ath_number_perm+0x520/0x520 [ 2553.907790][T31042] ? ___might_sleep+0x163/0x2c0 [ 2553.912713][T31042] ? inode_has_perm+0x230/0x230 [ 2553.917736][T31042] ? rwlock_bug.part.0+0x2c/0x90 [ 2553.922793][T31042] tomoyo_file_open+0xa9/0xd0 [ 2553.927510][T31042] security_file_open+0x71/0x300 [ 2553.932561][T31042] do_dentry_open+0x37a/0x1380 [ 2553.937359][T31042] ? chown_common+0x5c0/0x5c0 [ 2553.942047][T31042] ? inode_permission+0xb4/0x520 [ 2553.946990][T31042] vfs_open+0xa0/0xd0 [ 2553.950959][T31042] path_openat+0x12ee/0x3490 [ 2553.955557][T31042] ? path_mountpoint.isra.0+0x370/0x370 [ 2553.961173][T31042] ? __alloc_fd+0x487/0x620 [ 2553.965718][T31042] do_filp_open+0x192/0x260 [ 2553.970697][T31042] ? may_open_dev+0x100/0x100 [ 2553.979413][T31042] ? do_raw_spin_unlock+0x181/0x270 [ 2553.984617][T31042] ? _raw_spin_unlock+0x28/0x40 [ 2553.989480][T31042] do_sys_openat2+0x5eb/0x7e0 [ 2553.994157][T31042] ? file_open_root+0x430/0x430 [ 2553.999004][T31042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2554.005276][T31042] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2554.011433][T31042] do_sys_open+0xf2/0x180 [ 2554.015761][T31042] ? filp_open+0x80/0x80 [ 2554.020081][T31042] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2554.025534][T31042] ? do_syscall_64+0x26/0x790 [ 2554.030639][T31042] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2554.036697][T31042] ? do_syscall_64+0x26/0x790 [ 2554.041414][T31042] __x64_sys_open+0x7e/0xc0 [ 2554.045934][T31042] do_syscall_64+0xfa/0x790 [ 2554.050499][T31042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2554.056519][T31042] RIP: 0033:0x415151 [ 2554.060406][T31042] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2554.080103][T31042] RSP: 002b:00007febdf4b5a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2554.088523][T31042] RAX: ffffffffffffffda RBX: 00007febdf4b66d4 RCX: 0000000000415151 18:03:59 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:03:59 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:03:59 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f00000005c0)={0x0, 0x7bc, 0x3000}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000f00)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c8000000fa414e5c5e6f47b130f916bce8cd4c12635dd60e81d483e584f640d3eb652d46adef1924f3932ee9665e24c621596dff01fdcf6b349d155e2496cb598e14af3cd42f83d92c4231e399b409b1535e2c7a69f46313bf8dff4e43d17999e51314b6d6b9930d4e2d572aa710ce0b8697bd2e705ca01575265f7fb786bc8748da14efd3b97f62d6508e9ee43aa2a88820cd27de2e7ecfc45f47b29d37eff6e82c23d1c0380c61204d0672caecee95a5927a57670068f3e8f28007b9628031abc19aeff3f2212f6efecfea83fb4345922e99ced7b100709e5d837e778e0517349292706383b97ff1a97433f2b5136f592a34cc957dc520000000c11558572b162c606dcc0ccac098a0943b0d2d550ea63f16b0eaf968a4bb96c5329d28625b444d9ebf4380111d5c4a52ee0de8e41387e4ca8285ad0a1f9ecc6806129ff8d9079b96be514480e1f0610026d27ecbc27779cfb11026fe9d9cdafed9f2ddaabe4effa511930a4716cfd649b9913555a08d9cf4fce39329e82fe6890a41451ab184855ee9f84420dbc1b3bbe5e43a2c89eb4d90bc3396246525f73269136200f5f06f962fbbba9610b5bb259ebd6997eebc71352421a2c8c607000e8dbcd3ef04cd06caac13f771217e96641549b3b2feb177f994dc05975b437db231bff06f038a0e70febb0922415c6b1a94f6995637672c4eaebbc11e7cf0c4d61fd53bc758bf311168830ca3c186ad6156d571a273de9dc91c66b99d56f6932107d4a18a214b01478fc7cf47aa0720c0fa7302e003000000b14eb401a33ba4129738e8a2c446f90d313302abe01f27ee1f14fe2cf16d9995393b18bb96f3eb87db0100000000000000486d883493f56f05c306f972be149dffbf0329ddc16299acb21664d1d21ebacbb59144f68534f25de643d8173485d4db0e99d96294536e6e21b767b5f32e76e363081c72ff0343651a08e30158ac98d50aaef479dc4e34fcabf4f568c09a6d2955cd0bcbf4545c67242246f7a23ebae0f8e8ceeeef172510f2d919df1418ba8b43ec8c121fe2189b489503a3faa51640dd16a4ea7e2fcd20f8a31906cdbbb01b280ccc360697d9ecf5d68467d8fd14a6a3691a90fce327a6b09cb21b175ed2871209689493d5559d0fab0cc3f40beba9fd03000000000000000000000000000000b642caddfd667a0f9fc90bc9a961ad1739e88d36824daa9c14b345180e8bdd38f930c9bef4c9511faeabc144f38f609fda27e23f8a514ca10e86a4b4ea7a32083091e023661881cfada03916b9fc282669fdb25ba64682b8a4272c8c1967b200bd3cf1147cf446d65d6af1d4797a76879f46869b408f396057fb15fbe47751b93634f81f6f98292e5e39f4205800000000000000fe890771b0afd6b507c2f225c14d56944b1f73a88872045360c6f2515c303d30e880e719cbf89bc8cb7a6d989d756ca99691a30f7caa92b0f2216a3eb5301d849d67a56c5c78ca15ba5d3374788b22a7d27a00de2afd1f1c11305706d72001cb8d31e7b87f670608d6d9ca8ade4a276ab734fd4f9d1809596777427e2bb13bb673c75d27dacfc71e41c38cab7bfefaec87df026ff908102d7495355760039bd7882a7ca1afeb3ead921fd631c6e89c64c7ef135f98891f"], 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0xa, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:03:59 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, 0x0, 0x0) [ 2554.096502][T31042] RDX: 00007febdf4b5b0a RSI: 0000000000000002 RDI: 00007febdf4b5b00 [ 2554.104660][T31042] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2554.112656][T31042] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 2554.120747][T31042] R13: 0000000000000bab R14: 00000000004cc868 R15: 000000000000000d [ 2554.130886][T31042] ERROR: Out of memory at tomoyo_realpath_from_path. 18:03:59 executing program 0 (fault-call:0 fault-nth:14): syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2554.176174][T31035] jfs: Unrecognized mount option "@" or missing value 18:03:59 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, 0x0, 0x0) 18:03:59 executing program 1: r0 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x810180, 0x2a1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r1, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x3c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x413}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb}]}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000840}, 0x20040044) 18:04:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, 0x0, 0x0) 18:04:00 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f00000005c0)={0x0, 0x7bc, 0x3000}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) [ 2554.411739][T31165] FAULT_INJECTION: forcing a failure. [ 2554.411739][T31165] name failslab, interval 1, probability 0, space 0, times 0 18:04:00 executing program 4 (fault-call:4 fault-nth:0): r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 2554.599159][T31165] CPU: 1 PID: 31165 Comm: syz-executor.0 Not tainted 5.6.0-rc1-syzkaller #0 [ 2554.607983][T31165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2554.618089][T31165] Call Trace: [ 2554.621438][T31165] dump_stack+0x197/0x210 [ 2554.625800][T31165] should_fail.cold+0x5/0xd [ 2554.630335][T31165] ? fault_create_debugfs_attr+0x140/0x140 [ 2554.636174][T31165] ? ___might_sleep+0x163/0x2c0 [ 2554.641052][T31165] __should_failslab+0xb7/0x100 [ 2554.645928][T31165] should_failslab+0x9/0x14 [ 2554.650588][T31165] kmem_cache_alloc+0x2aa/0x710 [ 2554.655477][T31165] ? kmem_cache_alloc+0x364/0x710 [ 2554.660532][T31165] security_file_alloc+0x39/0x170 [ 2554.665587][T31165] __alloc_file+0xde/0x340 [ 2554.670068][T31165] alloc_empty_file+0x72/0x170 [ 2554.674871][T31165] path_openat+0xef/0x3490 [ 2554.679342][T31165] ? do_sys_openat2+0x45c/0x7e0 [ 2554.684233][T31165] ? do_sys_open+0xf2/0x180 [ 2554.689165][T31165] ? __kasan_check_read+0x11/0x20 [ 2554.694222][T31165] ? mark_lock+0xc2/0x1220 [ 2554.698665][T31165] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2554.704246][T31165] ? path_mountpoint.isra.0+0x370/0x370 [ 2554.709841][T31165] ? __alloc_fd+0x487/0x620 [ 2554.714393][T31165] do_filp_open+0x192/0x260 [ 2554.718921][T31165] ? may_open_dev+0x100/0x100 [ 2554.723618][T31165] ? lock_downgrade+0x920/0x920 [ 2554.728496][T31165] ? rwlock_bug.part.0+0x90/0x90 [ 2554.733576][T31165] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2554.739862][T31165] ? do_raw_spin_unlock+0x181/0x270 [ 2554.745272][T31165] ? _raw_spin_unlock+0x28/0x40 [ 2554.750176][T31165] do_sys_openat2+0x5eb/0x7e0 [ 2554.754895][T31165] ? file_open_root+0x430/0x430 [ 2554.759868][T31165] ? lock_downgrade+0x920/0x920 [ 2554.764836][T31165] do_sys_open+0xf2/0x180 [ 2554.769190][T31165] ? filp_open+0x80/0x80 [ 2554.773453][T31165] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2554.779817][T31165] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2554.785320][T31165] ? do_syscall_64+0x26/0x790 [ 2554.790026][T31165] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2554.796107][T31165] ? do_syscall_64+0x26/0x790 [ 2554.800814][T31165] __x64_sys_open+0x7e/0xc0 [ 2554.805341][T31165] do_syscall_64+0xfa/0x790 [ 2554.809877][T31165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2554.815896][T31165] RIP: 0033:0x415151 [ 2554.819807][T31165] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2554.839747][T31165] RSP: 002b:00007febdf4b5a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 18:04:00 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:00 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f00000005c0)={0x0, 0x7bc, 0x3000}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:00 