23547] jfs: Unrecognized mount option "l" or missing value [ 711.651855][T23547] jfs: Unrecognized mount option "l" or missing value 05:08:18 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r8, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r10, 0xc0206434, &(0x7f0000000080)={0x2, 0x0, 0x1, 0x9}) ioctl$DRM_IOCTL_AGP_UNBIND(r7, 0x40106437, &(0x7f00000000c0)={r12, 0x1000}) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r13 = socket$unix(0x1, 0x2, 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r14 = fcntl$dupfd(r13, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="08000000ec0aa6c4d9734e952e9c727860f2d68c0e2d5fe1fa67eb515cbe1f4d72c9ca1898ef6e4d30164cca5c226c5270f21a0b0e6bc27b414849532ae5b1da6c01b2cda769eb3b2c8b127173725f68cbb873fb858705b9d05e26555f8cfc1803a35794a6c625d2ad6e66a79416e4d512bb826df12bd67ff2cf7eec1a8a5dd9e36a65fdc408d90d5167fe41fffb9c173a31892c1feb0c0d181f567ffa955d104f3eae92e477c160dbc8fcbfcce6f19d7e07fb13ac29e449e0d088ce725849af51428e07f7982f83889c13f0160b7e50b494b521f69de9e640fb0da7e7c429d5e14613b9523c4f8144c93ce563788de2c9c8c1716e6b8b8d8e22504bd2179045a37ea1", @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r14, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:18 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:08:18 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:18 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x74}) 05:08:18 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000140)) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x10000, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000400), 0x4) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$BLKPG(r4, 0x1269, &(0x7f0000000100)={0x3, 0x0, 0xbe, &(0x7f0000000040)="c7601f29ac6b254a3b173a464d8e0db022e8e288f93a73903a7e3d23b7821ff85a3cd42c08c6ba97746b0b37a6e834776a11cc14a45335b932b56db0c889bc5af9a22b01537af620e290e5306114289c7835e5f411667fbb6d6c0e1ef2d5d7e9704ef8bf8705dc970773fb27bffd0f0fe3776b70929a1216c4d7467c9a391c46c741faa97f92aaedd95dffd33e0169eaf99a32edc6ec74ebd4028346e4f04d80b672ed69ccaf76da6097ced6a6c1704247874e6b3668effa1f9732d2a97e"}) 05:08:19 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0x7a}) [ 712.058749][T23559] jfs: Unrecognized mount option "t" or missing value [ 712.107250][T23559] jfs: Unrecognized mount option "t" or missing value 05:08:19 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r13, 0x839}, 0x8) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r12, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_MIXER_WRITE_RECSRC(r12, 0xc0044dff, &(0x7f0000000280)=0x7cd) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r14, r10, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r14, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r7, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r15, @ANYBLOB=',func=KEXEC_KERNEL']) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x284042, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC=r15, @ANYBLOB=',aname=/dev/ifput/event#\x00,\x00']) 05:08:19 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}], [], 0xff}) 05:08:19 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x1d, &(0x7f0000000280), &(0x7f00000003c0)=0x4) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nvme-fabrics\x00', 0x4000, 0x0) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000580)={0x3d48, {{0x2, 0x4e23, @local}}, 0x2, 0x8, [{{0x2, 0x4e20, @empty}}, {{0x2, 0x4e21, @loopback}}, {{0x2, 0x4e22, @broadcast}}, {{0x2, 0x4e23, @remote}}, {{0x2, 0x4e21, @empty}}, {{0x2, 0x4e21, @broadcast}}, {{0x2, 0x4e24, @loopback}}, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x490) close(r5) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r8, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r5, r7, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$EVIOCGEFFECTS(r7, 0x80044584, &(0x7f0000000300)=""/181) r9 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r10 = socket$unix(0x1, 0x2, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000080)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00002137e5e829bdf0007ddbdf2502000000080004230000000008000700", @ANYRES32=r11, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r12 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x1480, 0x0) getsockname$llc(r12, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0x10) [ 712.331804][T23669] jfs: Unrecognized mount option "z" or missing value [ 712.380778][T23669] jfs: Unrecognized mount option "z" or missing value [ 712.642291][T23680] jfs: Unrecognized mount option "ÿ" or missing value 05:08:19 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:19 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 712.697359][T23680] jfs: Unrecognized mount option "ÿ" or missing value 05:08:19 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@noquota='noquota'}, {@gid={'gid', 0x3d, r1}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\\cpuset'}}]}) r2 = epoll_create(0xffff) epoll_pwait(r2, &(0x7f0000000140)=[{}, {}, {}, {}], 0x4, 0x300000, &(0x7f0000000180), 0x8) 05:08:19 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='noquota,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c00c781d6bd930782162c624379f4b2eb2ee8d867187bd423f15f1228fe4c0080e27e3341079265fdb7ba515fa0ae26bf50d136c484b2db593c7dc31d3ccc37c4b6c3241eea609824db777062c3b81f88983e61cd2eed4a38d20d361caa5bfc1a50431bad2f127c72d174e877f574a6f88f9b65f0258e9e66a7b457b9acce0baf0080000006abd4f4a530cae0f48e02264e3a0ee4"]) 05:08:19 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KDSETKEYCODE(r4, 0x4b4d, &(0x7f0000000080)={0x7, 0x401}) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0xfffffffffffffdf5, 0x0, 0x0, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x5}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:20 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r13, 0x839}, 0x8) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r12, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_MIXER_WRITE_RECSRC(r12, 0xc0044dff, &(0x7f0000000280)=0x7cd) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r14, r10, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r14, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r7, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r15, @ANYBLOB=',func=KEXEC_KERNEL']) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x284042, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC=r15, @ANYBLOB=',aname=/dev/ifput/event#\x00,\x00']) 05:08:20 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:08:20 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r8, 0x839}, 0x8) ftruncate(r7, 0x200004) set_mempolicy(0x4d28632a0f437524, &(0x7f0000000240)=0x8, 0xfffffffffffffff9) sendfile(r6, r7, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) open(&(0x7f0000000300)='./file0\x00', 0x4000, 0x40) r10 = socket$inet6(0xa, 0x400000000001, 0x0) close(r10) r11 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r12, 0x839}, 0x8) ftruncate(r11, 0x200004) sendfile(r10, r11, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r11, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r13 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm_plock\x00', 0x2000, 0x0) r14 = socket$inet6(0xa, 0x400000000001, 0x0) close(r14) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r14, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r16, 0x839}, 0x8) ftruncate(r15, 0x200004) sendfile(r14, r15, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r15, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r17 = getpid() sched_setscheduler(r17, 0x5, &(0x7f0000000380)) r18 = fanotify_init(0x40, 0x800) r19 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r19, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r18, r19, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r13, 0x84, 0x1d, &(0x7f0000000c40)=ANY=[@ANYRES64, @ANYRES16=r10, @ANYRESOCT, @ANYBLOB="a0092390d76855428f59a20cadaf446e0bcc138c2d3c798c618d6200a3f9a265e5c0712334f2c761e620b898d2153c11a2f7a8b7bb77e63e456f5b0a9095983110c1c31fe54c4062240b76a0a0cc707f2d37df12f4fcdc0a3d7d5d9186d6269f9be1729f9825bdfbf07272d24620277fc99767212cc3756827c7fcfacc0c32939612401e8e20356dce9522da68865a1d712fce05c1f1ed92ceb465a273c22e038919781ed9c8b2926ef49955c2a7101600fd28741f2d232328c94a5c7c02374b452ee4a25165f91aa82e958502381e60a7cdabf58ac4e247b4b8768e09c432fc076f", @ANYRES32=r18, @ANYRES64=0x0], &(0x7f000095dffc)=0x6) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r9, 0x84, 0x75, &(0x7f0000000440), 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x8000, 0x20}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r20 = socket$unix(0x1, 0x2, 0x0) r21 = fcntl$dupfd(r20, 0x0, r20) ioctl$PERF_EVENT_IOC_ENABLE(r21, 0x8912, 0x400200) ioctl$TUNSETSTEERINGEBPF(r21, 0x800454e0, &(0x7f0000000280)=r7) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r21}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:20 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:20 executing program 1: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 05:08:20 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000000)={0x3f, 0x16, &(0x7f0000000240)="662eed174992dc02ad18ef8715281286661682b04bb012b72dbfef3357397e9640afd1aa99a5edebef9c9ac4c00cb56d68497a315fcb9939c9c12fcc0c98ec742e3ad49df2a296485af32c79e5a98f71f8a0f3f4ff7108145fe9f1331a4b35eccedfbbece92271f67188c598f32abc92581bc6d8ccdab621568ea472873a89b15bbb5637f7df5e6cfb9baf29a92400086c5db5edadb3dcc3321735d904429b5e6053f12c0cf5ab33cf8d9bfae3f67ae2682753853a28acc6112a4eaee4de0819dbcbc2cc72446d7f347d20e1030f5ba275da370f16a704285a0f9fa1ccb0d1f33a71e76144f012bd3cec6d24ba9e016a357bfb637f1785a0bdc091de38d69c726c552bd462d9e5575d0a3c9b6bf6aee2ab1c7f8db73bd93fc57b99474f39a04ebd809c8798762f55a2188bdbc5b09dd3798806752f75b4351afc30c4091c5e067b35188fc40e4c0bc3328d482530dc5bbfb7aeabe076938c311702c39908c96502e0acda20a3b91fc2f1a4fc997ad8205c597240793fd3f1c37457c9fb0d8878d1f8cc196f697ef44c25cdd89493d59168a374d3611b68239d7529afeef40e9488833a1e471d8a54dcbeac5e3a693bea1bf2216c14074ca6a8ca330a556fd7fa5202215d4695405e391f09f455872e24351b1c0f3c27ea9051ffc794805b8f1ac320326f399bc88c848ef060da91a3e7374f0c7ad112ab6c48c662bc8e05717749251c5975df9fac6d9605852ffebc40de797e19efed6331244dbe9d762baac3fac1ef94a984dfbd4728637a7e2b1ce99c81fee87a5c727d89268ca9db2843d4c93b793c661c638d826ec4494e100e2f39da7caf8552b8049c8ea5f94095d84389adcff83dbd7941a5209f18ebac8e2f7b8490f78a335ae6deb125fc36181018d02d040be6672ac28e5d3818d5b17af1c24c292ce408a247b67bf1da70810703cc3d416675f764c317c9ee0f587d6506347b77398f4f31e93dcef1c6aa6f5509c9d7df0a8f85febd2e6d62273512022f1618dbee38fdb796edde91902edf3889e08b5314ee9b94e52b012870b98163fb78790de023165ffba4ba68f5a275f0043a297c19707c467bfae4c045b209e7d99f9dab568121a6b1d6bb44e9643818980ca046f05d5d6c98af452ec2acd2cd209d32d1053badac3acce7ca2f2b501f575a84e342d98d19ae6af74a4748dd927950c59ff853ecbc214d134dfc1feb837a8464afdf886ba9150fd82a10f0ee77835f093a863317fc3ebc3e67ee528cfb4cb0180c296eba89fdff6a8deaadd4eb8aa1d6a333819a9c44bfbe22423433b7f626dadbee3a3114667943c4170b4ddcc7ba7be821dd088495db198c881721e368e7e15698dd486ff4dbe2cb8b418290b1633b1758496277c23286375e34bd8bd328e3324a57b6f103bbbab626240371a12c555fb43057be315a55b01764c815ec"}) 05:08:20 executing program 1: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 05:08:20 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = dup(0xffffffffffffffff) ioctl$KVM_SET_PIT(r6, 0x8048ae66, &(0x7f0000000080)={[{0x7, 0x8000, 0x3, 0x1f, 0x99, 0x9, 0x3, 0x3, 0x5, 0x0, 0x0, 0x9, 0x6}, {0x4, 0x9, 0x2, 0x0, 0x3f, 0x2, 0xd, 0x0, 0x3, 0x8, 0x0, 0xa0, 0x7fff}, {0x8, 0x8, 0x1, 0x20, 0x0, 0x9e, 0x7, 0x81, 0x7f, 0x81, 0x9, 0xb1, 0x6}], 0x7}) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:20 executing program 1: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 05:08:20 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:20 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ppp\x00', 0x101000, 0x0) ioctl$PPPIOCSDEBUG(r3, 0x40047440, &(0x7f0000000540)=0xa7d) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r9, r8, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r5, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r10, @ANYBLOB=',func=KEXEC_KERNEL']) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x80, 0x3, &(0x7f0000000280)=[{&(0x7f0000000100)="e82aec70e5a8828c97b4d55c084ebe696bffb2ad37ee0ab54b0fac8834e8dfbc3b223f0519210caacd6b898e5f37f12064bfc861c9e40b4ec936dcf964549cede9c1a148452e3d45ed635eb2390ac95475336938f6f22a1748382615bb56c1f9974627e8dd3a9bd48d0ff3d73369175ef18ed87966532c72b5bd0302cae7", 0x7e, 0x1000}, {&(0x7f0000000180)="16a026420982204b78967a0203411cd022c3dc603cfa2edec81e7cba272bfdd3d5f847326cb801a6b727726401b7bd9b45379a6bd771198ea2f8", 0x3a, 0x4}, {&(0x7f0000000240)="651aeac4c89c092025b137ededba87893ee119ffc5d0448985b7742aebb9e2b7a14cc7e70a", 0x25, 0xee47}], 0x10, &(0x7f0000000300)={[{@map_off='map=off'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'gid'}}, {@audit='audit'}, {@euid_lt={'euid<', r4}}, {@context={'context', 0x3d, 'root'}}, {@obj_role={'obj_role', 0x3d, 'eth0.bdevbdev}:selfeth1-'}}]}) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@noquota='noquota'}, {@gid={'gid'}}, {@gid={'gid', 0x3d, r1}}, {@nointegrity='nointegrity'}]}) 05:08:20 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7523441cac722c9d}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x1200, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x10) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) fcntl$getown(r4, 0x9) 05:08:20 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r13, 0x839}, 0x8) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r12, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_MIXER_WRITE_RECSRC(r12, 0xc0044dff, &(0x7f0000000280)=0x7cd) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r14, r10, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r14, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r7, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r15, @ANYBLOB=',func=KEXEC_KERNEL']) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x284042, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC=r15, @ANYBLOB=',aname=/dev/ifput/event#\x00,\x00']) 05:08:20 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:21 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:21 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:21 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f0000000040)=0x10) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='noquota,gid=', @ANYRESHEX=0x0, @ANYBLOB="ff00"]) 05:08:21 executing program 1: openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 05:08:21 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000080)={0xfffffff, 0x7ff, 0x8000, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x990a95, 0xa0f5, [], @p_u32=&(0x7f0000000000)=0x1}}) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000140)={0x7, &(0x7f0000000100)=[{0x101, 0x20, 0x7, 0x3}, {0x3, 0x8, 0x9, 0x6}, {0x5, 0x57, 0x80, 0x5}, {0x7, 0x2f, 0xa9, 0x401}, {0x5, 0x44, 0x9, 0x2}, {0x401, 0x1, 0x5c, 0x6}, {0xfeff, 0x40, 0x6, 0x2f}]}) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000180)={0xc0002008}) [ 714.776713][T23967] jfs: Unrecognized mount option "gid=0x0000000000000000ÿ" or missing value 05:08:21 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:21 executing program 1: openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 05:08:21 executing program 1: openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 05:08:21 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000480)='/dev/video2\x00', 0x2, 0x0) r7 = fanotify_init(0x40, 0x800) r8 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r7, r8, 0x0) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r12 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r12, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r12, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r13 = socket$inet6(0xa, 0x400000000001, 0x0) close(r13) r14 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r13, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r15, 0x839}, 0x8) ftruncate(r14, 0x200004) sendfile(r13, r14, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r13, 0x8904, 0x0) r16 = fanotify_init(0x40, 0x800) r17 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r17, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r16, r17, 0x0) r18 = socket$inet6(0xa, 0x400000000001, 0x0) close(r18) r19 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r18, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r20, 0x839}, 0x8) ftruncate(r19, 0x200004) sendfile(r18, r19, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r19, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r21 = socket$inet6(0xa, 0x400000000001, 0x0) close(r21) r22 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r21, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r23, 0x839}, 0x8) ftruncate(r22, 0x200004) sendfile(r21, r22, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r22, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r24 = socket$inet6(0xa, 0x400000000001, 0x0) close(r24) r25 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r24, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r26, 0x839}, 0x8) ftruncate(r25, 0x200004) sendfile(r24, r25, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r25, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r27 = accept$unix(r25, &(0x7f0000000740)=@abs, &(0x7f00000004c0)=0x6e) r28 = socket$vsock_stream(0x28, 0x1, 0x0) r29 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r29, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r29, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r30 = getpid() sched_setscheduler(r30, 0x5, &(0x7f0000000380)) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r33 = getpid() sched_setscheduler(r33, 0x5, &(0x7f0000000380)) r34 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r34, r34) getsockopt$sock_cred(r34, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r37 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r38 = ioctl$KVM_CREATE_VM(r37, 0xae01, 0x0) r39 = ioctl$KVM_CREATE_VCPU(r38, 0xae41, 0x0) r40 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r40, r39, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r40, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r35, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r36, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r41, @ANYBLOB=',func=KEXEC_KERNEL']) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r43 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r43, r43) getsockopt$sock_cred(r43, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r46 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r47 = ioctl$KVM_CREATE_VM(r46, 0xae01, 0x0) r48 = ioctl$KVM_CREATE_VCPU(r47, 0xae41, 0x0) r49 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r49, r48, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r49, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r44, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r45, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r50, @ANYBLOB=',func=KEXEC_KERNEL']) r51 = getgid() r52 = fanotify_init(0x40, 0x800) r53 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r53, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r52, r53, 0x0) r54 = fanotify_init(0x40, 0x800) r55 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r55, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r54, r55, 0x0) fstat(r54, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r57 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r57, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r57, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r58 = fanotify_init(0x40, 0x800) r59 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r59, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r58, r59, 0x0) r60 = getpid() sched_setscheduler(r60, 0x5, &(0x7f0000000380)) r61 = fanotify_init(0x40, 0x800) r62 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r62, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r61, r62, 0x0) fstat(r61, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)={0x0, 0x0}) r66 = socket$inet6(0xa, 0x400000000001, 0x0) close(r66) r67 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r66, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r68, 0x839}, 0x8) ftruncate(r67, 0x200004) sendfile(r66, r67, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r67, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r67, 0x29, 0x22, &(0x7f0000000f00)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000001000)=0xe8) statx(r4, &(0x7f0000001040)='\x00', 0x4900, 0x0, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r71 = syz_open_dev$tty20(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001800)={0x0}, &(0x7f0000001840)=0xc) r73 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r73, r73) getsockopt$sock_cred(r73, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r76 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r77 = ioctl$KVM_CREATE_VM(r76, 0xae01, 0x0) r78 = ioctl$KVM_CREATE_VCPU(r77, 0xae41, 0x0) r79 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r79, r78, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r79, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r74, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r75, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r80, @ANYBLOB=',func=KEXEC_KERNEL']) r81 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r81, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r82) r83 = fanotify_init(0x40, 0x800) r84 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r84, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r83, r84, 0x0) r85 = fanotify_init(0x40, 0x800) r86 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r86, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r85, r86, 0x0) r87 = socket$inet6(0xa, 0x400000000001, 0x0) close(r87) r88 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r87, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r89, 0x839}, 0x8) ftruncate(r88, 0x200004) sendfile(r87, r88, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r88, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r90 = socket$inet6(0xa, 0x400000000001, 0x0) close(r90) r91 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r90, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r92, 0x839}, 0x8) ftruncate(r91, 0x200004) sendfile(r90, r91, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r90, 0x8904, 0x0) r93 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000003ec0)='/dev/dlm_plock\x00', 0x8000, 0x0) r94 = socket$inet_udplite(0x2, 0x2, 0x88) r95 = fanotify_init(0x40, 0x800) r96 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r96, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r95, r96, 0x0) r97 = socket$inet6(0xa, 0x400000000001, 0x0) close(r97) r98 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r97, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r99, 0x839}, 0x8) ftruncate(r98, 0x200004) sendfile(r97, r98, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r98, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r100 = openat$uinput(0xffffffffffffff9c, &(0x7f0000003f00)='/dev/uinput\x00', 0x2ab888a33968d124, 0x0) r101 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000004400)='/dev/dlm-control\x00', 0x2, 0x0) r102 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r102, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r102, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r103 = socket$inet6(0xa, 0x400000000001, 0x0) close(r103) r104 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r103, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r105, 0x839}, 0x8) ftruncate(r104, 0x200004) sendfile(r103, r104, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r103, 0x8904, 0x0) r106 = socket$inet6(0xa, 0x400000000001, 0x0) close(r106) r107 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r106, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r108, 0x839}, 0x8) ftruncate(r107, 0x200004) sendfile(r106, r107, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r106, 0x8904, 0x0) r109 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r110 = socket$inet6(0xa, 0x400000000001, 0x0) close(r110) r111 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r110, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r112, 0x839}, 0x8) ftruncate(r111, 0x200004) sendfile(r110, r111, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r111, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r113 = fanotify_init(0x40, 0x800) r114 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r114, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r113, r114, 0x0) r115 = getpid() sched_setscheduler(r115, 0x5, &(0x7f0000000380)) newfstatat(0xffffffffffffff9c, &(0x7f0000004440)='./file0\x00', &(0x7f0000004480)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) statx(r4, &(0x7f0000004500)='./file0\x00', 0x400, 0x800, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r118 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r118, r118) getsockopt$sock_cred(r118, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r121 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r122 = ioctl$KVM_CREATE_VM(r121, 0xae01, 0x0) r123 = ioctl$KVM_CREATE_VCPU(r122, 0xae41, 0x0) r124 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r124, r123, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r124, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r119, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r120, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r125, @ANYBLOB=',func=KEXEC_KERNEL']) r126 = fanotify_init(0x40, 0x800) r127 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r127, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r126, r127, 0x0) r128 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000004640)='/dev/sequencer\x00', 0x0, 0x0) r129 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000004680)='/dev/dlm-control\x00', 0x40600, 0x0) r130 = fanotify_init(0x40, 0x800) r131 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r131, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r130, r131, 0x0) r132 = fanotify_init(0x40, 0x800) r133 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r133, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r132, r133, 0x0) r134 = fanotify_init(0x40, 0x800) r135 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r135, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r134, r135, 0x0) r136 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r136, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r136, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r137 = fanotify_init(0x40, 0x800) r138 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r138, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r137, r138, 0x0) r139 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r139, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r139, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r140 = socket$inet6(0xa, 0x400000000001, 0x0) close(r140) r141 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r140, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r142, 0x839}, 0x8) ftruncate(r141, 0x200004) sendfile(r140, r141, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r141, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r143 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r143, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r143, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r144 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r144, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r144, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r145 = socket$inet6(0xa, 0x400000000001, 0x0) close(r145) r146 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r145, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r147, 0x839}, 0x8) ftruncate(r146, 0x200004) sendfile(r145, r146, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r145, 0x8904, 0x0) r148 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r148, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r148, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r149 = fanotify_init(0x40, 0x800) r150 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r150, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r149, r150, 0x0) r151 = getpid() sched_setscheduler(r151, 0x5, &(0x7f0000000380)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000004d40)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f0000004e40)=0xe8) r153 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r153, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r154) r155 = getpid() sched_setscheduler(r155, 0x5, &(0x7f0000000380)) r156 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r156, r156) getsockopt$sock_cred(r156, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r159 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r160 = ioctl$KVM_CREATE_VM(r159, 0xae01, 0x0) r161 = ioctl$KVM_CREATE_VCPU(r160, 0xae41, 0x0) r162 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r162, r161, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r162, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r157, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r158, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r163, @ANYBLOB=',func=KEXEC_KERNEL']) newfstatat(0xffffffffffffff9c, &(0x7f0000004e80)='./file0\x00', &(0x7f0000004ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4800) r165 = getpid() sched_setscheduler(r165, 0x5, &(0x7f0000000380)) r166 = getpgid(r165) r167 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r167, r167) getsockopt$sock_cred(r167, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r170 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r171 = ioctl$KVM_CREATE_VM(r170, 0xae01, 0x0) r172 = ioctl$KVM_CREATE_VCPU(r171, 0xae41, 0x0) r173 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r173, r172, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r173, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r168, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r169, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r174, @ANYBLOB=',func=KEXEC_KERNEL']) newfstatat(0xffffffffffffff9c, &(0x7f0000004f40)='./file0\x00', &(0x7f0000004f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) r176 = getpid() sched_setscheduler(r176, 0x5, &(0x7f0000000380)) stat(&(0x7f0000005000)='./file0\x00', &(0x7f0000005040)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000050c0), &(0x7f0000005100), &(0x7f0000005140)=0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005240)=[{&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000240)="2f90b6a1e0bc7102f43ba19a608a30bfd4b9b33d6b1b1ba1862eb31c7cd54cbb5f096ffe453826f4691f3d65f3147060c474fe472ccc4bd1fa133aa82b08f2881cdc36e4a4679dd7794d29a04ed6b1778d4909aa8ca56f7090eb737b3077b76bfdab626a4a92551cefad24abef43dc2243586b4a", 0x74}, {&(0x7f0000000300)="76766b2cf6a7a344607114942c200ede60ab9845c2b53f1539fc84fc1ba0a21c3a9f842e01c1b6f7916405cec569280ae0e6ff2f84cbdfce63711ed85dc2937b499f1cc3f7ecefb0c7aa2163a0bce338ad76e491e1c12f20869794d516ba15970875308a209fa1ace43abca03a743ee603e6e3987884f1d722d4fb07af7fd97ce2a522b5f0c771cb9fd0072eb300dffcd89caeccbd93879441f38ae1ad9be990e148ce1166f74f7bf13131f9b1f1101c197669a0403015a69c6b81421857c83d4c022e0d6b9b18719ce9bbd478ff7f0fbe762ee8e8e6e93bfe0aea957b5b851d3df2b2", 0xe3}, {&(0x7f0000000580)="c14f2a3ebcac2b9a9914da13e3ca9aca3f691bb0c79950c72b6cde460be7e7f595917a347ad796f37913fa90c263bc5e08a3c6527ac7b8a5cc9cdf6432932683a468f6bc727ceb79892fba46b9a826355d71d52037a35c0166bde22ad9d0f24153a55226155f0a6e477c0328fabd87f774bff723ec785af0ee4bdc0d52a6065d4b543a05ee4ee185f97872", 0x8b}, {&(0x7f0000000640)="efedeaff5f1d4a349323c4bcac8e921e98f1aa40e56a1b155899ddca3d19bdd398609d512817de47c91843f891368c28378888a5729f36ec2038c3cf2699c6ae6bf4e910816000ec3ea1c04347cc88c5c8311e78ac7de05b00e6af8a783992efc9a93b440434f9b0d6ce49f5830dfc9c89c6b45e6a8ec08b7637cd871178944c8e2bbb8024e4f1fa1846b63a9b09c600467017fac8241fc6df89ed1fd5fd8370dafb65f555ef33c204623e4b0e0eca6a8ec45091c0a3885f6b2043a3152c8dd2e2fd341cf53fc51c0991e9f9bfa6b934d99dec", 0xd3}], 0x4, &(0x7f0000000a00)=[@rights={{0x18, 0x1, 0x1, [r6, r8]}}, @rights={{0x24, 0x1, 0x1, [r0, r2, r10, r3, r2]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r12, r4]}}, @rights={{0x20, 0x1, 0x1, [r4, r1, r1, r13]}}, @rights={{0x24, 0x1, 0x1, [r17, r19, r22, r27, r28]}}, @rights={{0x1c, 0x1, 0x1, [r1, r29, r3]}}, @cred={{0x1c, 0x1, 0x2, {r30, r31, r32}}}, @cred={{0x1c, 0x1, 0x2, {r33, r41, r42}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r45, r51}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r53, r4]}}], 0x148, 0x4060}, {&(0x7f0000000b80)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000cc0)=[{&(0x7f0000000c00)="783cd5ab4a0ec68920ba5eda8613d7455e3d3584b790ca5ca11fb593f198a246c822997fa40bd9191f32e69521e76e380650c176260b228f318b8927c6b0c9e3fe3e380176d49492e3d5d14afb06db94952763c3406ac055325749af92fa30978df42a4ece9625b73fe0ada6e63dd00635eb351d194889d5cea164", 0x7b}, {&(0x7f0000000c80)="a37affc948a340e674002cf0d26126b8634c2a3571dd53b45d08acf2122cc81da71238f41400866690", 0x29}], 0x2, &(0x7f0000001180)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r56}}}, @rights={{0x18, 0x1, 0x1, [r57, r58]}}, @cred={{0x1c, 0x1, 0x2, {r60, r63, r64}}}, @cred={{0x1c, 0x1, 0x2, {r65, r69, r70}}}, @rights={{0x24, 0x1, 0x1, [r2, 0xffffffffffffffff, r4, r3, r4]}}], 0xa0, 0x20}, {&(0x7f0000001240)=@abs={0x2, 0x0, 0x4e21}, 0x6e, &(0x7f0000001780)=[{&(0x7f00000012c0)="9d6c52d6d84d36d9bb2d481302ba61bd4741311027f517967c6a12cb855e196ef535f74272cb1480245d31ec2c8beffa5318907808a81a4fa07861d92441e750502d6a03dcdfb2b7cc0d2dfadc860e6c2b7cea6488", 0x55}, {&(0x7f0000001340)="d9de241a56ac4757e055c0bc8d16efad16963502a9127356b52c9aac52a297fbe1b4fb97b2b0f901ec2a7bdf45d3b352a56e", 0x32}, {&(0x7f0000001380)="033df4493eb0faf7c2431069c364478ee0f13a396839daefbbea8a9ec7cb4fddf13ef2fd730f060fbc2e051e6f939390ca955068f3d37a7779d955c01d674db3e8095b78962397f5d37594e16b0c15bee681cfcb9bbdaa5292dc57ca2172561110d0cc82673513c2eb768cfc24b321af9149046788cd5179d18dedf52f4deaf3f08cf9d0", 0x84}, {&(0x7f0000001440)="e93506414bd019c9bcdb5d270440904450ebdb7b637c33d7bb6ed6fa90d48bae6c30d90ef5376627612d6e59bcad1a5ddac1e5e315e31685c7895c504b2a68c03290483dae741c409c5b04d4e543a40bf9cadad84568d1102b0ddef3b5ff91293290cbfd6b173006e2af661cad939ca68e978add1d306d087c831ee3f92e3fb4ae8a3b67d960f8deb0d497393d5823fca255f12526f3f60db5bfdc2d8dd6c1e86b0ee78094aaa121f678143b8f8bfaaeb2a8fa022bfc5d51157a904a859768a7a0b60419bc", 