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 2554.848352][T31165] RAX: ffffffffffffffda RBX: 00007febdf4b66d4 RCX: 0000000000415151 [ 2554.856336][T31165] RDX: 00007febdf4b5b0a RSI: 0000000000000002 RDI: 00007febdf4b5b00 [ 2554.864319][T31165] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2554.872303][T31165] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 2554.880310][T31165] R13: 0000000000000bab R14: 00000000004cc868 R15: 000000000000000e 18:04:00 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:00 executing program 0 (fault-call:0 fault-nth:15): syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:00 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f00000005c0)={0x0, 0x7bc, 0x3000}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:00 executing program 1: open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:00 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x3a, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:00 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r2 = socket$inet6(0xa, 0x3, 0x3a) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f00000005c0)={0x0, 0x7bc, 0x3000}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:01 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x7, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:01 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)={0xa4, r3, 0x23f, 0x0, 0x0, {{}, {0xe803, 0x410c}, {0x88, 0x14, 'broadcast-link\x00'}}}, 0xa4}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r3, 0x300, 0x70bd28, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20}, 0xa4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) [ 2555.751031][T31589] FAULT_INJECTION: forcing a failure. [ 2555.751031][T31589] name failslab, interval 1, probability 0, space 0, times 0 [ 2555.812375][T31589] CPU: 0 PID: 31589 Comm: syz-executor.0 Not tainted 5.6.0-rc1-syzkaller #0 [ 2555.821707][T31589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2555.831778][T31589] Call Trace: [ 2555.835094][T31589] dump_stack+0x197/0x210 [ 2555.839572][T31589] should_fail.cold+0x5/0xd [ 2555.844110][T31589] ? fault_create_debugfs_attr+0x140/0x140 [ 2555.849944][T31589] ? ___might_sleep+0x163/0x2c0 [ 2555.854847][T31589] __should_failslab+0xb7/0x100 18:04:01 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:01 executing program 3: socket(0x10, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r1 = socket$inet6(0xa, 0x3, 0x3a) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f00000005c0)={0x0, 0x7bc, 0x3000}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) [ 2555.859931][T31589] should_failslab+0x9/0x14 [ 2555.864448][T31589] __kmalloc+0x2e0/0x770 [ 2555.868733][T31589] ? tomoyo_realpath_from_path+0xc5/0x660 [ 2555.874482][T31589] tomoyo_realpath_from_path+0xc5/0x660 [ 2555.880046][T31589] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2555.886320][T31589] ? tomoyo_init_request_info+0x105/0x1d0 [ 2555.892066][T31589] tomoyo_check_open_permission+0x2a3/0x3e0 [ 2555.897989][T31589] ? tomoyo_path_number_perm+0x520/0x520 [ 2555.903881][T31589] ? ___might_sleep+0x163/0x2c0 [ 2555.908786][T31589] ? inode_has_perm+0x230/0x230 [ 2555.913659][T31589] ? rwlock_bug.part.0+0x2c/0x90 [ 2555.918639][T31589] tomoyo_file_open+0xa9/0xd0 [ 2555.923340][T31589] security_file_open+0x71/0x300 [ 2555.928316][T31589] do_dentry_open+0x37a/0x1380 [ 2555.933212][T31589] ? chown_common+0x5c0/0x5c0 [ 2555.938043][T31589] ? inode_permission+0xb4/0x520 [ 2555.943019][T31589] vfs_open+0xa0/0xd0 [ 2555.947027][T31589] path_openat+0x12ee/0x3490 [ 2555.951660][T31589] ? path_mountpoint.isra.0+0x370/0x370 [ 2555.957237][T31589] ? __alloc_fd+0x487/0x620 [ 2555.961813][T31589] do_filp_open+0x192/0x260 [ 2555.966444][T31589] ? may_open_dev+0x100/0x100 [ 2555.971311][T31589] ? do_raw_spin_unlock+0x181/0x270 [ 2555.976549][T31589] ? _raw_spin_unlock+0x28/0x40 [ 2555.981451][T31589] do_sys_openat2+0x5eb/0x7e0 [ 2555.986158][T31589] ? file_open_root+0x430/0x430 [ 2555.991038][T31589] ? lock_downgrade+0x920/0x920 [ 2555.995919][T31589] do_sys_open+0xf2/0x180 [ 2556.000283][T31589] ? filp_open+0x80/0x80 [ 2556.004565][T31589] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 18:04:01 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) close(r1) [ 2556.011191][T31589] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2556.016771][T31589] ? do_syscall_64+0x26/0x790 [ 2556.021473][T31589] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2556.027586][T31589] ? do_syscall_64+0x26/0x790 [ 2556.032297][T31589] __x64_sys_open+0x7e/0xc0 [ 2556.036824][T31589] do_syscall_64+0xfa/0x790 [ 2556.041362][T31589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2556.047828][T31589] RIP: 0033:0x415151 [ 2556.051740][T31589] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2556.071471][T31589] RSP: 002b:00007febdf4b5a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2556.079905][T31589] RAX: ffffffffffffffda RBX: 00007febdf4b66d4 RCX: 0000000000415151 [ 2556.088043][T31589] RDX: 00007febdf4b5b0a RSI: 0000000000000002 RDI: 00007febdf4b5b00 [ 2556.096042][T31589] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2556.104055][T31589] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 2556.112043][T31589] R13: 0000000000000bab R14: 00000000004cc868 R15: 000000000000000f [ 2556.293172][T31589] ERROR: Out of memory at tomoyo_realpath_from_path. 18:04:01 executing program 3: socket(0x10, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x14, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:01 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:01 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:02 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) r1 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) move_mount(r3, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00', 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0xb, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:02 executing program 0 (fault-call:0 fault-nth:16): syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:02 executing program 3: socket(0x10, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:02 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x15, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:02 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2556.576028][T31868] FAULT_INJECTION: forcing a failure. [ 2556.576028][T31868] name failslab, interval 1, probability 0, space 0, times 0 [ 2556.601630][T31868] CPU: 1 PID: 31868 Comm: syz-executor.0 Not tainted 5.6.0-rc1-syzkaller #0 [ 2556.610453][T31868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2556.620528][T31868] Call Trace: [ 2556.623838][T31868] dump_stack+0x197/0x210 [ 2556.628290][T31868] should_fail.cold+0x5/0xd [ 2556.632830][T31868] ? fault_create_debugfs_attr+0x140/0x140 [ 2556.638668][T31868] ? ___might_sleep+0x163/0x2c0 [ 2556.643556][T31868] __should_failslab+0xb7/0x100 [ 2556.648435][T31868] should_failslab+0x9/0x14 [ 2556.652960][T31868] __kmalloc+0x2e0/0x770 [ 2556.657226][T31868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2556.663553][T31868] ? d_absolute_path+0x11b/0x170 [ 2556.668530][T31868] ? __d_path+0x140/0x140 [ 2556.673458][T31868] ? tomoyo_encode2.part.0+0xf5/0x400 [ 2556.678859][T31868] tomoyo_encode2.part.0+0xf5/0x400 [ 2556.684095][T31868] tomoyo_encode+0x2b/0x50 [ 2556.688532][T31868] tomoyo_realpath_from_path+0x19c/0x660 [ 2556.694189][T31868] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2556.700472][T31868] tomoyo_check_open_permission+0x2a3/0x3e0 [ 2556.706394][T31868] ? tomoyo_path_number_perm+0x520/0x520 [ 2556.712936][T31868] ? ___might_sleep+0x163/0x2c0 [ 2556.717831][T31868] ? inode_has_perm+0x230/0x230 [ 2556.722711][T31868] ? rwlock_bug.part.0+0x2c/0x90 [ 2556.727686][T31868] tomoyo_file_open+0xa9/0xd0 [ 2556.732394][T31868] security_file_open+0x71/0x300 [ 2556.737364][T31868] do_dentry_open+0x37a/0x1380 [ 2556.742184][T31868] ? chown_common+0x5c0/0x5c0 [ 2556.746883][T31868] ? inode_permission+0xb4/0x520 [ 2556.751863][T31868] vfs_open+0xa0/0xd0 [ 2556.755869][T31868] path_openat+0x12ee/0x3490 [ 2556.760528][T31868] ? path_mountpoint.isra.0+0x370/0x370 [ 2556.766118][T31868] ? __alloc_fd+0x487/0x620 [ 2556.770949][T31868] do_filp_open+0x192/0x260 [ 2556.775479][T31868] ? may_open_dev+0x100/0x100 [ 2556.780202][T31868] ? do_raw_spin_unlock+0x181/0x270 [ 2556.785422][T31868] ? _raw_spin_unlock+0x28/0x40 [ 2556.790366][T31868] do_sys_openat2+0x5eb/0x7e0 [ 2556.795076][T31868] ? file_open_root+0x430/0x430 [ 2556.799948][T31868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2556.806217][T31868] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2556.812833][T31868] do_sys_open+0xf2/0x180 [ 2556.817192][T31868] ? filp_open+0x80/0x80 [ 2556.821554][T31868] ? trace_hardirqs_on_thunk+0x1a/0x1c 18:04:02 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x1b, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:02 executing