0xc5}, {&(0x7f0000001540)="5b06c9b696ac2c4ef5d49ac5d3ce74e573f0b3f59339fd2097721629baa906ea4c326b2e5c434ef5f9d0aba23c56164cbbc9e80d4754543b082c5fa3c5b8179fe23bfbc70450c69cffd98d2573b33ff0e598bf7cff0dc7469c3cbca3de367acc3c971be6da2723584871f4aa2aa071530acb310b6df5ea304202b6bc2e561471936bdffabd9e01400d6969046bf7881efbfe184c151754cc00116057435733", 0x9f}, {&(0x7f0000001600)="7bd329ad4103f44710f05a9d045c92d2a9ba353d0ba54ea8e62b567e0a914a64d36f1164321c9461410875075bd465bf40c2b628bcab5c3c87cb044a0e4cb9fd16bd824e", 0x44}, {&(0x7f0000001680)="5bbcfe17c9ad4a346acfca6729384c514aa4dbb626940f020f7c7d750076ad7a5408a98711104ca298fa12f546a7241138e40489371602c5652bec5ecd13eddb81fdb4f185f9e3db8b2568a16b495db127d6c912cfe9a716511951001bcfcbb5e18120c02c06ca88ec97735d27e8bb70746e6e907fc8fdd767678b18bdb819d9799387c5518c8cdc0c649d4e103ae543befef1cfddc120e554cf98933b476302d0efaceb7c4108612065b0401163eb7614abb5d584c045fa58261d8ca65ca5b8dc8cc4d4772feec5443e0ca7b55cae33ce550527c1c4668a002b66684f9be667338bfc0e6c04d11ba7b51f99792464acdd9ff07d9148f830699326065b33b6", 0xff}], 0x7, &(0x7f0000001880)=[@rights={{0x14, 0x1, 0x1, [r71]}}, @cred={{0x1c, 0x1, 0x2, {r72, r74, r82}}}, @rights={{0x20, 0x1, 0x1, [r83, r86, r88, r90]}}], 0x58, 0x20040048}, {&(0x7f0000001900)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000003ac0)=[{&(0x7f0000001980)="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", 0x1000}, {&(0x7f0000002980)="c22fa61c0b3dbb9f8eb42c4e6e26a9700f230a5fad961e9e713584f110d134070e11896ac729a9fd02f6786774d438ba296399dee2de0a16e76d2789126a874b4d676595c635c906f288c856c90135a7e685d1cf959443b06849c742d85debd37bbfaf2c091e13f03d35d7654e10860dbceb8f548479886063859e65e4f6a267c405232827b584fd3360c6900de260647e544bb32d61b8b64206906794fad7270ea5d32000f0d0c7ecb21ad27209d79eca9c1279b36cfc855648f8f4ae4d2b54a5", 0xc1}, {&(0x7f0000002a80)="3bd9c43e9c9f34a3aebea41d50fe99573be408b3fc1aa57201", 0x19}, {&(0x7f0000002ac0)="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", 0x1000}], 0x4, 0x0, 0x0, 0x8080}, {&(0x7f0000003b00)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000003b80)="5c5b2fa2f96800b2c785b9e4a2d01a12e1f1d8ba6fee38cb8674b06a9717a68c40bc7e216c2f5b78b90ceba173bdf1e097a0bb096993adac1d2004cc55290c3d0095fd9d93", 0x45}, {&(0x7f0000003c00)="729d5097cd53b35031ad0ee9462546e6c00a3180c5fc4baa166163d654239f769746c98b5086d5086f98acc60585503f253112013c28c0cc902427abc4dd78597447c4ce4cd41042e7a12555bd2b04fe32b39e2292ff6d3bb77c6440a27e5114e46489660b5c3c19211e5ac9be4f56d0a16d9f444b8efdba5522884cebc85cd68a6d9406ff8cdea75f92acc379e6ec994c", 0x91}, {&(0x7f0000003cc0)="0aaef804d587a550258625de695011c7d10f5093d1d6fb1e9c64a2fb6b657f9da59f471c6d9ee7621171591992520bc5b568681521a8e510d23e4ed05b29f505625c79f314cd34c3149d7804ea50aaae87c36bf10caf463898828c7af8b716517a7a309d2c81113b96de50e04d6a1b28505c7643656e5ffaa4c37429eb1b594c47fedb992cfb188020bf9c744b7d81e871e85f6eb5fd938de6738911d9d3899895", 0xa1}, {&(0x7f0000003d80)="b859d8402abbd87ab91378836d94e722817e8ff1eaddd3bff9687f1e5b38a3379218f151aed2eb538d6a6b6aec41", 0x2e}, {&(0x7f0000003dc0)="baf5424a94f22fcb13cfb6effc5ac31c2af3fe6bbade8e73ca8fc752ed1ed18f3791314bb73f008c59ce0d12ae79fc9cae00639291f0334f96cf73a132417d4df046", 0x42}], 0x5, &(0x7f0000003f40)=[@rights={{0x20, 0x1, 0x1, [r0, r0, 0xffffffffffffffff, r93]}}, @rights={{0x30, 0x1, 0x1, [r94, r2, r96, r98, r1, r2, r4, r100]}}], 0x50, 0x20000000}, {&(0x7f0000003fc0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000004100)=[{&(0x7f0000004040)="bb5631bbfbaa673b33a86318908c23be7ddc662d5fd9060020ec2d3450fd8361f970f5747ad42a09131ba3bf15e5fef3d253acbdf09016e8e5e2015e6dd5f519deee2c931951b9a80b855be4af77cf3f267c26e19d3f77decedad7b30485ae65c597c1e6169a7d1921eccb5af943a38b1ce025e3a8d47f882498237996f3bdfa7a4f85c326a3f680196b02351f9a05bbdb0ab03668e68aad414c206598442c804de8f45b922886de74fd14761abe85", 0xaf}], 0x1, 0x0, 0x0, 0x20004001}, {&(0x7f0000004140)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000043c0)=[{&(0x7f00000041c0)="57a552b453429942560b9f499f7e0b01fecc1633d7f1a384e5429c88167a0f72977bce63ed1b85d6c1698e6aa8218134789a8ac632568b836c4279d34733579ed1189499648a86e985ac69c5b5b7c8ade7b1acacc09e4aed619c75f38e7e7246b6f39bac6e14df065c6be9c4be93832e2f5bbec637c20b239818a4fb72e3bdef5abda6fd8e08e4ce7d99a5c76a9e69af4f2811fff68178af8871d8ec8505863b241d6494c25b8714e8d86d4a430b8e8221317eb381b12f2a31ca9c64175a83", 0xbf}, {&(0x7f0000004280)="d34cf9051693dc7b168d34c896e03a19e78c2a8277334b444abd4db3bd2be0cc5ea19a493ba12703d125dd0a9119efbc99cb4c5f5b1029b8e97182d97fc9b12c86", 0x41}, {&(0x7f0000004300)="d719bad3db910a8e7547542075eae66e024304bb1d1dcb981ea1485737dda3e8892acee3dbfbc9bda60b6b8bec384582018b581d3273cdfa7e58c8104c5ca328ce111f123dfa0fdb17cd7c88a17a0fff40d666d123e102edc17563dd0f7b5c594216e954ef470474627e520eeabfb0f5410612512c9e8fab769c03de1714f7f3beb68bd34b4c5e8b734a", 0x8a}], 0x3, &(0x7f00000046c0)=[@rights={{0x1c, 0x1, 0x1, [r101, r2, r2]}}, @rights={{0x24, 0x1, 0x1, [r102, r103, r1, r106, r109]}}, @rights={{0x18, 0x1, 0x1, [r111, r113]}}, @cred={{0x1c, 0x1, 0x2, {r115, r116, r117}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r119, 0xee00}}}, @rights={{0x1c, 0x1, 0x1, [r126, r128, r129]}}, @rights={{0x1c, 0x1, 0x1, [r130, r133, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [r135, r3, r0, r136, r138, r139, r141, r1, r143, r144]}}], 0x118, 0x4800}, {&(0x7f0000004800)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004cc0)=[{&(0x7f0000004880)="85c732538e555f9a92f2fbd0ca7b063c59779c92db2be30bda534d264177ae98f9da4d10703365fd3447b21883388e63217994a22501f9625abdde8f6b1669ad2e38cdcfc47d21580970", 0x4a}, {&(0x7f0000004900)="d0dae979fb9ef95e0fd4d34084b9ff81fb149c20faccc64b916078b09d7825b61b0f38b364338e92eb1d988856dd9972a33a23d6743a03f1a866f66cfb741fff7cdfdc4d1feb66858ce12cc866f267f19af450063e", 0x55}, {&(0x7f0000004980)="b2d3a3820c269ad306d72aff2b52c46aa26aab8340b7b27a7ce9a417503d1ef384beebfffcb1669c8fdecb74599edb9a7db47f879a29a59c5df4e9a4ed60db44b525f0291872144b8237b03d7cea1a735a0d9f63f4583d9819e4eaa257df0731a2c5d7f0513ff426e700a2979233fb2520b38c391dc77d5c79cafdafcec35b5781973862d480785577ef816fba074a6019a0abe347a28deacf72d2e19ae687108d9472ec8989dc1ff154d58da96d1f0e9da162d7840fe9379c662815875ea64fc96f260e74d4a3f7247360c63da205cd49f4262683a90f08bbf891c7", 0xdc}, {&(0x7f0000004a80)="7d9bf129ac29204686add12821f1a00e6f93109da1f1c66293b011d09e0d51933a0547a5e2593e711646f32703d5890558b12f810320cdad47ad24de729967bb4ca39cc7299491119b7e28a7eafad962d02d111b510d59fba31d894b3fee35eea5eb6a8a3d6455f60db7c28aad42f372e3cbe4", 0x73}, {&(0x7f0000004b00)="909524435ea54b025437788ce674c706351d48338d3e49016217aacdc3a1cee30a", 0x21}, {&(0x7f0000004b40)="710a6cbb4528d8ef0ed186ad6f5aecc6c02948b7a736d428c051c12cd0655db63cbfb7a824008ecc642c03c076af8ddffbae6581d7654e883efcfde989d427c63cda9cc0fcfb746e383454d255d9653dd9c09fb21a3ad132d54a7a5c9b161aa5bc6d3b134d13383247296e", 0x6b}, {&(0x7f0000004bc0)="47961f190b5cdd1d7576fd4ce68ab88c5cef5b0060efc0648c91eb1a0d40921b336d998acb3c06afa20fd9872a", 0x2d}, {&(0x7f0000004c00)="6c2be21322cf9cd497b929e01f7b4683c857e5d742a528faa76a3b241e062e03b4d5a2fe1c24fecb0b37247d16c62d597882fad66b2a55ba7b871732f02fcc47910107c8c8bdb2cf25b66f677d74bb649cfc6d5ed09dc7bed9e2386ab47eb8b09932d8a58e8720569b68b9c29d804aa7f68e36e5640a96dfa58d6e966caf530bb7e0b06416a993ecebf918ea6934411be895667a3ba2c2975a9c6cc8205bfd0fc871ca9e054489090713602f4d3cdeb0bb2769d36cd0bb211c28fb71511c50", 0xbf}], 0x8, &(0x7f0000005180)=[@rights={{0x28, 0x1, 0x1, [r0, r145, r148, r149, r1, r3]}}, @cred={{0x1c, 0x1, 0x2, {r151, r152, r154}}}, @cred={{0x1c, 0x1, 0x2, {r155, r157, r164}}}, @cred={{0x1c, 0x1, 0x2, {r166, r168, r175}}}, @cred={{0x1c, 0x1, 0x2, {r176, r177, r178}}}], 0xa8, 0x20000040}], 0x8, 0x3) r179 = socket$unix(0x1, 0x2, 0x0) r180 = fcntl$dupfd(r179, 0x0, r179) ioctl$PERF_EVENT_IOC_ENABLE(r180, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r180}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:21 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000080)=0x0) r1 = semget$private(0x0, 0x1, 0x8) semctl$GETZCNT(r1, 0x0, 0xf, &(0x7f0000000340)=""/44) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x839}, 0x8) ftruncate(r3, 0x200004) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/relabel\x00', 0x2, 0x0) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) statx(r3, &(0x7f00000000c0)='./bus\x00', 0x6000, 0x431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='overlay\x00', 0x800, &(0x7f0000000100)=ANY=[@ANYBLOB='metacopy=on,nfs_export=off,index=off,xino=auto,fowner>', @ANYRESDEC=r0, @ANYBLOB='1uid=', @ANYRESDEC=r5, @ANYBLOB=',dont_measure,fsname=jfs\x00,dont_hash,\x00']) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r8, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r6, 0x8904, 0x0) r9 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xffffffffffffff20, 0x2515814cfca91b93) ioctl$FBIOPUTCMAP(r9, 0x4605, &(0x7f0000000580)={0x8000, 0x3, &(0x7f0000000480)=[0xff80, 0x6, 0x40], &(0x7f00000004c0)=[0x1f, 0x9, 0x0, 0xb39f], &(0x7f0000000500)=[0x9, 0x8, 0x5, 0x7f, 0xc8, 0x3, 0x6, 0x7], &(0x7f0000000540)=[0x9]}) setsockopt$inet6_opts(r6, 0x29, 0x46, &(0x7f0000000380)=@fragment={0x2f, 0x0, 0x40, 0x1, 0x0, 0x8, 0x64}, 0x8) openat$bsg(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/bsg\x00', 0x200000, 0x0) 05:08:22 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:22 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:22 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r13, 0x839}, 0x8) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r12, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_MIXER_WRITE_RECSRC(r12, 0xc0044dff, &(0x7f0000000280)=0x7cd) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r14, r10, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r14, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r7, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r15, @ANYBLOB=',func=KEXEC_KERNEL']) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 715.260231][T23985] overlayfs: unrecognized mount option "fowner>184467440737095516151uid=18446744073709551615" or missing value [ 715.313849][ T26] audit: type=1800 audit(1579324102.142:171): pid=23967 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16971 res=0 05:08:22 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:22 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e643d622fdb781608e364a638bf21f10f77646f20f90d1d2d9f03270e480c0fc40bd01f9f816420f9dce5e365101c97d7632be73b", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) getsockname(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, &(0x7f0000000100)=0x80) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e21, @multicast1}}, 0x0, 0x0, 0x2a, 0x0, "de3e7b14d52d4f9481773c5c881f012869dd04109612529901b011c63db6f3dcfdb007829a7976b762de79700f7df74a0fb871acc7d696f69afd1ca9c328fe5dd0fae98410d9f3d3d16cc7e5adbdf4e7"}, 0xd8) 05:08:22 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 715.434764][T24015] overlayfs: unrecognized mount option "fowner>184467440737095516151uid=18446744073709551615" or missing value 05:08:22 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) sendmsg$nl_netfilter(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000c00}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)={0x108, 0x1, 0xa, 0x101, 0x70bd27, 0x25dfdbfd, {0xc, 0x0, 0x2}, [@nested={0xf1, 0x50, 0x0, 0x1, [@generic="8aae05d53e919e571e7f7ec5b56d0718840d990566f27df7dcee692780da8e7d88d9f86d1c4c8058f27a5c3ab97f2403172c5de0b7777cb679859de144b20aa74b9fff1a7a9b8ab7ae9e0c8a1f8d3af4c8575c21621e6915a68cf689fa24ed63c108f271eb5a111cc7a15a59f1b8dd08b8e43f2d9b0e18bbf87730142f4694b551dea63899a8619db06b29d1af1060672ce286c78f5971c3d261ae158d4d208213ccb1367c40793351ec38da978635b4032cf39cf8dabc740f9228c476aca4eacec02ec9a7f62e4819211af4f51ae35c9e3b3e52a0743cbbb76707da991d1cc2942d56c540", @typed={0x8, 0x3, 0x0, 0x0, @pid=r3}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x40004045}, 0x4c840) sendfile(r0, r1, 0x0, 0x80001d00c0d0) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x6, 0xffffffad, 0x0, 0x260000, &(0x7f0000000000)=ANY=[]) 05:08:22 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 715.644427][T24106] jfs: Unrecognized mount option "nd=b/Ûxãd¦8¿!ñwdo ù -Ÿ'H Ä ÐŸd ùÜåãe—×c+ç;0x0000000000000000" or missing value 05:08:22 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r8, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r10 = socket$inet6(0xa, 0x400000000001, 0x0) close(r10) r11 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r12, 0x839}, 0x8) ftruncate(r11, 0x200004) sendfile(r10, r11, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000280)={r9, 0x8}, &(0x7f0000000040)=0x8) ioctl$VIDIOC_EXPBUF(r11, 0xc0405610, &(0x7f0000000240)={0x7, 0x2, 0x5, 0x2800, r0}) ioctl$KVM_S390_VCPU_FAULT(r7, 0x4008ae52, &(0x7f0000000080)=0x6) r13 = socket$unix(0x1, 0x2, 0x0) r14 = fcntl$dupfd(r13, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB='<\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r14, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:22 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0xff01, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 715.794602][T24106] jfs: Unrecognized mount option "nd=b/Ûxãd¦8¿!ñwdo ù -Ÿ'H Ä ÐŸd ùÜåãe—×c+ç;0x0000000000000000" or missing value 05:08:22 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:22 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x111, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8800, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_disconnect={0x400}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r3, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) write$snddsp(r2, &(0x7f0000000080)="a75167f08100af768fe6fbb7505e1e6d3689f49b369b7c931400f7f280d26dcd4b657980faefe7b88a802b0364db2a30f7afce7a41c1c193da", 0x39) 05:08:22 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:23 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r13, 0x839}, 0x8) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r12, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_MIXER_WRITE_RECSRC(r12, 0xc0044dff, &(0x7f0000000280)=0x7cd) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r14, r10, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r14, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r7, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r15, @ANYBLOB=',func=KEXEC_KERNEL']) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:23 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) open(&(0x7f0000000080)='./file0\x00', 0x101000, 0x12) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) clone3(&(0x7f0000000480)={0x28000, &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000240)=0x0, {0x28}, &(0x7f0000000300)=""/238, 0xee, &(0x7f0000000580)=""/4096, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, r2, 0x0, 0x0, 0xffffffffffffffff], 0x6}, 0x50) sched_getscheduler(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = socket$unix(0x1, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r9}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 716.209204][T24230] QAT: Invalid ioctl 05:08:23 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:23 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 716.375134][T24236] QAT: Invalid ioctl [ 716.429414][ T26] audit: type=1804 audit(1579324103.252:172): pid=24238 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir720864866/syzkaller.GDqkZT/914/file0" dev="sda1" ino=16545 res=1 05:08:23 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 716.649283][ T26] audit: type=1800 audit(1579324103.472:173): pid=24247 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16835 res=0 05:08:23 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@usrquota='usrquota'}]}) 05:08:23 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:23 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0xa) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) r8 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r8, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) splice(r8, &(0x7f0000000080)=0x438a, r9, &(0x7f00000000c0)=0x10001, 0x5, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="080004000000faa363e1f5922a6e1a306467d57068c3540dbf255804b145f66ae9e0bf626d88eb6b774eb3a33d14b480751a3201930507b15902e914719a1b5111fc8f1cabfcc8197ff6b59bc1ed1dd8e5db79bc86e4da26743bed8c10930add7644a8ac9ed2ff5435e7ac853d6c8d5f078746c90915d88477c2a13106692d89d2ddf426e3e94dbe778e55d45c92bc2c85199e243e648f02c02fbfaa74c9d5e64b8eb505541c"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:23 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:23 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r1) stat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000240), &(0x7f0000000280)=0xc) setresgid(0x0, 0x0, r4) setxattr$security_evm(&(0x7f00000005c0)='./bus\x00', &(0x7f0000000600)='security.evm\x00', &(0x7f0000000640)=@v1={0x2, "5a519d105173c9efa537e3356b57"}, 0xf, 0x1) r5 = getegid() r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r7) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) getgroups(0x7, &(0x7f0000000180)=[r1, r2, r4, 0x0, r5, r7, r8]) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6e6f71756f74f593f3b4c839", @ANYRESHEX=0x0, @ANYBLOB="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"]) r9 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f00000006c0)={0x2, &(0x7f0000000680)=[{}, {}]}) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$EVIOCGMTSLOTS(r10, 0x8040450a, &(0x7f00000002c0)=""/134) 05:08:23 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 716.960978][T24259] jfs: Unrecognized mount option "noquotõ“ó´È90x0000000000000000gê4Ì×”·(øŸ(XêW¥7—è?(ã1l©ÃWfiu^ö¿g° z0»_òWt"" or missing value 05:08:23 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r13, 0x839}, 0x8) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r12, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_MIXER_WRITE_RECSRC(r12, 0xc0044dff, &(0x7f0000000280)=0x7cd) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r14, r10, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r14, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r7, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r15, @ANYBLOB=',func=KEXEC_KERNEL']) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:23 executing program 3: r0 = getpgid(0xffffffffffffffff) sched_setscheduler(r0, 0x2, &(0x7f0000000000)=0x34f) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x200001, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x6, 0x0, 0x7}, &(0x7f0000000180)=0x10) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r5, 0x839}, 0x8) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000240)={r2, 0x3}, 0x8) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='noquota,gid=', @ANYRESHEX=0x0, @ANYBLOB='\x00\x00']) 05:08:23 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(0xffffffffffffffff, 0xc0305615, &(0x7f0000000080)={0x0, {0x10000}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) prctl$PR_GET_SECCOMP(0x15) 05:08:24 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:24 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:24 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) syz_open_procfs(r2, &(0x7f0000000140)='net/nf_conntrack_expect\x00') r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r5, 0x839}, 0x8) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000300)={0x0, 0xfffffffffffffd7c, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r8 = fcntl$dupfd(r6, 0x0, r7) r9 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r10, &(0x7f00000006c0)='asymmetric\x00', &(0x7f0000000180)=@keyring={'key_or_keyring:', 0x0, 0x2}) r11 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r10) keyctl$clear(0x7, r11) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r12 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x8000, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r12, 0x4008af60, &(0x7f00000000c0)={@my=0x1}) r13 = socket$unix(0x1, 0x2, 0x0) r14 = fcntl$dupfd(r13, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r14, @ANYBLOB="080004000000000006008870d780470fc500090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:24 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="6ef3d906000000000000003f", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x5, 0x9, 0x3, 0x400, 0x3, 0x7848944d, 0x2, 0x3}, &(0x7f0000000040)={0xfffffffffffffc01, 0x8, 0x200, 0x4, 0x1d86a1d5, 0x3, 0x9, 0x1}, &(0x7f0000000080)={0x9, 0x80, 0xffff, 0x100000001, 0x7, 0x4, 0x1}, &(0x7f0000000100)={r0, r1/1000+10000}) 05:08:24 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:24 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:24 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 717.601039][T24298] jfs: Unrecognized mount option "nóÙ" or missing value 05:08:24 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:24 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 717.759917][T24298] jfs: Unrecognized mount option "nóÙ" or missing value 05:08:24 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_MIXER_WRITE_RECSRC(r10, 0xc0044dff, &(0x7f0000000280)=0x7cd) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r12, r8, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x284042, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC=r13, @ANYBLOB=',aname=/dev/ifput/event#\x00,\x00']) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:24 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:24 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) r0 = socket$netlink(0x10, 0x3, 0xb) bind(r0, &(0x7f0000000000)=@in={0x2, 0x4e22, @rand_addr=0x7ff}, 0x80) 05:08:24 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r6, r5, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r2, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r7, @ANYBLOB=',func=KEXEC_KERNEL']) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) r13 = ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r14, r13, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r14, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r9, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r10, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r15, @ANYBLOB=',func=KEXEC_KERNEL']) r16 = socket$inet6(0xa, 0x400000000001, 0x0) close(r16) r17 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r16, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r18, 0x839}, 0x8) ftruncate(r17, 0x200004) sendfile(r16, r17, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r17, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$NS_GET_OWNER_UID(r17, 0xb704, &(0x7f0000000280)=0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./bus\x00', 0x5, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="045308a004ae06aedaa420174fa57764ccb45e11be0b557bb133b9862e229ed38357cf910c3aa09f459b30317f0012312f5ec0c2e24af258f16d90f4fd7a5264afe55d25762e389396f9e32184ebf726e9f87472e0085d247048ad3a1b8f4dcc49ba94ad0a5494091bc2ad2cab43af31037e4a54675852feba22bb1983bf31d238b7c4b7d24f0b5340605032a7a5ca00c5bf06dc281d524adadca3d742709655572ea6c103e842af74865bf0aae705b2f05d0da2b61dc0e2b6d87145493c2f73876b6e20b38fb511420cc62f0c43acda94e0", 0xd2, 0x1}], 0x62004, &(0x7f00000002c0)={[{@force='force'}], [{@uid_gt={'uid>', r1}}, {@fowner_gt={'fowner>', r10}}, {@seclabel='seclabel'}, {@uid_lt={'uid<', r19}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 05:08:24 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 718.137220][ T26] audit: type=1400 audit(1579324104.962:174): avc: denied { create } for pid=24414 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_connector_socket permissive=1 05:08:25 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)="290000002000190000003fffffffda060200000000e80002060000040d0004", 0xff98}], 0x38b) r2 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) socketpair(0x9, 0x3, 0x1, &(0x7f00000000c0)) r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2500000000080004000000000008000700bf3955cc63f0858f9dc22f9bfacef890aaec71a11865c9a7843685cae6408da08a33e763c60f8e97bf1d151ce2151bad71458530031d1fb1b059d2ef2ea74788da6599f5c17554b3a914d8e66df1a3c63889752f3a81e0ce247580d440e1b50bb38bee70b4ff9821bf0900000000000000f787e6cabea14785bc30df2fdb3c5ce3f4", @ANYRES32=r8, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) mq_timedsend(r8, &(0x7f0000000300)="e0fa72cda96566f5cf3b2dd48c0ba3fb79d2ff215340fe4a309e2037f672180e5945afd4d0e94a0c8005b771c8e0aa9433685b95a84fc0692088fd7c95e0cfc8a3c1603648cc4e9150a603f2355679481cda3db2014358ca77d6f0ce6aa33ba7ca7dee3c2c5ed5168b84aaf8d02ed0487f5593507e4f768cb4926f00984f385166be3056345dcdbe971f0cac5d2b4691fff044b692e91667197cbac1d7230b7a6cda862440d2d330", 0xa8, 0x7, &(0x7f0000000080)) [ 718.146508][ T26] audit: type=1400 audit(1579324104.962:175): avc: denied { bind } for pid=24414 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_connector_socket permissive=1 05:08:25 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:25 executing program 4: 05:08:25 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 718.415612][T24436] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 05:08:25 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:25 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) statx(r1, &(0x7f0000000040)='./bus\x00', 0x800, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r10, r9, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r10, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r6, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r11, @ANYBLOB=',func=KEXEC_KERNEL']) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_appraise='dont_appraise'}, {@dont_appraise='dont_appraise'}, {@fowner_lt={'fowner<', r3}}, {@euid_gt={'euid>', r11}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@permit_directio='permit_directio'}, {@subj_type={'subj_type', 0x3d, 'jfs\x00'}}]}) 05:08:25 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r2 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttynull\x00', 0x0, 0x0) syz_open_pts(r2, 0x20404) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 718.910635][T24461] jfs: Unrecognized mount option "fowner<18446744073709551615" or missing value 05:08:25 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_MIXER_WRITE_RECSRC(r10, 0xc0044dff, &(0x7f0000000280)=0x7cd) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r12, r8, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x284042, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC, @ANYBLOB=',aname=/dev/ifput/event#\x00,\x00']) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:25 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:25 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:25 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r4) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000080)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_NET_NS_FD={0x8, 0x7, r6}, @GTPA_MS_ADDRESS={0x8, 0x5, @empty}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040000) sendfile(r2, r0, &(0x7f0000000000), 0x100000001) 05:08:25 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="bda49afd2c5056d36769643d55a8c5959b50ee6dd1df348cf30272e0a41462df8a592a1f1f423c1512fbda4a86482aee908ec97938728278b7871a4612986c3e2c1b3991dfaf2f23e377c91fff8ab6939a387df25529366a2923a214bc0be4e67486ac4e2acde9093802", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) [ 719.142899][T24472] jfs: Unrecognized mount option "½¤šý" or missing value 05:08:26 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r6}}, 0xc) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:26 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2120002}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x1, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x4}, [@CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_MASK={0xc, 0x3, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x4}]}, @CTA_EXPECT_MASTER={0x4}]}, 0x38}}, 0x4000) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:26 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 719.218962][T24472] jfs: Unrecognized mount option "½¤šý" or missing value [ 719.384136][T24464] jfs: Unrecognized mount option "fowner<18446744073709551615" or missing value 05:08:26 executing program 4: getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./bus\x00', 0x4, 0x0, 0x0, 0x20000, &(0x7f0000000140)={[{@nodiscard='nodiscard'}, {@resize='resize'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@grpquota='grpquota'}, {@discard_size={'discard', 0x3d, 0xa5e3}}, {@iocharset={'iocharset', 0x3d, 'ascii'}}, {@nointegrity='nointegrity'}, {@uid={'uid', 0x3d, r0}}]}) 05:08:26 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0xff000000, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:26 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = fanotify_init(0x40, 0x800) r9 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r9, 0x29, 0xca, &(0x7f0000000040)={0x8001}, 0xc) dup3(r8, r9, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000080)={0x40, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_TID={0xc}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_LINK={0x8, 0x1, r10}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:26 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:08:26 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_MIXER_WRITE_RECSRC(r10, 0xc0044dff, &(0x7f0000000280)=0x7cd) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r12, r8, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x284042, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC, @ANYBLOB=',aname=/dev/ifput/event#\x00,\x00']) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:26 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0xff010000, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:26 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000006b40)=[{{&(0x7f0000000000)=@ax25={{0x3, @netrom}, [@default, @null, @null, @null, @bcast, @default, @null, @netrom]}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/42, 0x2a}, {&(0x7f00000000c0)=""/5, 0x5}, {&(0x7f0000000240)=""/201, 0xc9}, {&(0x7f0000000340)=""/250, 0xfa}], 0x4}, 0x1}, {{&(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000440)=""/95, 0x5f}, {&(0x7f00000004c0)=""/49, 0x31}, {&(0x7f0000000500)=""/142, 0x8e}, {&(0x7f0000000680)=""/189, 0xbd}, {&(0x7f00000005c0)=""/38, 0x26}], 0x5, &(0x7f00000007c0)=""/4096, 0x1000}, 0x3}, {{&(0x7f00000017c0)=@sco, 0x80, &(0x7f0000000600)=[{&(0x7f0000001840)=""/246, 0xf6}, {&(0x7f0000001940)=""/143, 0x8f}, {&(0x7f0000001a00)=""/75, 0x4b}], 0x3}, 0x1ff}, {{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a80)=""/71, 0x47}, {&(0x7f0000001b00)=""/7, 0x7}], 0x2}, 0x4}, {{&(0x7f0000001b80)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001c00)=""/226, 0xe2}, {&(0x7f0000001d00)=""/170, 0xaa}], 0x2, &(0x7f0000001e00)=""/78, 0x4e}, 0x9}, {{&(0x7f0000001e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001f00)=""/100, 0x64}], 0x1, &(0x7f0000001fc0)=""/64, 0x40}, 0x101}, {{&(0x7f0000002000)=@ax25={{0x3, @default}, [@bcast, @bcast, @remote, @remote, @null, @default, @netrom, @default]}, 0x80, &(0x7f0000005440)=[{&(0x7f0000002080)=""/4096, 0x1000}, {&(0x7f0000003080)=""/218, 0xda}, {&(0x7f0000003180)=""/4096, 0x1000}, {&(0x7f0000004180)=""/187, 0xbb}, {&(0x7f0000004240)=""/4096, 0x1000}, {&(0x7f0000005240)=""/20, 0x14}, {&(0x7f0000005280)=""/84, 0x54}, {&(0x7f0000005300)=""/163, 0xa3}, {&(0x7f00000053c0)=""/71, 0x47}], 0x9, &(0x7f0000005500)=""/138, 0x8a}, 0x2}, {{&(0x7f00000055c0)=@alg, 0x80, &(0x7f0000006a00)=[{&(0x7f0000005640)=""/92, 0x5c}, {&(0x7f00000056c0)=""/27, 0x1b}, {&(0x7f0000005700)=""/181, 0xb5}, {&(0x7f00000057c0)=""/170, 0xaa}, {&(0x7f0000005880)=""/4096, 0x1000}, {&(0x7f0000006880)=""/84, 0x54}, {&(0x7f0000006900)=""/240, 0xf0}], 0x7, &(0x7f0000006a80)=""/165, 0xa5}, 0x7}], 0x8, 0x101, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000006d80)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000007100)={&(0x7f0000006d40)={0x10, 0x0, 0x0, 0x21}, 0xc, &(0x7f00000070c0)={&(0x7f0000006dc0)={0x2e0, r3, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0xa4, 0x8, [{0x14, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x29c00e87}]}, {0x2c, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x276817c0}]}, {0x24, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x47}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x98}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xd3bf794}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x656c6055}]}, {0x3c, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x304d4866}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x77046bac}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7ee8139}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xf8, 0x8, [{0x24, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfb}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2d6f5aa4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xea}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x46}]}, {0x3c, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7236f6b7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3eb8431}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2a219339}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x56d6c763}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9e}]}, {0x24, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2ddccbd2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x39}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfa}]}, {0x1c, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xaf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xca}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x33b5647c}]}, {0x24, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7c60fa59}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x80}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x593d6c6a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x34}]}, {0x14, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x17c15a0f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x40}]}, {0x1c, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1bce36ad}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x65}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x38d34ec0}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x104, 