program 3: socket(0x10, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) [ 2556.827032][T31868] ? do_syscall_64+0x26/0x790 [ 2556.831728][T31868] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2556.837817][T31868] ? do_syscall_64+0x26/0x790 [ 2556.842528][T31868] __x64_sys_open+0x7e/0xc0 [ 2556.847067][T31868] do_syscall_64+0xfa/0x790 [ 2556.851614][T31868] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2556.857523][T31868] RIP: 0033:0x415151 [ 2556.861432][T31868] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2556.881206][T31868] RSP: 002b:00007febdf4b5a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2556.889639][T31868] RAX: ffffffffffffffda RBX: 00007febdf4b66d4 RCX: 0000000000415151 [ 2556.897671][T31868] RDX: 00007febdf4b5b0a RSI: 0000000000000002 RDI: 00007febdf4b5b00 [ 2556.905700][T31868] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2556.913712][T31868] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 2556.921820][T31868] R13: 0000000000000bab R14: 00000000004cc868 R15: 0000000000000010 [ 2556.948669][T31866] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:02 executing program 3: socket(0x10, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) [ 2557.147072][T31868] ERROR: Out of memory at tomoyo_realpath_from_path. 18:04:02 executing program 0 (fault-call:0 fault-nth:17): syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:02 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:02 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x1c, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:02 executing program 1: r0 = syz_open_procfs(0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ustat(0x200, &(0x7f0000000000)) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101080, 0x10) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x5) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:02 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:03 executing program 3: socket(0x10, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:03 executing program 3: socket(0x10, 0x2, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:03 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2557.606738][T32168] FAULT_INJECTION: forcing a failure. [ 2557.606738][T32168] name failslab, interval 1, probability 0, space 0, times 0 [ 2557.614200][T32107] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value [ 2557.619779][T32168] CPU: 0 PID: 32168 Comm: syz-executor.0 Not tainted 5.6.0-rc1-syzkaller #0 [ 2557.636990][T32168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2557.647064][T32168] Call Trace: [ 2557.650379][T32168] dump_stack+0x197/0x210 [ 2557.654747][T32168] should_fail.cold+0x5/0xd [ 2557.659277][T32168] ? fault_create_debugfs_attr+0x140/0x140 [ 2557.665103][T32168] ? ___might_sleep+0x163/0x2c0 [ 2557.670014][T32168] __should_failslab+0xb7/0x100 [ 2557.674997][T32168] should_failslab+0x9/0x14 [ 2557.679524][T32168] __kmalloc+0x2e0/0x770 [ 2557.683781][T32168] ? mark_held_locks+0xf0/0xf0 [ 2557.688570][T32168] ? tomoyo_realpath_from_path+0xc5/0x660 [ 2557.694318][T32168] tomoyo_realpath_from_path+0xc5/0x660 [ 2557.699880][T32168] ? tomoyo_path_number_perm+0x193/0x520 [ 2557.705551][T32168] tomoyo_path_number_perm+0x1dd/0x520 [ 2557.711160][T32168] ? tomoyo_path_number_perm+0x193/0x520 [ 2557.716997][T32168] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2557.722933][T32168] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2557.729239][T32168] ? ___might_sleep+0x163/0x2c0 [ 2557.734149][T32168] ? selinux_file_mprotect+0x620/0x620 [ 2557.739628][T32168] ? __fget_files+0x359/0x520 [ 2557.744344][T32168] ? ksys_dup3+0x3e0/0x3e0 [ 2557.748800][T32168] tomoyo_file_ioctl+0x23/0x30 [ 2557.753593][T32168] security_file_ioctl+0x77/0xc0 [ 2557.758552][T32168] ksys_ioctl+0x56/0x180 [ 2557.762924][T32168] __x64_sys_ioctl+0x73/0xb0 [ 2557.767535][T32168] do_syscall_64+0xfa/0x790 [ 2557.772084][T32168] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2557.777985][T32168] RIP: 0033:0x45b227 [ 2557.781891][T32168] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:04:03 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) [ 2557.801723][T32168] RSP: 002b:00007febdf4b5a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2557.810159][T32168] RAX: ffffffffffffffda RBX: 00007febdf4b66d4 RCX: 000000000045b227 [ 2557.818189][T32168] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2557.826214][T32168] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2557.834200][T32168] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 2557.842288][T32168] R13: 0000000000000bab R14: 00000000004cc868 R15: 0000000000000011 18:04:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x24, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:03 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:03 executing program 0 (fault-call:0 fault-nth:18): syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2557.865210][T32168] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2557.919278][T32232] FAULT_INJECTION: forcing a failure. [ 2557.919278][T32232] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2557.932522][T32232] CPU: 0 PID: 32232 Comm: syz-executor.0 Not tainted 5.6.0-rc1-syzkaller #0 [ 2557.941206][T32232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2557.951284][T32232] Call Trace: [ 2557.954600][T32232] dump_stack+0x197/0x210 [ 2557.958959][T32232] should_fail.cold+0x5/0xd [ 2557.963494][T32232] ? fault_create_debugfs_attr+0x140/0x140 [ 2557.969324][T32232] ? __kasan_check_read+0x11/0x20 [ 2557.974508][T32232] should_fail_alloc_page+0x50/0x60 [ 2557.979728][T32232] __alloc_pages_nodemask+0x1a1/0x910 [ 2557.985241][T32232] ? avc_has_extended_perms+0x8e4/0x10f0 [ 2557.990893][T32232] ? __alloc_pages_slowpath+0x2900/0x2900 [ 2557.996632][T32232] ? __kasan_check_read+0x11/0x20 [ 2558.001699][T32232] cache_grow_begin+0x90/0xc60 [ 2558.006609][T32232] ? trace_hardirqs_off+0x62/0x240 [ 2558.011837][T32232] __kmalloc+0x6b2/0x770 [ 2558.016093][T32232] ? mark_held_locks+0xf0/0xf0 [ 2558.020886][T32232] ? tomoyo_realpath_from_path+0xc5/0x660 [ 2558.026733][T32232] tomoyo_realpath_from_path+0xc5/0x660 [ 2558.032298][T32232] ? tomoyo_path_number_perm+0x193/0x520 [ 2558.037958][T32232] tomoyo_path_number_perm+0x1dd/0x520 [ 2558.043537][T32232] ? tomoyo_path_number_perm+0x193/0x520 [ 2558.049199][T32232] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2558.055136][T32232] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2558.061331][T32232] ? ___might_sleep+0x163/0x2c0 [ 2558.066237][T32232] ? selinux_file_mprotect+0x620/0x620 [ 2558.071932][T32232] ? __fget_files+0x359/0x520 [ 2558.076645][T32232] ? ksys_dup3+0x3e0/0x3e0 [ 2558.081084][T32232] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2558.086759][T32232] tomoyo_file_ioctl+0x23/0x30 [ 2558.091546][T32232] security_file_ioctl+0x77/0xc0 [ 2558.096653][T32232] ksys_ioctl+0x56/0x180 [ 2558.100927][T32232] __x64_sys_ioctl+0x73/0xb0 [ 2558.105536][T32232] do_syscall_64+0xfa/0x790 [ 2558.110066][T32232] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2558.115984][T32232] RIP: 0033:0x45b227 [ 2558.119899][T32232] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2558.139628][T32232] RSP: 002b:00007febdf4b5a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2558.148063][T32232] RAX: ffffffffffffffda RBX: 00007febdf4b66d4 RCX: 000000000045b227 [ 2558.156053][T32232] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 18:04:03 executing program 0 (fault-call:0 fault-nth:19): syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2558.164233][T32232] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2558.172217][T32232] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 2558.180355][T32232] R13: 0000000000000bab R14: 00000000004cc868 R15: 0000000000000012 18:04:03 executing program 1: r0 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)={0x29, 0x6, 0x0, {0x2, 0x4}}, 0x29) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r3, &(0x7f0000367fe4)=""/91, 0x275) r4 = dup2(r2, r3) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x4e22, @loopback}}) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r5, 0x8982, &(0x7f0000000000)={0x3, 'nr0\x00', {0xffffffff}, 0x200}) add_key(&(0x7f0000000240)='blacklist\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="cf579bd242d6324fbeb3e9defd150dbb0cd96d152f5665e26f3226d38e74f321a1008ec37efc3f8655a96bf3000bb9f6094b0bb8b34c30e4c57a6779c73e8a8db6f14b734107e0fd72f4cd045223fa10d75d6d1c0e2c0b1f6922d292706169005321792d798905d95de2d341302993e8361d9cc526a066a056912db7ada022555a56c37cca01546d7c3ae4f6881165099a29946b177c9576a17ff634f12abcd1ec4ffcd6a8d14643694660df67a5689d9cfec7621283576b72b64e7f595c90f20fed8f957c111e9c993e3de7cc7098c3529a13b13404ee213697fd61f88ed20352fb882293b3c5b35228ed0ecff0080cb234e51db39ac1e04d96591ae0cda47b9b7ef597859273638c0a77288c8e05ed9f5c6ed71a0d7c92da0406dd435903e8a70f75803cd7cb8acf802f5d9d0798aa21d113c22a234b80b3627bc59e12628410a4e534083f5542bd5870e64dfb1b65bae4b354e7f50a6ab4f442c12d9ff1b5a9e99648a12bceabe6ff407b6005fa04e1b39409d4ef9f10bab45ab34032a479e8fdc814e4c9b0fdba3e1f1cd9020d6a277117427df74065f7bd8589167022acd0aae1393aca984702e2f7c97641bab24cdc5975fb0446b33142b76bbe81744e22d1466083e8bc543cd83bd6d17392b8487033912922fc18385fb02d711ee51642429b519a94aa4dd0eb53df53c8fd1318c10f4631a74ed8f9d6dbd33666577b36e833a2adf4b3c40252490dedd20b34014053739de6dfb663b9a01ef453cdfcb0bbec8bee8394b6bee939e4e008a59068892a0d25a1705c6112a030ecbe871d7f1d8a011dcb5a5865a8b3f83c1196cf8fc9f2834944c0ff3525bcaafa81c8ebbc55b7f52a1944c81d9dd240d73b5afd8e16ffc59f060d3ddd0dd3cfef53269c04707712051475f5ba26a85abff929adc5f4b57c6115ae767821b8e65a6390c45b73e5584a5df5b35ac5c1d7ad1080f9093dc7f06646ea0269d475672adf420dd3c609d3fe01dda4960484e894526aab6bbf976d01e98913e66a8fe877f3c9ec0f0becfe927d9078521d56383fd6278040d7adb3ce2f0a4bcdc72044091099ea631598b71878ebb81f59b542789e03f37afd4b4525045f257b51d1a26a7ec51b2190d6cf84bc8278f5a0a06d8e8c162097c46d2190dca5cb4ebc4b3272b30bf78cf0abbdc0ea54c3844e216f21f4cb3951653b3d9bdfaca8eebec294c5e18c314e84617715bca84c0aad4d4938ff6e67472b2dd102a7ac1ecd247b1599da24020d03973b9d6a91dcbe0d6b70d688fe486d1832a1365194295735eb466d227d3951ab29bebcb6576ccfe80805e276c94aa90ec8cc4e54c8a9a89c87ef769fc52ae3a086681b35f1d001aa4fd56c25e324c067d0ddc29d119858f0b8c41a39cc52a934d47b37b1e74351058668eb845ef05e264e69f5d3e38835d8a76ca96182f72b2211e87d67760c2dc4909686c3c2e6c6bc8a94bc5e2b1cfad7c574c4edec26c4c15ece2de2589cfeb627a316fc360d8b5521fff281d4bbd8a5ce118b73a35962321607b53a2a75b7a19b9ffb70c724b99b37dc650ec34e99602257d6786f01228408e8324fa3aefb38ccb067d1158e72a1f8fe5df5730b05aacb429c06fc1f2334b71b55975e6b0707095c1e3e6b8c8b3710bcdd0dc7f2ef5f3e572f5ea67e65f719506d91a9fad20b2e285803f10d02432f72027cb68d928b920287aa6185a06004f3e6921de6477adc5e2ad19c5441e265256f2872ceded5793f2993c1e894377ad6f13892ccbe004b78be43e792475fb13691e628606509ece1cc7c49b964447f98c7ea863d4df7b0547d2a5a8c35f312782e686adfe1a32cbb76c8d095adcf8f89959903c2217fbf5ac72e9958e65b2e5fb8b6f53e068d9f9e97dfe945187853b47c82f927d82fde0de7b2f3e33010e5e536c085f83dd7e6a4af945a2a3a51534f5450c6e2a84fa29bf6d96ce9ff6dca2eec92751fffcddb362e2ced371e48717dbbdf6e68aba6175acfb32693e3905547f8fa63ac2752397c0f2a36f77d37f5d1a731d04b4111cf5f4bfb98f7e3a035b52f193998b8949ff309e534409263bb452faac9c03ae0d5cb02f511a8b1ce31069b93b1ea0bc39076384fd3aa57d81e0390010531db494550c728db2f01c6d9b1278661ea02aa47b89a3c7c383d711d6dede953f7486e0fce5795c6f2c82c10cdec90942fdad4e726f343543d2cbb5b2dad1f396b8a317999e05aec91fd7dad5126a7325bb2da44da949481428dbbd76611a0fa47448cf68b23f5d0486c66e248875f0a2fff7f9b876e69aa1f0541f8634cacccb3bdcd6e6c68717b20e7c4e50fae806cc1ba6ec36788e30031aa5e3cf810442e73d52770f233643a798c404763fe8f9b460d7ab7a2cd720c89c6f9970b82226f1a4dc3f134ecd74fef93b5135adf6a806aac6368a5d8bbfdbb7ceb886805d3c735d1854506c41f73a6e18a62183aa2b6cf6a062272d1ff1434dd68ea869ef9feb8f11420afb5a3dc5fe16895fb1057f4f5901aa075af6ea641261a164642d18033f530d2a0bc8c497f7c6de320eaa376e583db709678b91b6752cd20f75f0976dca9b63212f89097952092e0cb5620ed17400470a32ca24281c978549e8ab973f05cfe52031e7b26c8a13ef1694d39005f51306ec3076caf358cebffa9330e9d5827afd319b1c9f5df1218b926cbb68cae57e988e435390728f0774d7ba9b1428e417ac98b95223be68dd9bdf4af0683340175c608d21daa53f1dff4c4e5f8b77375ec879f54c1563d99acdecdcb081aadf23467a1c946018940e60468aaa64d29b94efe5f7f44a4fc28471a74fa7af2c602adbc7333b15692ef53071df8a80a61758160f125f893f8c533b0e28101a5260b2b9030d9eb9b5a96d73a3d2de1a335065f79eb7047668ae15cd0465f7c6a39c89423dc85f1cddbe338b213cab364b1c559a6738c8a62cd3584d4bb8a10f481a03a2d6b61cb3aef6e3e9571cc5b51c960865538cb08d14348a2297b25eba4759aa4b7ed3f9bb4643abfacde52a03148cd60fec659ce5e78629db8eb39c83d772c0fd6c75d0607229a6e456745042216dfd082693e22ca04a69dc97422db0df56885555d1f1665c9a16540cf94a94dc7c1f800e9fea26517bad3287c24f027b6f21173f609ffe05c7e910f2b7a97bcd87a60a1d0124567e84d25f6b3e9176808977db687427f764f5b653f2ab928edc8ed739fefd86d2ae3d237b606ad93ef18dc2d242e64328159f15c3e3305f11cf3e9fd5f7d0728da2e0faa3119a8ae4b4f996f0552a66d02e2766ac4d51926b13bbe0d9be8fcf998af654650edb58183ceb7e8cb7872a0bf3f351f0b72b489c9e696c0e9e20f3d2b1c580439a5c8c050e2e400fb04a67149f75e5fe96c4da51f99a56d44737a881a30d11ddf9682c986b4243ef7777f7535b145829418f5b0a4e72e5f21cf57f49c27b47b399c87331b631b5073af0b81a3947dfa3c532e96cb6af3bb8873d846df070893ce8d0994089ff830bb0756add7f102b97d5c8ac1484f66c62b25c0fedef27438b8dbe2064614c10245d7091a6d585f9ba09f652ca5a98260084baa7e6604291859ee313d5def3db37b710c83c01cc3c7fc9cfe6407650463cc78efbb6f1b05d02a093b209e0e28519e29c409b11a151413dcc0f6d7049e98ce84974b6a2b2a90dfbf500cedb4e87b81ce99528b87026d634996c0e3f95017d9f17105998472e5018c745aafd51126f1c3cdab97c1f3924167876bf657425eec6b4c0cfc2b542fa548e8b7dfe82ec949ca654764fe698430aa4ae77a4b0dcbb18302e1426b351a3e1f29e93245225bcb839a92e40a6649ec06f7d9fd7bea70883fb7dcc5ec37a676613ed30c660eaaa9c70e8caa1ac6b472212e3addd600f7f614d6b426398ebba5b724c839755e3d8e882cc7217960baa0fedf041d25e4446c84f9d31f14f52910c37b73210e2ed8bd28620f47086969e8ee987f051fe73d9d7913729a7af0eb43208c261bfa77785ad577d017eead15fca4a1f8f8186fc921b16e2bf1ff400bc8fcf328fe6f82542010040d9bc5906aba99e73ed4db27876a593cc4365dbfb87311dd85d8bf2674453e23f35f8be1b119077d904d99d271a3f8eba8d9a76b24ace915d2bb90c647b093d94eef72951905bf6e9af39ef5cab145c3fdf6c944ba72e62bcdb53133d9432324c221778a408cf2a8f3d0c8060b3edac0c5ae3d0ea0eeb5c748bbe17ce5742fb000d4244b2012c3075e6db2d3531e235029bd7c37a54af5eab4ef0214f76f758a0b656cbc23d49a67c9af67d4800ce67dc8efd5f59a572731fb68387558f377059d689c0e317c3f5a47dd15cab74b966e42164f9b38f7f183a01efd4fa245f327eb639c346d47cee2d57581c1a29e1ad456c38c2765f0deabe70cba1bb5a02acbdc84519be1aa2d2899d181d08aa0ca8e6b11c4deea58ebd7452d118ea2f977dcfde1f925bb557275e4ebdd23f2ed35f9930e645b0bbb54271b9f75eb719b67019dc3eebc7f016cdfecd7592994cc47de437a190275d855cb5c4edb1977994b984e85f937a80308a60ec606490dcab529bd46945d8ccd004d58c8e1eff7cf0c855887a1cf50077521be9ffe3f6851c03cad2b2953f168fb7be6479b7c1d1d836bb4272601684f94dc64fffdcdc57b7157cc779b86fa42fd84990ed1c39f03a77862d2561ee1a14e002e7752a8fe98ab53cb899f428493bb1267adecc0737f5922195cdd030e59252c61761ef546b71ba84e25f258d9256c961b4ad4bf4f2bcae2f5cf2447c764d0e3c80cf1fe87399afeeaf0797baba526a04aa800598eb302dad6737b2dc6d8f06adc64144f2c1c0de97778d1e469dbe19890de62567dc865061182bc7a57af5c4d1f340e3f0c230993f39d04fa847bf594de5b59ad49a4d0557a080b84bd0ec094a037756383d0d510ceac44b1abb9e18e7fcded7b8e4beea88848284576934b919bf19b5392f0bbb45f00f3c67c391c48dc4e6545effb2a0f2b1fc14259b0d7966e843d662d62e081627e6ce0734f7a62929533d711e99f33784401dc13edeaf1546214dd017ac46d269fe1f60d976897bc10f3381d2d49ab28efd5c055489b197f1a813fde97cf83df9694824e0343d91b638b1564bb42270ebae1152c738d3545831f54cb35a892d1cac4bf9eef95cb4c01824af2ff3f386787feabf7eb006d7e5f72b7a4242145f1260fb324b85c9189dab4b7952044f84d13ac3f2c37beb70d129f04f4979cbbc99ea9226a365a445ad94fc4e037efe5174538e5a5b1a48f665f2ce44d14333b673ee7f5dca9e505c1b1c6185cfbadd3f1c7d100061d2fc6795df0e068c44582b7eda43300cbba673010dd0deefaf258774ebc72c7e819081f3577fa1137da6e8a4521361baf7c33e44a9db4ff79fb2e075bb614e47cf6882998df40a1c6135d7a0ca28ea9143a42b936510bac0dff1cf4c86f31fd83b82637ba4f5c89de69f6d75143c62851c381601b969e5d620284aa0597fdd2e2dfa8d919305190d5130e9ea941db582af827431746bf5772ad0a6528e9a660edf0c4439eaa80e29d530ac106c9833fb2fe671b6a1fe536fe463ba2ce291d0c4ae4bd08a7cffa6fb0c8931d3f6c856498cdda02e2d1ef2fbe79918beee671863a1923514bd7d7fd7a36dad691c0e48bcb52ef3766b9ba9750ee09afe26caececd14c26ad601f23569e5244bc2ac3adce8b5c0a4dbb36da8ceca56047367fce35d19da9b3f50ea30f78ee5f57b4840eebd7df76479e3c19ee28c547795c9", 0x1000, 0xfffffffffffffff9) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="199b057fa3109719e78dee21556c48d217c07f002d3f108a404aa41fe81147c610b8a5ceb31cb28b4177d241508ff57bef0978255b756cedd8710bdf1acfe68534d16cc4152cfea1018487521a36285560460193a5eaf99cc571f08951757d7fef013ee85fa55faeb5bce1f1d06f41156f13be0f149b134683b3e6279767732936febc8f4019022105b3b4d3f23e9086a5d47d05604d42ff2c95a6ccc63ff7c31c901d", @ANYRESHEX=0x0, @ANYBLOB=',uid<', @ANYRESDEC=0x0, @ANYBLOB=',obj_user=,-),\x00']) 18:04:03 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x2a, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:03 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x23, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2558.280348][T32340] FAULT_INJECTION: forcing a failure. [ 2558.280348][T32340] name failslab, interval 1, probability 0, space 0, times 0 [ 2558.497979][T32340] CPU: 0 PID: 32340 Comm: syz-executor.0 Not tainted 5.6.0-rc1-syzkaller #0 [ 2558.506962][T32340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2558.517044][T32340] Call Trace: [ 2558.520361][T32340] dump_stack+0x197/0x210 [ 2558.524731][T32340] should_fail.cold+0x5/0xd [ 2558.529272][T32340] ? fault_create_debugfs_attr+0x140/0x140 [ 2558.535109][T32340] ? ___might_sleep+0x163/0x2c0 [ 2558.540437][T32340] __should_failslab+0xb7/0x100 [ 2558.545583][T32340] should_failslab+0x9/0x14 [ 2558.550121][T32340] __kmalloc+0x2e0/0x770 [ 