0x8, [{0x2c, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbc}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xab}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x61f00b5a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x99deba9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x72}]}, {0x34, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x24039381}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdc}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x68}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe1}]}, {0x2c, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5d07e61c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x74dca680}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x66}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x79}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2aca7081}]}, {0xc, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x16}]}, {0x14, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x24}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x122a769f}]}, {0x54, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x34690fa4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x471f7ae1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5325e48}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xaa}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4183f379}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x711afd04}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb2}]}]}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x11}, 0x40) 05:08:26 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:08:26 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) syz_mount_image$cifs(&(0x7f0000000240)='cifs\x00', &(0x7f0000000280)='./file0\x00', 0x80, 0x5, &(0x7f0000000480)=[{&(0x7f0000000300)="b360418ca550149d56abe80fc599635875be4320f4b3511646683d7c0c2d5c53c58c93d0f8acd0ba7d6c13ab5dc32707608ee87b70d69f192854fa7ead65d6a742250ff9419772dcb66d5d14f5b658b6bf8bb5202aa84f9228ec24484e78b05c5b89dc53350272c86c9ace4eb2319bd1fbd7217ac999cc6ee94ec183595f74afe0ee", 0x82, 0x3f}, {&(0x7f0000000580)="094648f449926ac9bb454c1a46df3777c3e8c31860544ebc53436f35c2c0558be2b4e97ef2fc3ee43c6cbef7b24683fecd1b9443d663baa0e549dbb9b67748105689e3e67a5306430a13ca52f43949af05598ee11e92c290f0cd4782b3fb5057815b9bf07b02f8f85c2ae0e95ec92f423eeb947a752de91a576c6db1dffe2bee9edaafd34c0cb752f126e75a9e4b11ccb39c00c7b2fc884468d8e3f35018de9d8ba896baab55ef9dc6511868f965a2f0b991472cf4fa70abeaa74c025b7d20c7", 0xc0, 0x40}, {&(0x7f0000000640)="3ea0ebf4427811e78b1177b3e6f88ebed84d9fc9b18ca2b49f5d47d01bde74fbba9ef3c0107767ce352d5a8413becc8d166ef76ef77479a54b048bfd02af6ba951e1efbcb6c4a9a84e7beeb4628c4d8eab57a793467d40b57ba1c1772620374aa39a820e63c066d09e56063f862d9dd304d1cdc689976d2c78b6cd922660cddc28273cd55cdaa3210d4ba584e86939bbaf7658518834b79759b7f07126bcacba", 0xa0, 0x631a}, {&(0x7f00000003c0), 0x0, 0x1}, {&(0x7f0000000700)="b228d45b7853c5a13720598b8ec5777025898d300e69d3624e3646d07a49a45120ef41bb05cd7fce729eef1a712ad2a690b7725cb6a231a12136066550ecd7c7d04261f6275cae6749cc5a40a5378ab4c091f4fa06d9e2a894c482ed5ce3f0523d429f2a88d681ee6aed722a1883712964e532ef08aee2fbb10d5cafae6da88a58702d2422c4925c35bb13fb393d63b68720c3f1f2260a21abcd2212a8ac40c4bea52a13d89e5fa632ae4017ad7737faead0806ac58f2d2bfe1d0102746c4d1662efa8310e19023a270217a8a7666dd13fb7144a1ac68bed65ae80de1a96b7a0e286b61de4e969029537efb225", 0xed, 0x8}], 0x202002, &(0x7f0000000800)='trustedbdevwlan0keyringvboxnet0proc\x00') ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x81) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SIOCNRDECOBS(r6, 0x89e2) r8 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r9 = socket$unix(0x1, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000840)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029000000fddbdf25020000000800040000000000080008000200000008000400000000009adaf971d7a030279dd206000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 719.941967][ T26] audit: type=1800 audit(1579324106.762:176): pid=24498 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=17218 res=0 05:08:26 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) 05:08:26 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:27 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@noquota='noquota'}, {@gid={'gid'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x39, 0x0, 0x33, 0x37, 0x35, 0x33, 0x9e, 0x7], 0x2d, [0x56, 0x63, 0x30, 0x64], 0x2d, [0x33, 0x35, 0x37, 0x36], 0x2d, [0x65, 0x36, 0x65, 0x61], 0x2d, [0x2, 0x65, 0x70, 0x61, 0x37, 0x33, 0x66, 0x31]}}}, {@pcr={'pcr', 0x3d, 0x16}}, {@subj_role={'subj_role', 0x3d, '},cpuset'}}]}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x103002, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f00000000c0)=0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x800000) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r3, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r4 = fanotify_init(0x40, 0x800) r5 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r4, r5, 0x0) setsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f0000000180)={0x0, 0x1}, 0x8) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) 05:08:27 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 05:08:27 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r4) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r6}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r3, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r2}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000100)={@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e20, @broadcast}, 0x2, 0x1}}, {&(0x7f0000000080)=""/47, 0x2f}, &(0x7f00000000c0), 0x14}, 0xa0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='noquota,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c02"]) [ 720.475675][T24643] jfs: Unrecognized mount option "fsuuid=9" or missing value 05:08:27 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x406, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 720.617740][T24652] jfs: Unrecognized mount option "" or missing value 05:08:27 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_MIXER_WRITE_RECSRC(r10, 0xc0044dff, &(0x7f0000000280)=0x7cd) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r12, r8, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x284042, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC, @ANYBLOB=',aname=/dev/ifput/event#\x00,\x00']) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:27 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:27 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 720.716997][T24643] jfs: Unrecognized mount option "fsuuid=9" or missing value 05:08:27 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) ioctl$BLKSECTGET(r4, 0x1267, &(0x7f0000000080)) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:27 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000000)=""/97) 05:08:27 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x4, @empty, 0x4e24, 0x1, 'none\x00', 0x4, 0x1, 0x67}, 0x2c) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) [ 720.944130][ T26] audit: type=1800 audit(1579324107.772:177): pid=24652 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16785 res=0 05:08:27 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) r13 = ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r14, r13, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r14, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r9, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r10, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r15, @ANYBLOB=',func=KEXEC_KERNEL']) mount$binder(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='binder\x00', 0x80000, &(0x7f0000000300)={[{@max={'max'}}, {@stats='stats=global'}, {@max={'max', 0x3d, 0x3}}], [{@seclabel='seclabel'}, {@smackfshat={'smackfshat', 0x3d, 'useruwlan0'}}, {@dont_measure='dont_measure'}, {@euid_eq={'euid', 0x3d, r9}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@pcr={'pcr', 0x3d, 0x3e}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x63, 0x35, 0xd, 0x30, 0x32, 0x63, 0x35], 0x2d, [0x55, 0x37, 0x63, 0x38], 0x2d, [0x30, 0x31, 0x32, 0x61daa6e8ebdafc47], 0x2d, [0x38, 0x35, 0x2b, 0x4f], 0x2d, [0x33, 0x52, 0xcbd6e82825c2e127, 0x37, 0x0, 0xd2f56945aeb5ac96, 0x6b, 0x37]}}}]}) r16 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r16}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r8, 0x110, 0x4, &(0x7f0000000280)=0x1, 0x4) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:28 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x206000) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000040)={0x7, 0x1ff}) 05:08:28 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 05:08:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) sendmsg$key(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x2, 0xe, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000600)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r5, 0x839}, 0x8) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$PIO_SCRNMAP(r4, 0x4b41, &(0x7f0000000440)="4a7a0fa36c598b36d74366de7bbd7ab2f77d0eed31547632a32d7c47341a68b74006d76d01305d5b88346bd0112b33e853c923cad7fc573f14593beddacfa6880246e2e6cafba65bca9e4fd9c9b61546b55854f7acd1125ccf31f34eec2e9f6a6006c4e9e2995dd15ea06f87") r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000140000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500000000000a000000000000b500000000000000000000ffffac141400000000000000000005000600000000000a00000000000000fe8000000000000000000000000006ff0000000000000000"], 0xa0}}, 0x0) r7 = dup2(r2, r6) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="0212009ec90000001800000000000400ae611f02"], 0x10}}, 0x0) sendmsg$key(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) r8 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000680)="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", 0x1000, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000004c0)={r8, 0xdb, 0x58}, 0x0, &(0x7f0000000500)="52a67678e83b0b8d89df779149c6f71d46781fb0d1466fbbcc257bd407dc9564068f4e60ea55a24cef4816ae310755c6f2a3627d48c2d4998667dcc76ddfa1146d165d04439e785173f352ed159219e494c0cd55a74f30e153e5359c50d1a09342da8e7b682a8872a4d237744c8feaa482a5cf925e019101d4881a0b87512b13564a9334f8607b161840487015479be7f8d51c6405d86d47d0607c518190f52afa12ba3631125d33069d79011b3b79a5dd6982a6749bdbf8b81445a2d9315369ed348c048091ffb08a4d0e173ad541aed419da2d0d19104830d6f7", &(0x7f0000001680)=""/88) 05:08:28 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:28 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@discard='discard'}, {@gid={'gid'}}]}) 05:08:28 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_MIXER_WRITE_RECSRC(r10, 0xc0044dff, &(0x7f0000000280)=0x7cd) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x284042, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC=r12, @ANYBLOB=',aname=/dev/ifput/event#\x00,\x00']) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:28 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r4, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmctl$SHM_STAT_ANY(r4, 0xf, &(0x7f0000000300)=""/218) r5 = fcntl$dupfd(r3, 0x0, r2) r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 721.686034][T24801] JFS: discard option not supported on device [ 721.742036][T24801] JFS: discard option not supported on device 05:08:28 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@resize='resize'}, {@nodiscard='nodiscard'}, {@integrity='integrity'}]}) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r1, 0x839}, 0x8) ftruncate(0xffffffffffffffff, 0x200004) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) socket$nl_crypto(0x10, 0x3, 0x15) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r7, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$VIDIOC_S_EXT_CTRLS(r6, 0xc0205648, &(0x7f0000000280)={0x0, 0x9, 0x401, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xaaca145cddf5ad0f, 0x4bbf27c9, [], @value64=0x1}}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r8, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x21}, &(0x7f0000000040)=0xfffffffffffffe20) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={r9, 0x8}, 0x8) 05:08:28 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB="1cedff0af02178b50ea24c46c8c662286be1c4819a27347b39afac3d80fd8d3717c6599e78cb4b2997902cb3c9abaa2535afe70f81475e29416139103738b6c87f21cdc0304f4924ca4b9f05d4819bd3786590096a1381471a8802635b0f53bf3ecfa126779878b8409f6226e30c788e052e6db644c84dd707f84553bbd0ea967f8c3258dfbf9147eae53b73d552552affaa4b3e93adb129ec8a5155bd427afb22456f8be911b20191bef511aa48b409adf0cda7fa4630cb8ef0364c", @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 721.987186][T24816] JFS: Cannot determine volume size [ 722.078131][ T26] audit: type=1400 audit(1579324108.902:178): avc: denied { create } for pid=24814 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 722.116834][T24816] JFS: Cannot determine volume size 05:08:28 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 05:08:28 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 722.128409][ T26] audit: type=1400 audit(1579324108.932:179): avc: denied { setopt } for pid=24814 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 05:08:29 executing program 4: syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000340)=""/221, 0xdd}, {&(0x7f0000000440)=""/95, 0x5f}, {&(0x7f00000004c0)=""/157, 0x9d}, {&(0x7f0000000580)=""/96, 0x60}, {&(0x7f0000000600)=""/171, 0xab}, {&(0x7f00000006c0)=""/230, 0xe6}], 0x6, &(0x7f0000000840)=""/207, 0xcf}, 0x8001) bind$unix(r0, &(0x7f0000000980)=@file={0x1, './bus\x00'}, 0x6e) r1 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r1, 0xc0884113, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000140)={0x3, &(0x7f0000000a40)=[{}, {}, {}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000a00)=0x3b3) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@integrity='integrity'}, {@gid={'gid'}}], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_hash='dont_hash'}, {@uid_lt={'uid<', r5}}]}) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000000), &(0x7f0000000180)=0x4) 05:08:29 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf251b000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:29 executing program 3: prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffc000/0x2000)=nil) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='noquota,gid=', @ANYRESHEX=0x0, @ANYBLOB="0200"]) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x8002, 0x0) 05:08:29 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 05:08:29 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c1ccae5ff384f6cb73fa8d764500eab7b5c5d82285109dc2b8e88b1e8559a52e07390684535af65f1975d77860793bf85db0280c5cc3ad08286a532e54b1d94928787dcb8b71ea0df4a852ced3b6838ea22d5aec25cbbcc18274cb70550aff509a7403908c713b33e65aeea797d90838e294b2080b4eeb85549eae6d8e1d6c4cb0e2bdfeab9a7d6", @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r8 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r8) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000140)='keyring\x00', r8) [ 722.497616][T24839] jfs: Unrecognized mount option "mask=^MAY_WRITE" or missing value 05:08:29 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_MIXER_WRITE_RECSRC(r10, 0xc0044dff, &(0x7f0000000280)=0x7cd) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x284042, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC=r12, @ANYBLOB=',aname=/dev/ifput/event#\x00,\x00']) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:29 executing program 3: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x200, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x38ef) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000080)=0x3, 0x4) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp1255'}}, {@gid={'gid'}}]}) [ 722.533686][T24841] jfs: Unrecognized mount option "gid=0x0000000000000000" or missing value 05:08:29 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat(r7, &(0x7f00000000c0)='./file0\x00', 0x400000, 0x1) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)={0x3c, 0x0, 0x26, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x6, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:29 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 722.819331][T24845] jfs: Unrecognized mount option "mask=^MAY_WRITE" or missing value 05:08:29 executing program 4: getrandom(&(0x7f0000000240)=""/194, 0xc2, 0x2) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="896f71756f74612c6769643d", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x101000, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) alarm(0x2555) [ 722.840615][ T26] audit: type=1800 audit(1579324109.662:180): pid=24839 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16553 res=0 05:08:29 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 05:08:29 