2558.554406][T32340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2558.560679][T32340] ? d_absolute_path+0x11b/0x170 [ 2558.565637][T32340] ? __d_path+0x140/0x140 [ 2558.570006][T32340] ? tomoyo_encode2.part.0+0xf5/0x400 [ 2558.575660][T32340] tomoyo_encode2.part.0+0xf5/0x400 [ 2558.581865][T32340] tomoyo_encode+0x2b/0x50 [ 2558.586470][T32340] tomoyo_realpath_from_path+0x19c/0x660 [ 2558.592155][T32340] tomoyo_path_number_perm+0x1dd/0x520 18:04:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x30, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:04 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) [ 2558.597642][T32340] ? tomoyo_path_number_perm+0x193/0x520 [ 2558.603308][T32340] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2558.609318][T32340] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2558.615520][T32340] ? ___might_sleep+0x163/0x2c0 [ 2558.620444][T32340] ? selinux_file_mprotect+0x620/0x620 [ 2558.626279][T32340] ? __fget_files+0x359/0x520 [ 2558.630996][T32340] ? ksys_dup3+0x3e0/0x3e0 [ 2558.635458][T32340] tomoyo_file_ioctl+0x23/0x30 [ 2558.640501][T32340] security_file_ioctl+0x77/0xc0 18:04:04 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2558.645487][T32340] ksys_ioctl+0x56/0x180 [ 2558.649789][T32340] __x64_sys_ioctl+0x73/0xb0 [ 2558.654433][T32340] do_syscall_64+0xfa/0x790 [ 2558.658972][T32340] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2558.664879][T32340] RIP: 0033:0x45b227 [ 2558.668791][T32340] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2558.688704][T32340] RSP: 002b:00007febdf4b5a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 18:04:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x36, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 2558.697315][T32340] RAX: ffffffffffffffda RBX: 00007febdf4b66d4 RCX: 000000000045b227 [ 2558.705539][T32340] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2558.713691][T32340] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 2558.721870][T32340] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 2558.729957][T32340] R13: 0000000000000bab R14: 00000000004cc868 R15: 0000000000000013 18:04:04 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$rose(r1, &(0x7f0000000000)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x1, [@bcast, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default]}, 0x40) syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f00000000c0)={[{@gid={'gid'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'obj_user'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x39, 0x30, 0x35, 0x66, 0x62, 0x33, 0x65], 0x2d, [0x62, 0x31, 0x39, 0x33], 0x2d, [0x36, 0x35, 0x61, 0x62], 0x2d, [0x36, 0x30, 0x63, 0x36], 0x2d, [0x38, 0x34, 0x62, 0x61, 0x63, 0x61, 0x38, 0x64]}}}]}) 18:04:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc8, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 2559.004671][T32340] ERROR: Out of memory at tomoyo_realpath_from_path. 18:04:04 executing program 0 (fault-call:0 fault-nth:20): syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:04 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:04 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2559.173485][T32581] jfs: Unrecognized mount option "smackfstransmute=obj_user" or missing value 18:04:04 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:05 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:05 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x28, 0x3, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040), 0x0, 0x5}, {&(0x7f0000000080)="d1b58a1495a5520c4ee761cd88f2ab9a027428f737237cb046beca3fcf825445b32d62f2636c56e8d1e15c674205800d219d62f21ba750760c0464bdbab6feccb52603d7abceb3dfb5a0d42b1ac2dae6a4bd1aa5dbaa3d8222892e69d942ffb539e36bb562077db3facd68d70c50b745b66683474f17f7d911fccf19ab623ad45630be02dd46d640136769fcdf4650cd929b8fad893e6fbf659defb1509f9ee2cec1f55515fd6549d98467e0e50ef78ad063", 0xb2, 0x9}, {&(0x7f0000000140)="9bf20884422a9418555d257a37be256cff6f1693ff03a24a4b98e6ea0051f4b97c06076ce0143098165e9f6834ce57ed67ec7544c2d6fc7e12b2e921ed1f6bf7a6e7492e97a5b269bbb2c36cf4845deb88bed1", 0x53, 0x9}], 0x0, &(0x7f00000002c0)={[{@gid={'gid'}}], [{@uid_lt={'uid<', r1}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:05 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:05 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2559.666098][ T347] jfs: Unrecognized mount option "uid<00000000000000003327" or missing value 18:04:05 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xca, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:05 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:05 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:05 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:05 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x17, 0xa, 0x5) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="000000ea3c", @ANYRESDEC=0x0, @ANYBLOB="2c1bf1f16100"]) 18:04:05 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:05 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcb, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:05 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:05 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:06 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:06 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:06 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="49b9b440f8048b7dfe24271b82091228c4e1a30e514d724896d05e61fd24dd2a49403efed8279d0cfbe06a26689f2f4bb269d6eee8a3138da45abf808fed6824612b70cca356f6cc5dffff56731870a8e7c23f1cc0ee44b4f18440c5bc96fc05c007984038037cc3b53d7c039d166ea4814482d39501f7fac1bc573eb93cd32b3c65bd59ea35d160003e4a5d6fefe358783182721fa7ffbfea87d4c4de706b41919dfeccad846bba7d08ac6de26aea34075177a67eeb82fd18", @ANYRESDEC=0x0, @ANYBLOB=',obj_user=,-),\x00']) 18:04:06 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:06 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:06 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:06 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:06 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:06 executing program 1: r0 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000000)={@none, 0x81, 0x9, 0x6}) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',uid<', @ANYRESDEC=0x0, @ANYBLOB="2c6f626a5f75724000000000000000449c65ff768660026ea7774a799a89752429136e27df62988fd30860938b80902090adfeeb4938fb8c2b4ab21f85ceae604f156b926a123985029b1fe6c5c0ce74b3fe453f6ada9d78b03f31cb4b5c24b1f009a3dd173ed5331cbe6ea47ab6cd9f24da0718c14c7cd5466e5e0762224e4756b32b67a01ee8e3ec5893c4350438edc320f38b579c05831781b3ca1945"]) getpid() 18:04:06 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcf, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:06 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:06 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:06 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:06 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:06 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xd0, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:06 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:07 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000040)={[{@umask={'umask'}}], [{@subj_type={'subj_type', 0x3d, '&osix_acl_accesscpusetsystem\x00'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:07 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:07 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x10d, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:07 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xd1, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:07 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:07 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:07 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000000)={0x6, 'sit0\x00', {}, 0x5}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:07 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:07 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:07 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xd2, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:07 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:07 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:07 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x480, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:07 executing program 1: r0 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000000)={0x7, 0x1, 'client0\x00', 0x1, "fdac14f229c04e8a", "9820a0bf3e07afe22aa79e799706ac5d8deb2d6f8f62243e47140ff349505b26", 0x9, 0x5}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',uid<', @ANYRESDEC=0x0, @ANYBLOB='\x00']) 18:04:07 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xd3, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:07 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:07 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:08 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:08 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:08 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) [ 2562.604906][ T1657] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:08 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x23, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:08 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:08 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xd4, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:08 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:08 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:08 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x800, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',uid<', @ANYRESDEC=0x0, @ANYBLOB="000000001a0000000000ffff000000"]) 18:04:08 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xd01, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:08 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:08 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:08 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:08 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:09 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x8004, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:09 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0xa00400, &(0x7f00000000c0)={[{@mode={'mode', 0x3d, 0x254}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x3}}], [{@dont_measure='dont_measure'}, {@fsname={'fsname', 0x3d, '-[%'}}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x100, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000300)=0x1, 0x4) ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0x28, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8}, @GTPA_TID={0xc, 0x3, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x8001}, 0x4000800) syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x2502440, &(0x7f0000000240)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',measure,o#GPLvboxnet1,appraise_ty_appraise,fsuuid=PCbA771d-2ed6-64b9-bf4f-c13fb\\f2,fsname=dont_measure,mask=MAY_EXEC,appraise,\x00']) r4 = syz_open_dev$vbi(&(0x7f0000000340)='/dev/vbi#\x00', 0x2, 0x2) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000380)) 18:04:09 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:09 executing program 3: socket$inet6(0xa, 0x3, 0x3a) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:09 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xff00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:09 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:09 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:09 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x1000000, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:09 executing program 3: socket$inet6(0xa, 0x3, 0x3a) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:09 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:09 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:09 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:09 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x100, 0x0) pwrite64(r0, &(0x7f0000000040)="c5c76662f25d032d0b27b87b94c9567c2e343c0a94a9de39d831533390c91639cb1c6a5e2991e1e4d01f6684cfbb5cd56e265f8f07", 0x35, 0x100000000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:09 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:09 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:09 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xc00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:09 executing program 3: socket$inet6(0xa, 0x3, 0x3a) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:10 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:10 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:10 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) 18:04:10 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000000c0)={0x9b0000, 0x8, 0x3, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9909e1, 0x500}}) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000100)={0x7, 0x6, 0xd9fd, 0x81, 0x4, 0x7, 0xfffa}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x29, 0x5, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1f2d10c8e0b060a47e57626581acde", @ANYRESHEX=0x0, @ANYBLOB=',uid<', @ANYRESDEC=0x0, @ANYBLOB=',obj_user=,-),\x00']) 18:04:10 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:10 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) [ 2564.788353][ T2720] jfs: Unrecognized mount option "-Èà°`¤~Wbe¬Þ0x0000000000000000" or missing value 18:04:10 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:10 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:10 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:10 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) 18:04:10 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:10 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SOUND_OLD_MIXER_INFO(r1, 0x80304d65, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:10 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:10 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x5, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:11 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x113e, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:11 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:11 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:11 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:11 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:11 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) read$FUSE(r1, &(0x7f0000000240), 0x1000) 18:04:11 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:11 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:11 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:11 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xd010000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2565.917279][ T3292] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:11 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1f00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:11 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:11 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x80040000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:11 executing program 1: r0 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240)='batadv\x00') r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f00000004c0)={0x0, 0x0, 0x2013, 0x1f, 0x1, {0x100, 0x4}}) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000580)={0xa10000, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000540)={0x990a5e, 0x5742, [], @p_u32=&(0x7f0000000500)=0x8000}}) ioctl$RNDADDTOENTCNT(r10, 0x40045201, &(0x7f00000005c0)=0x2) connect$pptp(r9, &(0x7f0000000480)={0x18, 0x2, {0x3, @local}}, 0x1e) r11 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockopt$inet6_opts(r11, 0x29, 0x39, &(0x7f0000000380)=""/149, &(0x7f0000000440)=0x95) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r13}]}}}, @IFLA_MASTER={0x8, 0x4, r6}]}, 0x40}}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r2, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x5c, r3, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8001}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x24008000}, 0x4000040) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@v2={0x5, 0x1, 0x13, 0x7, 0xe6, "79aeb0a53cfb10e03274f4d40d0375e60a01e24320d767784fcfdbff6ed8f806635ff8f837ad3665dd7771a5614d8d5a98884247f621c5bf4f31f9638d11fa9c067f330231186893f0df4970316b98eecb6f5d233bc810698716fa2ce5cf496d3c0955b1cbb5c452557a01d7a2b87409a6a2e8fc6f05e1f920fba232730d8eb4692c4ca568b7d1207405fb1bb07b9c64ea16705d31faa356172a5d89d223d2c3b37661664042a4bcfc3ab63e19b5a3ac9639bc447c309ecefeb069f972035d41e7693745d9457fa5b3a728115f88eb2c426604312ef2f6cb58a029378b545c18052f84da6a58"}, 0xef, 0x1) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:11 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:11 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:12 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:12 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0xfff, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:12 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x148, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:12 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:12 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:12 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1, 0x2}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:12 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xff000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:12 executing program 1: r0 = syz_open_procfs(0x0, 0x0) write(r0, &(0x7f0000000000)="2b928e2b1c4801e7fef3ccaefba382c6334ced6da0a66e0a061b719c5f7d8ce893dc03c41e9ce573b527027af93df61e84b15a30257b033034e2845b81d828ccf67c70e3022d0b056bb6181822668a5eb2f49cf456f80c347e2ee1602d82d5b9f5f76ff08f93c372b979495d9a33f8782a22123fc38016303e61f70257881c4372005da7d699212e1c36e988a5d983169932b1ec2dfded87b9ee0a58f67485880e7a8d2114aa9b0843f6cbde43477118094c0913ec5fff095b5b26ce9ee2f88f2abac8efa3", 