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x7f, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) setsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000000240)="34ff80e74dd32d42839b1acc1afd77120d498654a507da358c6a512d7e5988b356696079d3f2c3135a43f6e654fcb6e4486f852f725f18cc5fa539857a7aa81937ae9556176074bf338314880e3571f4c753e273912a4f2c834df03f86213f209ada707d949a76032539e7cc2732167b30d2ee2cad562777847acf613e3270f13324e507ad3fc1eedcafe539bf92c2935f755fb874cbcb765f3ab566ff74d8d5a2dd5a6fda433edc5a9e1e865d9e0bd1de7971b38b4f94856eb330a9b4126b8883a8a4aadbf7ba3d4a21762506c8033118cd7d616f4e6c1e18c63194be2c72ec72670fd33b9a22915e19ba41a75014cb3c6113c98985c1fa5259b3fbaa19bcb2429dfc0cd4b6eb3ad8cc0cd1664f282b8f1f97f4e88fae4095eba0bdbab2de05002b26a95793197a90d45f8857566be6061b1359358defcd3d782c47e6328c212eb8506fed2f1d3c2c04489f28afb1b51286a19b521d3b143f3b8212edc36f22c95ae7edfaa1056b87d5458d090165975f33077aa522b8d40967889bf3b12545d43094d2f8fc2bbcd47ff270ac7085e63547fe11db11e331aaec1eb49bf483a29c722ce1c499e29fe2ef11f1a6c4801374ee81e9565a2dc71d0e0c290cddd5975ed4df3854ed7c5655f8f1cd88e175bbb5bd05ffa8826fb9699ad7974f7ce45f21f75364056c78ba959109421c1637f6ac0f23e2db839ab35dfdf19909dd90d237e1828b61ad05e4ef0a342cbe5ac5082e8ff7fb80e392bc6375515b8d043ba1fe1f21dbcdc7108865df5f038b81379e1260921021c9ee7d68b2c155e8aca10dc45adba969541aeb508e28dc29a18d8e47efd456feeed3d40180ba16c89b3fe6b4936dee6e7f60beb05a089d0f65d67c6c50ae8df4d4d691d6d902c4e692b4bb01c0acdb6d69351317ff4ddd98aa956db5595f063111c98a610d046ceb5489bc95ca9d157250d016b5bf742ce90de84bf57fe5be0b14c665ecd32f9713e6e51aeee46c1684cc5e520105da335c2359066a4c018c8f7c6400d024592ffff9d3a8e09bc5b23f6a704c684ed4972a120f43d481afc730d1e2d8f54af809b7f5ecdad4077ffe261960f4517b834f3814af6e4ca8940edaf53374971fb4e93e2ae249b0d239d2f23b21dddeda9a58249136546e7b80912a39e6294f96731d30fd6da9062234ceaa445b4c9722f468a6fd77dd6fd724642f2a4f6d45038ad3f5e653cf2c43fba90dea29aca00e512166f0c6cf054c87567e1dc0f5aa5117c24fed6ad6a893f905200e4f666635625a1b5178bbd6151ae1685d37738b4346340f25ccc42605c94d354f4df68faaad2d1c9d0a9b433665f032ad65105138d162ef592fb2a5dd6cdf5f117f4e3b32603998797d444ef65f11383ca067b989a1cde482692d36fe1ff989ba383980c395069f85e009f0deaca1c4229b1b388603708caeb4acb5016274611270c4c7063c9ecd370960c855f1d55853e17e035da5902c0dac0d432be1e8fb574c886c89ec3dcbb3e69807b5d1e25562f48a78b671ead408f0574bc2e086fda2f37bbb58d9903467f41ab82a040f5245f7b94988bbfe4536cfaebef2638611340e3e777930492dbbef815f233f7c8da0a68d21f26adf25a291c5ee2728551d8ea525d50954a344868b7d373ba31bcf0e8bb719278b4a06bd5f3d16b1be833683488702b42070d69cb313b3fb5cc73b08234f774ac176c85b83bf2eb025d46f926c166b5ad5e0c7c6d59c02536a61b435a356273ef746cb4d357f05fad1cc7a6d4fb86707663a777af01e879605510a52459a478430815b284275d38df31ef1953851daadb3ec7d74f9aa2b9abf6e8828785c98f79e5084b252f745346b75a1b7a6e283dd9102b48513175a45b7706560571cadc6b8ec379f5cc633cc68104cc6ae5dd94d4e9cfde44cc4d9fb8a1057df7ae9c6b36290862041c82137282a28b23a4935cdd8f313f4a51b5753003e7b44a9a65e2b636e730f04a05499f632b7ae7e8567bc4b8e705bf600406eb8528e04b8f4bc482785a1b130929f6b094e602b5b23da0e9031477e9ace143b16eeae85f08d8b8d8715572a6cdf57afa469b164b4c45dc96b27668f2a890cb606a3f130871667831d25ce329c7e2ffc598b6f039c098b8998129843090b941fdb3a2ab1e1dbfcae3c765f443f162450e33aa05849d444f4b14c1f66c485ab397e26cb56a68a89ac10a345ad269e87987a1e7f0876b38ff83037ca02f7a0eda445a3b1421f606c25ab76851db34915793f402b9d99d7e042cd577217a84ca5df6d2d33e8e2e7e4dcbdda4ab19001c63c6fec22c7a442ef03522fc88f810a1e120d817d0a303da7da5d0501bf02e846393cfb95c7cd152f4b692f2259a80b56257b4b94ac39f63bd9a6209760b341c320f4b6f4827f734d96d95bed95cbe8bca47a5b9357e4a5ac960cd668162d59c078c12823bdc46707bbd6b4d046accb03962b310a58f1d6b7c8a890c9f85418b1340b243297555c20bc2661ac5aafd3b9d217299afbbbb63117d39fcff7811fbd53a212bd7238e38f1c1f12121357f31280181f43c4a7c01f066a79a7a226f236d10eeeb8386c11e45f8cd8691b4929f2f2f92e54225e9ef1863ffb84ff81fc9bbf71c01100fb8667d25f23f1753b3adf1acb49937037e05c10c32880b58c7cda99fe5ec26b3abc9597c93b4f445cbc9c85aaf8149a243c398d53d7e21b87c63e8a87af3824ecb41b38dd118a15d65c2efda9a15cede47adbe838a0ce7f20dbd8bf36c812430912438975a404e4258c3c4d314c956f6b4527af26607c2f5eed20e4cfa30ecda11973848a1fcb0d3284adc0b73c6dcc6323936a294ac4d5e60064f9c8e3e088dd5992025618ecc0f994876a879928ea8b12a54741c812dcec4f3ec2207854f61f95c4c1481b1d6ac6965ad4415097ad00c4701632763c7ef3aea2b7eaca83f88805898a2dd108d22c32a93d74ff1e404fd49401855b0a059978254c7e6932f12cea278a99d73f8e0b161b77f99b71f3dcf735a348bf67308c608ac3556ba2dc457cd50e5de28f443a38b558bfc9b568f5c469a63b0ee976e3e45417a42a008b4eb33569c41dd9dabb756b842d39f1578458dac6ae622f3e5eecd66d3dd53ef5c5c4bca840abb777cbc6bb45ec69b1f42beeee0164c05695e5ebc8ac39531339b15b487adfeeeffe397cff2d654dad3f0b48f4d0898bdecdf678bee9bc4d043ae1936efc9a4ca36ce13c26df455d8f197e19323922ee799f01bdb57c207b1ca85ed9a87fa32e5edec5a9f3b91eb4cf399bcb2cd197b1324ac4870e1bfc640e5b15077f47cb03bde849f645cee8f52275ce3fcd311bf7ca5deadd67b461a697749d6f90bb6231b6bad9524b3d751865eea85d02fb2a69cec0aec869be89b60eaad66b1455b55bd2bf249ee1a2e2982f499c648240870585b5377109c34777022279d924f57ea42a339fd5d74e46f84d5f2a3f3a7465491c5bd65734dd453f3aeddeeb2b3aea9fd86b783e07a1b7d14576d622d580d1c06043f3a65fb9a4aed5ebb1c086b73db304b251827173a44eed3776eae99c51c10a77c4780687dc9e7199f42680d2e214a1b52a2476678b183be8b4bd7ca79c68cbc447b9fb5da857a0992bc2a3a8dd27d29f2b3e0ae6c8b5ea88ee8589cfdf1f5dbccbe58dc35c2c8270530e50b6f062be64cf7248c6586930717fa972a89190d8a4e8adf00eb1c97d00ce6041244a07b7c4f17148ee4e8a91228643b7d283750ea30918156cb5ca0f84846d1e4b1747d49556089cab0f20640e6e478246cbf2d9c56ec755cc6c6590b74e26eeaf1290d7b2e7e0ae7dc365b851f60edba95188aac3acc42255b878ea794a51cad34ba4d72771f2ce2e78b73216e4148f74f952d064cb03015c0d59ad8af2ac30336360059b7ca8ff1e835a16cab01a66c1c6272ae897a699159ea5da3bebab54adba2b9cc6ec30fd34c0cef6f5f2ceed2f351152ffa20191b43cca0e00ad7166bd5254df978a03ffe7c75a4ccb8819c4076933bcb88bf4eb443adbef9be336ff68becf1d9739cb13f3100a6c8db947dfd942cf2fb5dc8d5b04135da31205eda50cf535fcb9e00e8d366b41e2fc1a01996412c4a6b881a7ed686a6b32effc2fc25a01e153d34cfdd233218504aa50b03eb6fc4992981c6524990f1d7c7915ed8e4e4989da23bcb3953ec18fdb5ef71b5809a6dceec28f4f9510245ad955c086c93ddb07428316f702986e1d6792d74c4df43c1a6586f0dbb157e586610982f86945d0cc11f402aca5e4f53ca24aee74ecb838e8163c0c856c4696857c90a3d410e465f05ac9bd6ef5e00eeb05047b251fb9f7d786721d210d4274fbbbd5e11e08d7ce0d7dcb3ea9a348858240e42283f2387eb298d23de9bca3969c45fd8c0ed001bb6ee60e3bfc688f9328136686cdd3512ac846e20f3f52f09281a460b3391ac2eee3855ada53f5e61d4e4658d082954275c1f94473dc6c368e0bda0ebfbda9778be563d2f78c8eb61e55f3207585ffa1795f9d1eb9dac02e60a3f557b9a0672e18bbad620a642b7d02408ffb22879620de222dc3d1adc247073e8faabf3840a2105da1e033d83de39bb67d609877584cb3e9ab4c9c2b64b7627da2ebfff697643c10afbc8f8d86c0784994d051053f3537aa9280bc5878124985f4f071dd24fe490f9afe1dbb0330ab4ed6729e7f7d616d0fb4068edfc3ad59f9654f5646f86b5ecffff865eb5086f9a711a0e97092022a9f7148ce4006b0a1330c339053b65599834e147b3d073ffeac66f617f3cf9728e5567db5d51207356d64ff11da7a8d7cc68e33130d7413be8877962ea0684fd441e3275b6b0732b12b4ff4ca373fe8965458844772c43390dad7622783c512aa489eeec7e2d1c9920ef0d75775edbd7197f6d6eacccdd139cc30af9f997aa9fe48708af066683fdba55295e9c8948c55dadc0ed25fe32d88ea3baaab589c5366b71623872140a84ecda579905bd2592e06bdf7496e5f853c6728f39b3eac94adcfa9cb22b32695ddf5c3aabee05389be12cd4e33519639a225e4eb0cc9e6cbdb37d12a4db2cc278a85a497f867bd5969b093cafe907731cbc08c3d9ca33b3585c455f0d31643350c5bb0949952b562ce3c9474f57324fbed447dfba87d0bee3eafc05a99e8839ec57a3d0aca28d8358783ae13ebaab520f33a72e024319372650339ac54204fe80e7a5d58b43778375c510c22d0ffb48cb4f1107177bc6fbd9b2e27966e04155acfd6d76371f88580809156d9eb2f7264f1a57477a42bc61886b77906163cbc5f53dd2ce4e8b95c688d83a24adee54d858d21fd23177f0b094d4f1f4feb3e95713963f8fa6755cf2838c9890eb016d75ffd42ee1aff8ffd4bb8cb2576d10a9dbf2832bee293026dc44f5b32b42f4d3128d66df1e632550031abebd69ffcf6999e7832d0a3244c6bf7297d1705028b9667dd08e63d0e51b4704215fc30f66347daaf6eab8c33340878453480e47d5ad7bb7fa12c0199d987ed0c60bc50cc6e866e81e135eed8cc7b54fed9addd169c182fec9becdb89488a45453b8a3df3af580e1a598ac8261d9cf24164fc9f97a5a6498f201b47c84739a2d6ce9ada62d6af56bfc124a1c52e120840e942a3d37643130735ccef56408fae66d70f0caffd37a7d255a586511fb843de15ea8d138b507be8ca735b85510830a970aafeb6e518feb1dc15c85a5767a25ea5d367c1af71254b10c6207e2c687a70d7b850f181df696dee1a4690ec4d6ee3afa20f429fdcd68c59e15d7b0eac6b0dc0e6221b97", 0x1000) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x40000, &(0x7f0000000640)=ANY=[]) mknod(&(0x7f0000000000)='./bus\x00', 0x80, 0x800) 05:08:30 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000140)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000080)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r8, @ANYBLOB="08000400050000000600060000000000089789003b76939eb0d65001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 723.091988][T24871] jfs: Unrecognized mount option "‰oquota" or missing value 05:08:30 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:08:30 executing program 4: r0 = getpid() r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000006500)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000000)=""/234, 0xea}, {&(0x7f0000000100)=""/135, 0x87}, {&(0x7f0000000240)=""/99, 0x63}, {&(0x7f00000002c0)=""/75, 0x4b}, {&(0x7f00000003c0)=""/248, 0xf8}, {&(0x7f00000004c0)=""/125, 0x7d}, {&(0x7f0000000540)=""/144, 0x90}], 0x7}, 0x876}, {{&(0x7f0000000700)=@alg, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/7, 0x7}, {&(0x7f0000000600)=""/6, 0x6}, {&(0x7f0000000780)=""/97, 0x61}, {&(0x7f0000000800)=""/187, 0xbb}], 0x4, &(0x7f0000000900)=""/120, 0x78}, 0x4}, {{&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000a00)=""/59, 0x3b}, {&(0x7f0000000a40)=""/151, 0x97}, {&(0x7f0000000b00)=""/116, 0x74}, {&(0x7f0000000b80)=""/144, 0x90}, {&(0x7f0000000c40)=""/121, 0x79}, {&(0x7f0000000cc0)=""/15, 0xf}], 0x6, &(0x7f0000000d80)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000001d80)=@caif, 0x80, &(0x7f0000002000)=[{&(0x7f0000001e00)=""/126, 0x7e}, {&(0x7f0000001e80)=""/125, 0x7d}, {&(0x7f0000001f00)=""/83, 0x53}, {&(0x7f0000001f80)=""/115, 0x73}], 0x4, &(0x7f0000002040)=""/22, 0x16}, 0x200}, {{&(0x7f0000002080)=@un=@abs, 0x80, &(0x7f0000003580)=[{&(0x7f0000002100)=""/112, 0x70}, {&(0x7f0000002180)=""/176, 0xb0}, {&(0x7f0000002240)=""/136, 0x88}, {&(0x7f0000002300)=""/172, 0xac}, {&(0x7f00000023c0)=""/219, 0xdb}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f00000034c0)=""/172, 0xac}], 0x7, &(0x7f0000003600)=""/180, 0xb4}, 0x5}, {{&(0x7f00000036c0)=@rc, 0x80, &(0x7f0000004c00)=[{&(0x7f0000003740)=""/4096, 0x1000}, {&(0x7f0000004740)=""/1, 0x1}, {&(0x7f0000004780)=""/89, 0x59}, {&(0x7f0000004800)=""/88, 0x58}, {&(0x7f0000004880)=""/229, 0xe5}, {&(0x7f0000004980)=""/127, 0x7f}, {&(0x7f0000004a00)=""/111, 0x6f}, {&(0x7f0000004a80)=""/227, 0xe3}, {&(0x7f0000004b80)=""/89, 0x59}], 0x9, &(0x7f0000004cc0)=""/145, 0x91}, 0x8}, {{0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000004d80)=""/217, 0xd9}], 0x1}, 0x1}, {{&(0x7f0000004ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000004f40)=""/107, 0x6b}, {&(0x7f0000004fc0)=""/136, 0x88}, {&(0x7f0000005080)=""/78, 0x4e}, {&(0x7f0000005100)=""/254, 0xfe}, {&(0x7f0000005200)=""/213, 0xd5}], 0x5, &(0x7f0000005380)=""/153, 0x99}, 0x1}, {{0x0, 0x0, &(0x7f0000006480)=[{&(0x7f0000005440)=""/4096, 0x1000}, {&(0x7f0000006440)=""/37, 0x25}], 0x2, &(0x7f00000064c0)=""/62, 0x3e}, 0x2}], 0x9, 0x102, &(0x7f0000006740)) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000006780)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='noqugla,gid=', @ANYRESHEX=r0, @ANYBLOB=',\x00']) 05:08:30 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r8, &(0x7f00000006c0)='asymmetric\x00', &(0x7f0000000180)=@keyring={'key_or_keyring:', 0x0, 0x2}) keyctl$clear(0x7, r8) r9 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r9}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:30 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:30 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$SOUND_MIXER_WRITE_RECSRC(r10, 0xc0044dff, &(0x7f0000000280)=0x7cd) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x284042, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC=r12, @ANYBLOB=',aname=/dev/ifput/event#\x00,\x00']) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 723.377798][T24891] jfs: Unrecognized mount option "noqugla" or missing value [ 723.468468][T24891] jfs: Unrecognized mount option "noqugla" or missing value 05:08:30 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='noquota,gid=', @ANYRESHEX=0x0, @ANYBLOB="00003639ca6dfb11052a7f75c7c0d2f1d8fa16eaabdee8280e7a4b148b88cb6cde2ea003e26ff5df3e8b996e73852500efb8c1dd3a634a80df9206d2d63b217d2ed6a368df6ea66517473b17971d7e372d8f8cec0397a2171ec27a1433904769b418f3a4c728aed08694606495de37ae684a4550cac68dd424796a"]) syz_mount_image$nfs4(&(0x7f00000000c0)='nfs4\x00', &(0x7f0000000100)='./bus\x00', 0x100000000, 0x6, &(0x7f00000014c0)=[{&(0x7f0000000240)="30804addc77f3a4c9dd8541287cfb36498b2a964b6e8d0d8300dfe3015052f8fe598111269f693ad0a3d32e6ec33e0dd4f9c47e262aeeecd189e96738a2bfece82fd72819437d80902850c17e67f8c0730b5ee330516f0379724bb1c2c9bfd1c4248a9888b1235cd5a4b40632a484f11edc42cad62586e24d7ccf8ccce9023f98480c2ef0dd89df47fb4b41aed37b19c0737e81810b02bbc467c1678148407a65d7c1a11fe79cd2a14103b3802ba4d443f68de34380d1a46e03abd41c94f169b35bbeb9c58a70ed8f914be9c8a1c82a2c73c5253e2bd64321c6bae4eb1e97ab6", 0xe0, 0x3f}, {&(0x7f0000000340)="fc910a26cab4a6bca801263bbbdcc809e061352ecf0e9f677dda249a1f296b8f7fb25b6175bbec5688fe9fa944d2a19f1d17c7c31361c96092ce33e5d96cb2a64590a5f2937643b795fede9a0ed340f92c19e0dadf1d148a5db052971132f4831e83c5b8c8d5bdbeee3673335a90c5f35a7903fcee860b42ba243374e9f69e91d57e49adb5c82458ef681d2115ec311c4ff26ccb44308deb9365e085fac406f55f22a11a5ddd22bef0568cba81710f4d4e3b7a0f1d371e847b410d0c3d6c6ac0fde3b9535f52595c697778e7a64d60b8100678a392", 0xd5, 0x6}, {&(0x7f0000000140)="ca18eb793b4d13e6ff89e10931cdf1c7d71dd599cb069696a0072d80af6561ce2dd1efbae7d88c7c", 0x28, 0x2}, {&(0x7f0000000440)="6ae46d5bb7fafd81c3e7a8ef090629e1b9418db3042a5e8f0cd138ed0e0de2f26cd636c1890eb7e0ebee61be84f9a01d6223590631e787cbe0b7b728f20f6355c7", 0x41, 0xc246}, {&(0x7f00000004c0)="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", 0x1000, 0x2}, {&(0x7f0000000180)="04992952", 0x4, 0x6}], 0x0, &(0x7f0000001580)='jfs\x00') 05:08:30 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c1ccae5ff384f6cb73fa8d764500eab7b5c5d82285109dc2b8e88b1e8559a52e07390684535af65f1975d77860793bf85db0280c5cc3ad08286a532e54b1d94928787dcb8b71ea0df4a852ced3b6838ea22d5aec25cbbcc18274cb70550aff509a7403908c713b33e65aeea797d90838e294b2080b4eeb85549eae6d8e1d6c4cb0e2bdfeab9a7d6", @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf2502000000080004000000000008000700", @ANYRES32=r7, @ANYBLOB="080004000000000006000600000000000800090001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r8 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r8) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000140)='keyring\x00', r8) 05:08:30 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f71756f7461efffa298a4", @ANYRESHEX=0x0, @ANYBLOB=',discard=0x0000000000000081,\x00']) 05:08:30 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 723.625716][ T26] audit: type=1800 audit(1579324110.452:181): pid=24880 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16615 res=0 05:08:30 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@noquota='noquota'}, {@gid={'gid', 0x3d, r1}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\\cpuset'}}]}) r2 = epoll_create(0xffff) epoll_pwait(r2, &(0x7f0000000140)=[{}, {}, {}, {}], 0x4, 0x300000, &(0x7f0000000180), 0x8) 05:08:30 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x100) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000440)={r3}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000680)={r3, 