0xc5) open$dir(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0xe6, "82525eda419f0740ec3e23f2617841db7551eb3c21b5edb52135e71a18ba102d05865baf497ad38dee63628b4057e01f4fc9920c79761717fc23d8ddaacbf0a1a4a6925552a72d0b87ea36e6a5de475535d8e6e939d03bd3467e0eefd803b4dc0536af23f5d414c9ec9752f3c48f22a359d2d200cddb76387a5587442d0dc7b5e0c3ef5a3876a1cf28a52776feeac2b5ba9c28149e2cda51ec551e0927951331bba1494eb7add8c04bfc911ab0df043f33eb97589ee9e3b0250cf29cd8372adc1d7eb30b015514ad98bec24cd9d9b4ae35feb9f35a317147461326f667e05c11d902969b545f"}, &(0x7f0000000100)=0x10a) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:12 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:12 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:12 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:12 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:12 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x2, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:12 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:12 executing program 1: r0 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) open(&(0x7f0000000040)='./file0\x00', 0x2001, 0x10) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000000), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:13 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:13 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x1007]}, 0x5c) 18:04:13 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2300, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:13 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:13 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:13 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) getpeername$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) 18:04:13 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:13 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1]}, 0x5c) 18:04:13 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3e11, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:13 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:13 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x7, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5]}, 0x5c) 18:04:13 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2568.175586][ T4440] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:13 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:13 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:14 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:14 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',uid<', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 18:04:14 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x7, 0x3, 0x9, 0x9]}, 0x5c) 18:04:14 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:14 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:14 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:14 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:14 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:14 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x7, 0x3, 0x9]}, 0x5c) 18:04:14 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:14 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:14 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:14 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:14 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:14 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x7, 0x3]}, 0x5c) 18:04:14 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:15 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev, 0x1000000}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:15 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',uid<', @ANYRESDEC=0x0, @ANYBLOB="2c6f626a5e107365723d2c2d292c00"]) 18:04:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x7]}, 0x5c) 18:04:15 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:15 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:15 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:15 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:15 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:15 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000367fe4)=""/91, 0x275) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffffffffffffe, 0x0, &(0x7f0000001400), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYRESOCT=r0, @ANYRESDEC=0x0, @ANYBLOB="2c6f626a627573655dd45ac5752cb9f875413d2c2d292c0072fd09a7e13ce575aa321f69157e40b0a62d96589668b0531c59bb345c2f016ab2f1ade8e9fbbac7e3a36f82b4b06d1e896b828de39614cc0761c77b96c23c7d"]) 18:04:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:15 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:15 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xd01000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:15 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:15 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',uad<', @ANYRESDEC=0x0, @ANYBLOB=',obj_user=,-),\x00']) 18:04:15 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:16 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) r1 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) move_mount(r3, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00', 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0xb, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:16 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:16 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x8004000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:16 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:16 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x1000000, @mcast1}}, 0x5c) 18:04:16 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0xc080}, 0x1) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:16 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2570.798903][ T5561] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:16 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfcfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:16 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xc00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:16 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:16 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) r1 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) move_mount(r3, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00', 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0xb, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:16 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:16 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x0}}}, 0x5c) 18:04:16 executing program 1: r0 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) bind$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x20, @mcast1, 0x1}, 0x20) 18:04:17 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xff00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2571.412646][ T5904] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:17 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) r1 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) move_mount(r3, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00', 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0xb, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) [ 2571.577158][ T5974] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:17 executing program 1: r0 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000040)={0x10001, 0x4, 0x4, 0xe000, 0x9, {0x77359400}, {0x2, 0x1, 0x5, 0x20, 0x2, 0x1, "8fc4df8d"}, 0x24, 0x4, @userptr=0x1, 0x40, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_PCM_IOCTL_FORWARD(r3, 0x40084149, &(0x7f00000000c0)=0x5) mkdirat$cgroup(r0, &(0x7f0000000000)='syz1\x00', 0x1ff) 18:04:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:17 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:17 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:17 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:17 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x5, &(0x7f0000001400)=[{&(0x7f0000000000)="f3d93dfd03c32a9e9181c987da3b6a50a311871e99f3bfc03014ed9c51cf20f3f12a53cc6b1ca9213e38c041e03e71b9c1806b06508369a0c23941cd4d3bbf5d3f183b4b9b00eb239ab485c752d41e95e06e1cbeb17d37a0eebba4e7bdf71a7f7ca61d3f99c941632721f7ee26701b60423cae16ed42ec23b43e2bde824046f6ad3300f80e61c3f22655e15343ee352a0963956fc42f93793fb16324b5d64df538cce10800d23270f75d9c43a109d54c352e2dd72732fb1b8e9065773d820e3bedd9", 0xc2, 0x10001}, {&(0x7f0000000100)="bd33a6a023eb239fd99078b822db62423afb1e2cecdab061c336ef533595c781bc9760c9687d9b2552816c14c6e3fd7930c5256dd6271b49136a35dbd417520d7569c20b67101442bb9fed78de9e3885", 0x50, 0x1}, {&(0x7f0000000240)="1bf53ffcf1be9698e3b953a24b99b4728d17c338f18974bade477af4c8f6f6f50384326c28cc6909ddf046920f524220e461e571dc9b948c4f3722c244917a300260e0c53bb45ca289cbdf93e5279bf806f048bfd153aafd52312f9db873c68abb4371581cf9df9ce17e049a83b9f949a0ead1e8dc54fe84c50b4fb79e23bce66c8e441ddd3dee066cc86950b04a08d7321883fd672c683fbad2ffe94a30d015194614efd7981cd680a46addd471ed8f118f83c3008d9c2d8c", 