0x1000, "98c130878b7e8965ef974b7c818edfd184751c7dc3e0b53fc30642b8fcda8800578760bce046334607ce00ec207bd5d04c8a3964bf915d571b354638393b36acfd6ce2c66e5e0afd76253287ad267fe0613fac36a0291c7c781209951cf02a2ee47af7814d4ae7d5e85b9a15f1457a19ffc25cb6be0b84b3de41c8a09edf71e989d1d1ad433c7669091e7fdb695aaa96bfbf833d0cbf2fc5c44d765ffa1fbb22ea559d0a62d6747722137411c282c500b20566d86a830bb810aef2b87fb9b02ef44e903b0eafb28cd57b5966571307b2b3ac2cfc679e4da70b3a1bd37def7bd24a9541e525476e31d7f89add8d31bf0df30276402b505c19bab698992e0b900a3bbd41150a536d589c1a0d1ce731061517aae84ed556a443b4c73faf2d5c4863a4bd2bae4512ace6518c5d1ec3dec4d9a3a0c8b2cd37d4db18ebbb2a1f82d2323cab3b4a7c6eb206775d923b3371fdb035b7ff8a6e212888be7e352e44cd93286fa7d7ef3194282a27b5b588eacf9433bb1ad9515a752f2fa5380a3d4629122813330cbcb2c480ef9b3e25e921f76de75a333b51c42132b67c45ec405e986c6c0347cbc177389fcc12eea2b8c672684fce0146e801d6ecd5531ac40a0eb656bfb1a662cea84d9329c8fc325ec989909dee53a767927f669c78b3f3118f36bf4c885844c77130c79f6c88c27bb2a058b41c875baac0a479e389da099b2798fd398513f796c04d554c54cf7b677dcc1ce83d5816deb7d4739993eae0bd836472e6d779a1e629c08d561db3985f349abb9bad36e3038229f78c67bc9c8e40bcb8e6a2374372bd7c410a91abdd5855317555e7c7f7f61a4a0332e8f12d9e0727399572663f8b08f786171f09fbb7bc249f189d8c249bd0e6d4eb30696eb16372cfecba1bd6ba978ebb37fea6252bb81cf95fb24d98cb4e0f1c9b25e1775e2458a36b533cfaa9b0ce1ea8dcaecd9a67dd78cdabb07e6bea93b517df1b84bfa9f1a04dcac6829433e8abd531ee30b65089d056810d5d20da2d00726a919cd13d3a73196fbf01eaa408e96fbaf88f5d6c39cc7e0c0c965187a1f68cede3e7bc9b6dc34209b991be81351c9bf6feebcb1dec98b03eeceb6219cb0566fa4788fb202efb1036cd93248e6a614915ed5038d08a16269204760884776798913986164eb06c0630ef1b084af15ace85029a2ac0ffcaace918776fc31a95fcc029450c64e63bb01228dc024a87a3a04df50e15d00e3c51405ab414e1ac3a3bdf5eb82814058743d6c83a6aad7dcc25788d87318f284c738d82cea4f16c69d323b9d044ad8b4f350aed97153a001693f9b71caad02108d92253c768cbd956dc2612dc1168fa05e775839faf0012bdddcd94a46e8e3d255c67a317dd096318510d3b2b77df63b1e38a8eca0fe45b1c9cb08f7abdc9ab21cd4daa11c50cd6bf65b5a638edf5d9a6d0c6d7cd0d89266e087a8f9bae2f04bc92444fa292946d0a6fb6bb09f98274ac4957a1bb94afadf4ce622da65185b0cce964de3525a4f406dafc09fee06e90d79f7fd6cbe7394b17d32053b539b6a764898d8c99dcacc3d4e4a98e9dc1c2bd3850bfe1af38bd1866eacc3c91c2d980ce7908290794d7be21368a2db2917942f414cbe140ded46e0358ee78bdedc2cfa13579b9cbbd93a50934e2151cc7ee470eeeaad1f58b213276fb7f0012257522e036fc02e4b15f3e33fe84275624d209b77b4062decf6051f176e621c999360712a3739a1e7095d4feee463b4507e15e2ae0773e5eae6bc49a17f73267e494d9c263312259181f00f7427d27ee9e156c16750a4754c2932a7e9b148241a0ca6da652804443b8a03f3e4d23ff4e45a0cf518758c6e3d57b40423c5de671598252cb2d57b4c195c1b01f5f5ffffee38cf8ca3ba965c9da2e8e63c1d38c666b1a3a0fe3ab162753892fd704b6080f50a67aea6e431e4a1a11c85fcbe2945abaae5a6e773caa43c804c37f61325437b2f1d49105479c4e95fe38073623db66831c8f69861841eac5563b069491758e0c9e2fd6d12495c116afee748f367c3fdcc7b8f3f8072240b8a6b62f3724c40d760bb1d3f35fd9052f3902de80f3933d26320e5bf7d5f476c07c9b8cd0d59e4add9fbd4ae96bae04cced62fa767cce6dd52f2ed1b76245e24f1ad598bdd0c777146fe30fcc51c83794183693f0f999d2bec01e4639c8d1b01f9bea07a5adf093a99ad0551cd520f343cb5e1c0ce1c86ddd83c52bb82b6fa3ed3994915077895e50bc333655bb21c4a5f0de4cd0eed9bdc88eadc617e6bb2ad5b0edf418680c795b44c10ad5bb7923b179f737529352b63f54630c2ebde5b1df881c381586eb8edd2f5aa4c518f73ff376f891e18ed8a6bd63bdbef5e37dc2f3890513043f22bcd414f32ee95de42923106d0f27e746ae45b402b9645dbe716dda84d31d1dd43e019aff09b2d9b75afed10ca1fb73b587e6f6da2bdc1d666ddced5a3969aea625b669262327d916d34b2e7ff37b49938b0cad40f2c4a2376c9872f796dc8c98965b1d3e1d7c8858d1038291d018bee3eded364f190ccf367a97d24c3418184fbea4c8789a869ba7a111718d60edc6778acab1ad73c9b6f4908917c94c634727cf4f3bada5a3f7891d0fb1d3ab8883df6df22a7e9767781539e4a6e820caf7dc78d334a523d05f3a7dbd002f88089ba9ac43c9eb138a1afe31c4f1b8445b51e297560fa6ea64f5a1bb2d20cb5896fcf744112ffa88fb79d98d00a39558f1e18dbb32b52df9685bac57f082edc6e690a68dd70e23d7daff8537b252e871c62ff79754c09f71fc83a8d98236394fb5b1788fec5c0876455d1c805ec1506dd450ab6878bb88df73786cfb6b15f5915c45142a4146d2ad3b68c3dc2987351385f0d79f293c84121759634d1b86e686cd58cb755d141137259ec91177bab1c8f5dccb59f99e0a4378e5d465b39ab1cc28ac5575f0b3236f6f7b12671dacfe5e368c10552987fb96de77bbc17eeb1140c832b4fdfe7d0d6408e9d9d838e44a917c50fbf3dcd5394be830afaa521a3ad91a64ca9b38f27adfeba2105a19a808d436f92f5346131e07e9aa0e41fd220dc42623bfbf1a1b3b5f15d4988ff4c2b11cd01f5b4800456650441d3e7f7ddff06546cb9e554adf7c45df23858107de76062ef20a01d19819f992532237b1a98a3b0519e636ecb7cccd2ee23588619f6f4fd6a14055be4701cd8e3d9d0ff6575332fcacf668cb367a7ec3f03b60857128fad07e02e83e3575bb0b2092e7ed97965dfbcc9f1d542cf5e870d5cbd1279f5a03a3a297cd105d1dc410dcf8c7e2845cad3bab64b250d4cae661df52b1530ed31b7bcfd10cdf17d64b49864e5d959ca079a7c9181d026a7ac03915e453337582eecc61c9101a3d9a89ed60badc5acab5624f5f3ee82a2cef451a1eaa477c9e4f52f169226e63b08c017b924321cca608f59aad83f904f486e8bedd3b9758c66f710c4df20ffbc8c1de569ff2a840c86d3aa0af8d4d727fdccdc85a5622256600bb5d2343718af0024da51aa1438136667ea1d89e4dcbbcaba4139085e7286aeee58de8b03c4592a231c2d09e62a82df7054ccde65184b8cffd4768ca9eb38baf45138968281ef92fe2d96f482ce272370e8b770cd9f7610c50bb91574439d5095d8cf263f4ddf39df26c18ae4e0861ef0fb51c31832a18d463212d5c578933f230fde713dd6ed8b33d5fcddabec6499f30608ff91353b1c412b30d6278e5cbb0266a7f69425a877c911a9c63ffda19fb504798d726242b74bf27b77232970c92aa3f1bb937873470682bef835de12e6b77fe47df13218720fc7c8dfa60ceca053f82ab02ad80008b655f799fb9836a0738a3c14af18c092cc9c72f772a8d8b59ea8b9ba26a23accac4fe7804a93c5f3f1a1f27bf7c6405cfeeefb575bbeb8a0b9d77d02ce561e9c4944f22d18209362f14084ca7cb5880f1b8065b5f92255a4ac725a716e796eb09141a85e7487da4f1f610b1dfb3089b3f0f065ef1500a587966009578de71115a9fa4ddc809eec4100e7672294facaac0ccd4a1a110ed77b1c5b1f671efca2be662a1be3d52afdd66efddf350df13e856762e9a2e602fef4370af63783749c86dd03246f44f0f7c28abf2099cbd6f5070ec66e56d8b9f341d9ff2de65e78442ef859b207e55b7f3b9ce56a3ce090b511ad1477da0d76cb549e647d053be2af8d26982cbeb8ffd6f43ac089ac90517fac1c47b43ccd22f0558d3996cd1652f26921a2a820cd2f442eea94ac983cd9613f2e5e3a8bf80488bb230834196222df0064a8132d64162f480a54afbca30d9e8d182728bb92a4979a83b62fb5ba393195f4757f804a05b9394ea77b3f5896672b8d16e71a70dae7d5f4f1a542369a30be8e429a7a1738671d71b3f9fe2439b1db56e2f29c4f173dda99df627af6ee24edc839d72044a3ee47cfd939847f6a89a282dca6b5cf1de5f227978461c6fd843ca2fe676c610d367fdcee7bb3c6f99551928618a8b2e2418d9b59e56fd79b00c42dc05143375ed8e44d3bb236190ff58a511b2f8780888aa23b6b569803ce2bf8f799f223c67200be5aa7540e4a770ee0b8677e443d15bae95ae2c71dc248c938bdb61df43a7ec2a569f6c7093f690a3e6bad19cb5a3de87ed2dc403000a01067b1dd46606a1afb303b1786354b7aa4dec83d87b92a50b673302514da84a31654e31fc12443d9550b14cfdadede8acc0e32777cf23912cb47d1f851a1d19353137b749721ae46dee977e76d9d1876e72f9d7999e628dfd920e4feb6b84442d5fb2059001acce28a2f1b2ea9ef207efd306e2dffd0529a488aca2a5a97fdee1b1ae42b3b2b4da96d056322b58f9250a1752d08ed7c6d0694ccefe636099ae81f4f4bd06299479f235274f28c7a6a92471d9167da62521ec9e53f6c92d132cbbe5ba47d0f04a28e5ee9900aa054894243836bd13cd836c56637c940dee782d70debe3ecc6b34534d835987b7c82e4b74fd80f2c1ce6ae2db0aca487dd25717387f2882db50f16c96975543d0930c0c5c1cd8c39b753e7256f8994a82cc217eb07cb76e4ec40b90144f143b9c1b52c045f22ac975c8e57343ee244ab9cf121c0f3fda0daa83a118d31a5dc7e908e7b32c28161a5f08f3626f201f1bc00cfcfe7875bd7b0970dfc4817d37584bb59c5e2dffe22590492cf647d0de54ad464286214e1b5ddae39e60bc397224559a32e6509a821db35abf6358f51f70874fc19c30f2fb7b78304a4d4141670e9d46a335cc366224e7cb1b07579cd31e77d73688f800f5778882f16305699ce78e1123bbc7e41385b22ce2298707681246c77421d7ef681c33dade56d3533263504a5d1282890720c85799586c2638f8ddb542df58b6d98507f444577120de866cdf625770de90db7a54587a17ba4d0bac51cfeecbeb9578e5d7dc5e7d3ca30f8b6673926dbb032e539295663ea9fd40ad793fdf53d1cd8ba8b970d29e998d90bb4cc5a2bff5faabaa5f267f9fc14722cae913e9baa745eb8165a9a21673d1977e15c4a64c64f895f69c15eb2cb47f89a5f300cdc37b31de37d487c146f81cdc019a2eef470475922cfd75ca153a59f73e72b468188851cc8fce3e2d51ef74954a58d6300f2ac9951adbbd47df50905379218bd1947e3cf225939a44aa484ebebd6adf255bfee2d5758dac95ebb20c41900eef046d7626c638670778f9dd3a936a40ec7f3829c0f6f4faab47a3a25295c3eaf9df0677460e4a5dd18c8e937661bf835f665132cc572c2c1531f6c516a8b37f0c1d3d2a2560cc"}, &(0x7f0000000040)=0x1008) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000080)={r4, @in={{0x2, 0x4e22, @loopback}}, 0x80, 0x3, 0x100, 0x2000000, 0x5}, &(0x7f0000000140)=0x98) 05:08:30 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 723.842988][T24914] jfs: Unrecognized mount option "noquotaïÿ¢˜¤0x0000000000000000" or missing value [ 723.943414][T24914] jfs: Unrecognized mount option "noquotaïÿ¢˜¤0x0000000000000000" or missing value 05:08:30 executing program 3: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='noqd=\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=0x0, @ANYBLOB=',\x00']) 05:08:30 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:31 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r12, r8, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x284042, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC=r13, @ANYBLOB=',aname=/dev/ifput/event#\x00,\x00']) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 724.186648][T24934] jfs: Unrecognized mount option "noqd=" or missing value 05:08:31 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) [ 724.302096][T24934] jfs: Unrecognized mount option "noqd=" or missing value 05:08:31 executing program 3: r0 = getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x4, &(0x7f0000000000)) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000040)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r7, r6, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f0000000a80)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r2, @ANYBLOB="2c677264270000000023b85c398f6400a1fdd4c38560e700", @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303038302c64656661756c745f7065726d697373696f6e732c626c6b73697a653d3078303030303030303030303030303830302c626c6b73697a653d3078303030303030303030303001010000000000006e74f16d65617375726500666f1f6e6572", @ANYRESDEC=r3, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r8, @ANYBLOB=',func=KEXEC_KERNEL']) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r10) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xffffff36) r14 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r15 = ioctl$KVM_CREATE_VM(r14, 0xae01, 0x0) r16 = ioctl$KVM_CREATE_VCPU(r15, 0xae41, 0x0) r17 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r17, r16, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) r18 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r18, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r18, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r19 = fanotify_init(0x40, 0x800) r20 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r20, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r19, r20, 0x0) r21 = fanotify_init(0x40, 0x800) r22 = socket$inet6(0xa, 0x100000003, 0x3a) r23 = socket$inet6(0xa, 0x400000000001, 0x0) close(r23) r24 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r25 = socket$inet6(0xa, 0x400000000001, 0x0) close(r25) r26 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280)={0x37f, 0x5, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r25, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r27, 0x839}, 0x8) ftruncate(r26, 0x200004) sendfile(r25, r26, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r26, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r26, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0xffff, 0xffffffff, 0x401, 0x99ff, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r23, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r28, 0x839}, 0x8) ftruncate(r24, 0x200004) sendfile(r23, r24, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r24, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) setsockopt$inet6_MRT6_ADD_MIF(r24, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0xc) dup3(r21, r22, 0x0) r29 = dup3(r20, r21, 0x180000) getsockopt$inet6_IPV6_IPSEC_POLICY(r29, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xfffffffffffffe14) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x102040, &(0x7f00000006c0)=ANY=[@ANYBLOB='Jd=', @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r12, @ANYBLOB=',group_id=', @ANYBLOB=',max_read=0x0000000000000080,default_permissions,blksize=0x0000000000000800,blksize=0x0000000000000000,dont_measure,fowner', @ANYRESDEC=r13, @ANYBLOB="2c6df29f9d1f432c7569643e9a9cf0dfd55da60b2380b448733ee05eb81f505b479c3dc84895d4e1361da60d5dc99e0c774e54d6ef83759563130185959ac0374819e93cbff6f5950a62f400"/91, @ANYRESDEC=r30, @ANYBLOB=',func=KEXEC_KERNEL']) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='noquota,nointegrity,subj_role=,subj_user=gid,fowner=', @ANYRESDEC=r8, @ANYBLOB=',fowner=', @ANYRESDEC=0xee00, @ANYBLOB="2c0166650adea71277c885ebb7c73b51bb2f38e5e327ad43df5cc0c308c0b49f1885b49f1794d811e6303cb94812f1c87d834e3b46c25d20e04821c6b91230e0aa23e76c650ca27ca092fc21a6528ea2cc9f9f29fa07e00af5126464079b49ad259ce6487dca2673d42dbd53abd6de30eb383ac9a59363311a815d9fd5d0dcec3a8807c95684baae4266fdd37bc04e9f6f5b1bb0b7cfc46d909581bdf6913c9fd41a2e720a778d9660c2e5c4eb13ae94713adb085d4fd4acf075327fd3521e8c03fe41cd04b5cd26197561273f89ab00"/218]) 05:08:31 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000000)={0xfff8, 0x5}) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:31 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:31 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) 05:08:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@noquota='noquota'}, {@gid={'gid', 0x3d, r1}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\\cpuset'}}]}) r2 = epoll_create(0xffff) epoll_pwait(r2, &(0x7f0000000140)=[{}, {}, {}, {}], 0x4, 0x300000, &(0x7f0000000180), 0x8) 05:08:31 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) [ 724.863385][T24968] jfs: Unrecognized mount option "subj_role=" or missing value 05:08:31 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r12, r8, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x284042, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC=r13, @ANYBLOB=',aname=/dev/ifput/event#\x00,\x00']) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:32 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$key(0xf, 0x3, 0x2) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r5) r6 = getpid() r7 = fanotify_init(0x40, 0x800) r8 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r7, r8, 0x0) fcntl$setpipe(r7, 0x407, 0x1) pidfd_open(r6, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r9, 0x20000103, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r5, 0x0}]) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r10 = socket$inet6(0xa, 0x400000000001, 0x0) close(r10) r11 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r12, 0x839}, 0x8) ftruncate(r11, 0x200004) sendfile(r10, r11, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r11, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r13 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_DEL(r11, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x70, r13, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, [], 0x2e}}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_PEER_V6={0x14, 0x9, @loopback}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xd}}}]}, 0x70}, 0x1, 0x0, 0x0, 0x4001080}, 0x4) 05:08:32 executing program 4: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@noquota='noquota'}, {@integrity='integrity'}]}) lgetxattr(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)=@known='trusted.overlay.impure\x00', &(0x7f00000000c0)=""/43, 0x2b) [ 725.173309][ T26] audit: type=1800 audit(1579324111.992:182): pid=24963 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16553 res=0 05:08:32 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:08:32 executing program 4: 05:08:32 executing program 4: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00', &(0x7f0000000180)=@keyring={'key_or_keyring:', 0x0, 0x2}) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$search(0xa, r1, &(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x2}, r2) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8000, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r9, 0x839}, 0x8) ftruncate(r8, 0x200004) sendfile(r7, r8, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r8, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockname$ax25(r8, &(0x7f0000000280)={{0x3, @bcast}, [@bcast, @null, @default, @netrom, @rose, @rose, @remote, @netrom]}, &(0x7f0000000300)=0x48) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r6, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) r11 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r10, 0x84, 0x75, &(0x7f0000000440)={r12}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000200)={0x9, 0x9, 0x2, 0x1f, 0xfffff7af, 0xffffff81, 0x100, 0x200, r12}, &(0x7f0000000240)=0x20) setsockopt$RDS_RECVERR(r3, 0x114, 0x5, &(0x7f0000000040)=0x1, 0x4) 05:08:32 executing program 3: lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@v2={0x3, 0x2, 0x0, 0x7, 0xc9, "cc3d795303d2eaafb1a0e93b34c61dcbb3c6a6427fda043802b0774499337cce019184121d31ae210c11f1c586db8464316eb035ccee9fc5cda4edb6961b344caca99fdfa99441dfd21a069d2d58c08669685974e44c0f3d227f57faa3dce008889e8806a462ec58d915eb2ecac743e1314f6f8efa4765b1fcb927ee9d23d535d8477bf97f5c10ea0d6fa2d3922f71b9c69bb1507fda42573accfd1e648a203eb0618180768bae944cc20c8c2f25d82c4c6543d8903e8dded1eb7db865a7a535f8d9347f4ea56ab2e5"}, 0xd3, 0x2) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x48) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000280)=0x10) 05:08:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@noquota='noquota'}, {@gid={'gid', 0x3d, r1}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\\cpuset'}}]}) r2 = epoll_create(0xffff) epoll_pwait(r2, &(0x7f0000000140)=[{}, {}, {}, {}], 0x4, 0x300000, &(0x7f0000000180), 0x8) 05:08:32 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r12, r8, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x284042, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC=r13, @ANYBLOB=',aname=/dev/ifput/event#\x00,\x00']) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 05:08:32 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200, 0x0) write$selinux_access(r3, &(0x7f0000000240)={'system_u:object_r:dhcpc_var_run_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x3}, 0x58) setsockopt$rose(r1, 0x104, 0x5, &(0x7f0000000040)=0x4, 0x4) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@errors_remount='errors=remount-ro'}, {@gid={'gid'}}]}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x699) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000440)={r6}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000002c0)={0xe49d, 0xf, 0xfff, 0x0, r6}, 0x10) 05:08:33 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$key(0xf, 0x3, 0x2) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x1, 0x74, 0x2}], 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r5) r6 = getpid() r7 = fanotify_init(0x40, 0x800) r8 = socket$inet6(0xa, 0x100000003, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000040), 0xc) dup3(r7, r8, 0x0) fcntl$setpipe(r7, 0x407, 0x1) pidfd_open(r6, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r9, 0x20000103, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r5, 0x0}]) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) r10 = socket$inet6(0xa, 0x400000000001, 0x0) close(r10) r11 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r12, 0x839}, 0x8) ftruncate(r11, 0x200004) sendfile(r10, r11, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r11, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r13 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_DEL(r11, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x70, r13, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, [], 0x2e}}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_PEER_V6={0x14, 0x9, @loopback}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xd}}}]}, 0x70}, 0x1, 0x0, 0x0, 0x4001080}, 0x4) 05:08:33 executing program 4: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f00000004c0)=0x5) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="090080b2ab5228224a1a504fcaa9497209066f740080000000963701", @ANYRESHEX=0x0, @ANYBLOB="2c000d610e1de71ae4ca035717755ea8497070ec5d9810a39afd6343262c0b000ac51ca7cb63adfe90dddfcafe5215b1d86eff5f2c50536b110b5313794b985f7b086cc86349867066a2176354c0442bc434f813930028cc0b6d7413ebfe6e5194846cab22317123ba035f1ef9ca2f185c4bb8901c93e8a16666d226"]) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) rt_sigtimedwait(&(0x7f00000000c0)={0x80000001}, &(0x7f0000000400), &(0x7f0000000240)={r3, r4+30000000}, 0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) open(&(0x7f0000000300)='./bus\x00', 0x20000, 0x8) acct(&(0x7f0000000480)='./bus\x00') sendfile(r1, r2, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000180)={{0x53b8dfe386938350, 0x0, @identifier="7767fa38ec0f468bcc819686a5972273"}}) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r5, 0x84, 0x20, &(0x7f0000000540)=0x6, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) write$P9_RWALK(r2, &(0x7f0000000500)={0x3d, 0x6f, 0x2, {0x4, [{0x1c, 0x2, 0x6}, {0x80, 0x4, 0x2}, {0x31, 0x0, 0x8}, {0x88, 0x2, 0x5}]}}, 0x3d) 05:08:33 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x40, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000380), &(0x7f00000003c0)=0x18) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@noquota='noquota'}, {@gid={'gid'}}]}) 05:08:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@noquota='noquota'}, {@gid={'gid', 0x3d, r1}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\\cpuset'}}]}) epoll_create(0xffff) 05:08:33 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x15984a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x0, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x34, 0x2}], 0xffffffffffffff84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={{0x0, 0x7530}, {0x77359400}}) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x37f, 0x6, 0x8000, 0x10001, 0xffffffff, 0x401, 0xfffffffb, 0xe114, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r11, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r9, r10, 0x0, 0x80001d00c0d0) ioctl$SOUND_MIXER_WRITE_RECSRC(r10, 0xc0044dff, &(0x7f0000000280)=0x7cd) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r12, r8, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x284042, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC=r13, @ANYBLOB=',aname=/dev/ifput/event#\x00,\x00']) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 725.593163][T24994] jfs: Unrecognized mount option "subj_role=" or missing value [ 726.640281][ T26] audit: type=1800 audit(1579324113.462:183): pid=25020 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16596 res=0 [ 726.849483][T25033] jfs: Unrecognized mount option " " or missing value [ 727.629329][T25039] jfs: Unrecognized mount option " " or missing value [ 877.642502][ T1117] INFO: task kworker/1:47:2805 blocked for more than 143 seconds. [ 877.642526][ T1117] Not tainted 5.5.0-rc6-syzkaller #0 [ 877.642532][ T1117] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 877.642540][ T1117] kworker/1:47 D26936 2805 2 0x80004000 [ 877.642678][ T1117] Workqueue: events console_callback [ 877.642689][ T1117] Call Trace: [ 877.642724][ T1117] __schedule+0x934/0x1f90 [ 877.642749][ T1117] ? __sched_text_start+0x8/0x8 [ 877.642769][ T1117] ? _raw_spin_unlock_irq+0x59/0x80 [ 877.642790][ T1117] schedule+0xdc/0x2b0 [ 877.642807][ T1117] schedule_timeout+0x717/0xc50 [ 877.642830][ T1117] ? __kasan_check_read+0x11/0x20 [ 877.642846][ T1117] ? usleep_range+0x170/0x170 [ 877.642870][ T1117] ? mark_held_locks+0xa4/0xf0 [ 877.642918][ T1117] ? debug_object_deactivate+0x1d9/0x320 [ 877.642933][ T1117] ? _raw_spin_unlock_irq+0x23/0x80 [ 877.642945][ T1117] ? __down+0x16e/0x2c0 [ 877.642959][ T1117] ? _raw_spin_unlock_irq+0x23/0x80 [ 877.642975][ T1117] ? lockdep_hardirqs_on+0x421/0x5e0 [ 877.642998][ T1117] ? trace_hardirqs_on+0x67/0x240 [ 877.643018][ T1117] __down+0x176/0x2c0 [ 877.643032][ T1117] ? __kasan_check_write+0x14/0x20 [ 877.643049][ T1117] ? __up.isra.0+0x1a0/0x1a0 [ 877.643061][ T1117] ? lock_acquire+0x190/0x410 [ 877.643092][ T1117] down+0x64/0x90 [ 877.643109][ T1117] console_lock+0x29/0x80 [ 877.643127][ T1117] console_callback+0x70/0x400 [ 877.643152][ T1117] ? poke_blanked_console+0x270/0x270 [ 877.643167][ T1117] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 877.643184][ T1117] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 877.643200][ T1117] ? trace_hardirqs_on+0x67/0x240 [ 877.643250][ T1117] process_one_work+0x9af/0x1740 [ 877.643276][ T1117] ? pwq_dec_nr_in_flight+0x320/0x320 [ 877.643289][ T1117] ? lock_acquire+0x190/0x410 [ 877.643317][ T1117] worker_thread+0x98/0xe40 [ 877.643364][ T1117] kthread+0x361/0x430 [ 877.643379][ T1117] ? process_one_work+0x1740/0x1740 [ 877.643393][ T1117] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 877.643411][ T1117] ret_from_fork+0x24/0x30 [ 877.643515][ T1117] INFO: task syz-executor.2:24995 blocked for more than 143 seconds. [ 877.643533][ T1117] Not tainted 5.5.0-rc6-syzkaller #0 [ 877.643540][ T1117] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 877.643547][ T1117] syz-executor.2 D28312 24995 10662 0x00000004 [ 877.643569][ T1117] Call Trace: [ 877.643590][ T1117] __schedule+0x934/0x1f90 [ 877.643614][ T1117] ? __sched_text_start+0x8/0x8 [ 877.643627][ T1117] ? lock_downgrade+0x920/0x920 [ 877.643642][ T1117] ? rwlock_bug.part.0+0x90/0x90 [ 877.643664][ T1117] schedule+0xdc/0x2b0 [ 877.643685][ T1117] schedule_preempt_disabled+0x13/0x20 [ 877.643702][ T1117] __mutex_lock+0x7ab/0x13c0 [ 877.643764][ T1117] ? fb_open+0xd7/0x450 [ 877.643786][ T1117] ? mutex_trylock+0x2d0/0x2d0 [ 877.643803][ T1117] ? __kasan_check_write+0x14/0x20 [ 877.643821][ T1117] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 877.643836][ T1117] ? chrdev_open+0xca/0x6b0 [ 877.643870][ T1117] mutex_lock_nested+0x16/0x20 [ 877.643887][ T1117] ? mutex_lock_nested+0x16/0x20 [ 877.643902][ T1117] fb_open+0xd7/0x450 [ 877.643927][ T1117] ? get_fb_info.part.0+0x80/0x80 [ 877.643941][ T1117] chrdev_open+0x245/0x6b0 [ 877.643958][ T1117] ? cdev_put.part.0+0x50/0x50 [ 877.643981][ T1117] ? security_file_open+0x87/0x300 [ 877.644004][ T1117] do_dentry_open+0x4e6/0x1380 [ 877.644017][ T1117] ? __kasan_check_read+0x11/0x20 [ 877.644032][ T1117] ? cdev_put.part.0+0x50/0x50 [ 877.644054][ T1117] ? chown_common+0x5c0/0x5c0 [ 877.644074][ T1117] ? inode_permission+0xb4/0x520 [ 877.644094][ T1117] vfs_open+0xa0/0xd0 [ 877.644112][ T1117] path_openat+0x118b/0x3180 [ 877.644150][ T1117] ? path_lookupat.isra.0+0x470/0x470 [ 877.644163][ T1117] ? __lock_acquire+0x16f2/0x4a00 [ 877.644187][ T1117] ? __alloc_fd+0x487/0x620 [ 877.644210][ T1117] do_filp_open+0x1a1/0x280 [ 877.644230][ T1117] ? may_open_dev+0x100/0x100 [ 877.644260][ T1117] ? do_raw_spin_unlock+0x181/0x270 [ 877.644295][ T1117] do_sys_open+0x3fe/0x5d0 [ 877.644314][ T1117] ? filp_open+0x80/0x80 [ 877.644335][ T1117] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 877.644353][ T1117] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 877.644370][ T1117] ? do_syscall_64+0x26/0x790 [ 877.644386][ T1117] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 877.644401][ T1117] ? do_syscall_64+0x26/0x790 [ 877.644421][ T1117] __x64_sys_openat+0x9d/0x100 [ 877.644441][ T1117] do_syscall_64+0xfa/0x790 [ 877.644462][ T1117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 877.644474][ T1117] RIP: 0033:0x45aff9 [ 877.644491][ T1117] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 877.644504][ T1117] RSP: 002b:00007efd35bd9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 877.644519][ T1117] RAX: ffffffffffffffda RBX: 00007efd35bda6d4 RCX: 000000000045aff9 [ 877.644530][ T1117] RDX: 0000000000000000 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 877.644546][ T1117] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 877.644555][ T1117] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 877.644565][ T1117] R13: 000000000000076e R14: 00000000004c8974 R15: 000000000075bfd4 [ 877.644589][ T1117] [ 877.644589][ T1117] Showing all locks held in the system: [ 877.644603][ T1117] 2 locks held by kworker/u4:6/660: [ 877.644613][ T1117] 1 lock held by khungtaskd/1117: [ 877.644618][ T1117] #0: ffffffff899a3f00 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 877.644664][ T1117] 2 locks held by kworker/1:47/2805: [ 877.644669][ T1117] #0: ffff8880aa426d28 ((wq_completion)events){+.+.}, at: process_one_work+0x88b/0x1740 [ 877.644697][ T1117] #1: ffffc90008a37dc0 (console_work){+.+.}, at: process_one_work+0x8c1/0x1740 [ 877.644740][ T1117] 1 lock held by rsyslogd/10490: [ 877.644745][ T1117] #0: ffff8880956ca3e0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 877.644776][ T1117] 2 locks held by getty/10612: [ 877.644780][ T1117] #0: ffff888097aca090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 877.644802][ T1117] #1: ffffc9000177b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 877.644913][ T1117] 2 locks held by getty/10613: [ 877.644918][ T1117] #0: ffff88809642c090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 877.644945][ T1117] #1: ffffc9000176b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 877.644980][ T1117] 2 locks held by getty/10614: [ 877.644985][ T1117] #0: ffff8880968a7090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 877.645013][ T1117] #1: ffffc9000178b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 877.645049][ T1117] 2 locks held by getty/10615: [ 877.645054][ T1117] #0: ffff8880978b1090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 877.645082][ T1117] #1: ffffc900017932e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 877.645117][ T1117] 2 locks held by getty/10616: [ 877.645122][ T1117] #0: ffff8880968a8090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 877.645273][ T1117] #1: ffffc9000178f2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 877.645314][ T1117] 2 locks held by getty/10617: [ 877.645319][ T1117] #0: ffff888097a2f090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 877.645344][ T1117] #1: ffffc9000170b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 877.645385][ T1117] 2 locks held by getty/10618: [ 877.645390][ T1117] #0: ffff888095c8a090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 877.645418][ T1117] #1: ffffc900016eb2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 877.645469][ T1117] 2 locks held by syz-executor.2/24987: [ 877.645479][ T1117] 1 lock held by syz-executor.2/24995: [ 877.645485][ T1117] #0: ffff8880a382f070 (&fb_info->lock){+.+.}, at: fb_open+0xd7/0x450 [ 877.645517][ T1117] [ 877.645523][ T1117] ============================================= [ 877.645523][ T1117] [ 877.645532][ T1117] NMI backtrace for cpu 1 [ 877.645548][ T1117] CPU: 1 PID: 1117 Comm: khungtaskd Not tainted 5.5.0-rc6-syzkaller #0 [ 877.645557][ T1117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.645562][ T1117] Call Trace: [ 877.645593][ T1117] dump_stack+0x197/0x210 [ 877.645618][ T1117] nmi_cpu_backtrace.cold+0x70/0xb2 [ 877.645676][ T1117] ? vprintk_func+0x86/0x189 [ 877.645699][ T1117] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 877.645719][ T1117] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 877.645742][ T1117] arch_trigger_cpumask_backtrace+0x14/0x20 [ 877.645763][ T1117] watchdog+0xb11/0x10c0 [ 877.645788][ T1117] kthread+0x361/0x430 [ 877.645805][ T1117] ? reset_hung_task_detector+0x30/0x30 [ 877.645819][ T1117] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 877.645864][ T1117] ret_from_fork+0x24/0x30 [ 877.645891][ T1117] Sending NMI from CPU 1 to CPUs 0: [ 877.646560][ C0] NMI backtrace for cpu 0 [ 877.646568][ C0] CPU: 0 PID: 4332 Comm: udevd Not tainted 5.5.0-rc6-syzkaller #0 [ 877.646575][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.646580][ C0] RIP: 0010:check_memory_region+0x1f/0x1a0 [ 877.646593][ C0] Code: 00 66 2e 0f 1f 84 00 00 00 00 00 48 85 f6 0f 84 34 01 00 00 48 b8 ff ff ff ff ff 7f ff ff 55 0f b6 d2 48 39 c7 48 89 e5 41 55 <41> 54 53 0f 86 07 01 00 00 4c 8d 5c 37 ff 49 89 f8 48 b8 00 00 00 [ 877.646597][ C0] RSP: 0018:ffffc90001c1f8a0 EFLAGS: 00000012 [ 877.646606][ C0] RAX: ffff7fffffffffff RBX: 00000000000004c6 RCX: ffffffff815a7ee0 [ 877.646612][ C0] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff8b2f3d78 [ 877.646618][ C0] RBP: ffffc90001c1f8a8 R08: 1ffffffff165e7af R09: fffffbfff165e7b0 [ 877.646624][ C0] R10: ffff8880a64fac18 R11: ffff8880a64fa380 R12: 00000000cb98681d [ 877.646629][ C0] R13: ffffffff8a7b7ef0 R14: 0000000000000000 R15: 0000000000000001 [ 877.646635][ C0] FS: 00007f8ef8b667a0(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 877.646639][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 877.646645][ C0] CR2: ffffffffff600400 CR3: 00000000a6476000 CR4: 00000000001406f0 [ 877.646651][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 877.646657][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 877.646660][ C0] Call Trace: [ 877.646664][ C0] __kasan_check_read+0x11/0x20 [ 877.646668][ C0] __lock_acquire+0x8a0/0x4a00 [ 877.646672][ C0] ? __kasan_check_read+0x11/0x20 [ 877.646676][ C0] ? finish_task_switch+0x147/0x750 [ 877.646680][ C0] ? mark_held_locks+0xf0/0xf0 [ 877.646684][ C0] ? __kasan_check_read+0x11/0x20 [ 877.646688][ C0] lock_acquire+0x190/0x410 [ 877.646692][ C0] ? ep_scan_ready_list+0x7d4/0x9e0 [ 877.646695][ C0] __mutex_lock+0x156/0x13c0 [ 877.646699][ C0] ? ep_scan_ready_list+0x7d4/0x9e0 [ 877.646703][ C0] ? find_held_lock+0x35/0x130 [ 877.646707][ C0] ? ep_scan_ready_list+0x7d4/0x9e0 [ 877.646711][ C0] ? __lock_acquire+0x16f2/0x4a00 [ 877.646715][ C0] ? mutex_trylock+0x2d0/0x2d0 [ 877.646719][ C0] ? lock_downgrade+0x920/0x920 [ 877.646722][ C0] ? ktime_get_ts64+0x110/0x3e0 [ 877.646726][ C0] ? select_estimate_accuracy+0xd4/0x330 [ 877.646730][ C0] ? ktime_get_ts64+0x110/0x3e0 [ 877.646737][ C0] ? lockdep_hardirqs_on+0x421/0x5e0 [ 877.646741][ C0] ? trace_hardirqs_on+0x67/0x240 [ 877.646746][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 877.646750][ C0] ? ktime_get_ts64+0x2bb/0x3e0 [ 877.646753][ C0] ? ep_insert+0x1880/0x1880 [ 877.646757][ C0] mutex_lock_nested+0x16/0x20 [ 877.646761][ C0] ? mutex_lock_nested+0x16/0x20 [ 877.646764][ C0] ep_scan_ready_list+0x7d4/0x9e0 [ 877.646768][ C0] ? compat_get_fd_set+0x80/0x80 [ 877.646773][ C0] ? ep_destroy_wakeup_source+0x160/0x160 [ 877.646776][ C0] ep_poll+0x1f9/0xe60 [ 877.646780][ C0] ? _raw_spin_unlock_irq+0x23/0x80 [ 877.646784][ C0] ? finish_task_switch+0x147/0x750 [ 877.646789][ C0] ? _raw_spin_unlock_irq+0x23/0x80 [ 877.646792][ C0] ? ep_modify+0x8e0/0x8e0 [ 877.646796][ C0] ? __kasan_check_write+0x14/0x20 [ 877.646800][ C0] ? finish_task_switch+0x1dc/0x750 [ 877.646803][ C0] ? __schedule+0x93c/0x1f90 [ 877.646807][ C0] ? retint_kernel+0x2b/0x2b [ 877.646812][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 877.646816][ C0] ? __fget_light+0x1a9/0x230 [ 877.646819][ C0] do_epoll_wait+0x210/0x260 [ 877.646824][ C0] __x64_sys_epoll_wait+0x97/0xf0 [ 877.646827][ C0] do_syscall_64+0xfa/0x790 [ 877.646831][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 877.646835][ C0] RIP: 0033:0x7f8ef827a943 [ 877.646848][ C0] Code: 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 83 3d b5 dc 2a 00 00 75 13 49 89 ca b8 e8 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 34 c3 48 83 ec 08 e8 3b c4 00 00 48 89 04 24 [ 877.646853][ C0] RSP: 002b:00007fff13826b08 EFLAGS: 00000246 ORIG_RAX: 00000000000000e8 [ 877.646863][ C0] RAX: ffffffffffffffda RBX: 0000000000000bb8 RCX: 00007f8ef827a943 [ 877.646868][ C0] RDX: 0000000000000008 RSI: 00007fff13826c00 RDI: 000000000000000a [ 877.646874][ C0] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000001 [ 877.646880][ C0] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000003 [ 877.646886][ C0] R13: 0000000000000000 R14: 0000000000b136b0 R15: 0000000000ade030 [ 877.646911][ T1117] Kernel panic - not syncing: hung_task: blocked tasks [ 877.646924][ T1117] CPU: 1 PID: 1117 Comm: khungtaskd Not tainted 5.5.0-rc6-syzkaller #0 [ 877.646930][ T1117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.646934][ T1117] Call Trace: [ 877.646950][ T1117] dump_stack+0x197/0x210 [ 877.646972][ T1117] panic+0x2e3/0x75c [ 877.646985][ T1117] ? add_taint.cold+0x16/0x16 [ 877.647003][ T1117] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 877.647019][ T1117] ? printk_safe_flush+0xf2/0x140 [ 877.647033][ T1117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 877.647053][ T1117] ? nmi_trigger_cpumask_backtrace+0x224/0x28b [ 877.647069][ T1117] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 877.647086][ T1117] watchdog+0xb22/0x10c0 [ 877.647107][ T1117] kthread+0x361/0x430 [ 877.647122][ T1117] ? reset_hung_task_detector+0x30/0x30 [ 877.647134][ T1117] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 877.647151][ T1117] ret_from_fork+0x24/0x30 [ 877.649090][ T1117] Kernel Offset: disabled