0xb9, 0x200}, {&(0x7f0000000300)="5dfafd902767e0cd012773bab045b2abc9b4811ede331c40735a3230e3e9f6e67dd122ac8b10ce0687d0e3b06472c64a63297d5d105e0360e6063e8ae59ab1dbca17720dee65c8490da87e9b13ecc18f488ec60d2408d0b538a92654eac6fd926a8bd9d6699447a8d737f2ec9bfff74a0b35bfa22cf4dd52239f55022b801de82410106d1d5d142a738c12e8a2014e9b539f856cc8493fdb9a0086d751efc5710cf1e10f8c6a3e3270a0577af332900cc6daf9de32216a2fb9c3f8c2d134953ceabd0c7608844c17e06e4c7e", 0xcc, 0x400}, {&(0x7f0000000400)="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", 0x1000, 0x9}], 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@appraise='appraise'}]}) 18:04:17 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2572.089310][ T6140] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:17 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:17 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xff00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:17 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:17 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) r1 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) move_mount(r3, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00', 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:18 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x113e, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:18 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:18 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2572.668025][ T6480] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:18 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xff0f, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:18 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) r1 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) move_mount(r3, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00', 0x20) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:18 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:18 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:18 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1f00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:18 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:18 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:18 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2573.272311][ T6608] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:19 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:19 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:19 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:19 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:19 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 2573.657234][ T6731] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:19 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x27, 0xa326486fc09b94b3, 0x6) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x1f, 0x5, 0x0) getpeername(r4, &(0x7f0000000500)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000580)=0x80) r6 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000700)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(r5, &(0x7f00000007c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x70400c90}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="100025bd70010900002503"], 0x3}, 0x1, 0x0, 0x0, 0x20004400}, 0xb0f12da7ed8caacf) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r6, 0x4, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @rand_addr=0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x44001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4080010}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r6, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40801}, 0x4000a000) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xa0, r6, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:scanner_device_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_to_bridge\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_to_bond\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0xa0}, 0x1, 0x0, 0x0, 0x8010}, 0x20002001) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:19 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:19 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:19 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:19 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x10d, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2573.976380][ T6745] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:19 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:19 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:19 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2574.248795][ T6853] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:20 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x11) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:20 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:20 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2574.749046][ T7127] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:20 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x480, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:20 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:20 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2300, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:20 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:20 executing program 1: r0 = syz_open_procfs(0x0, 0x0) r1 = open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6769646b0f1dc838ab5daace88b3107f2dcb922610904e04c8171753300e080fbec6e3a90085f0c014e3fc01168a354ecd8ee2e7b308f325bdadc14fa398cc9792cf3f486d42bd7ede3084cae3dc0aa6f5e17494056e1da8b24b24cb00653796d442829380abb292207890d387af07d9b370b6036c46107a4853729e33effcf16db05ae58800000000789e8e96665dd4649aa7ce9a14971343d8f0f36f1e9df0d11403f2d48fcf442808b7723673756fff9f880000fb7054342d68a48c7268f24487a1d951ef9736bf34b784691987c2111c87499ab40ff6045eb5771e8e145276ab101db396a8d322ea3a4da90958908c10011acc", @ANYRES32=r0, @ANYBLOB=',uid<', @ANYRES16=r1, @ANYBLOB=',obj_user=,-),\x00']) 18:04:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 2575.125771][ T7310] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:20 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:20 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:21 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:21 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:21 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r3, 0x202002) keyctl$chown(0x4, r3, r1, r2) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x1000, &(0x7f0000001700)={[{@gid={'gid', 0x3d, r2}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:21 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3e11, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:21 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:21 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2575.768029][ T7541] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:21 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:21 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x0}}}, 0x5c) 18:04:21 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:21 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',uid<', @ANYRESDEC=0x0, @ANYBLOB=',o`j_user=,-),\x00']) 18:04:21 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:21 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:21 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2576.278569][ T7773] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:21 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:22 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) [ 2576.678656][ T7955] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:22 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:22 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:22 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x21, 0x3, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="78e10e666daba50660dbb17f0b643c000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',obj_user=,-),\x00']) 18:04:22 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xd01, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:22 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:22 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1, 0x1000000}}, 0x5c) [ 2576.993132][ T8080] jfs: Unrecognized mount option "gid=0x0000000000000000xáfm«¥`Û± d<" or missing value [ 2577.169336][ T8120] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:22 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xb000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:23 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:23 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGSID(r4, 0x5429, &(0x7f00000000c0)=0x0) syz_open_procfs(r5, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$RTC_IRQP_READ(r7, 0x8008700b, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="27c7aabef884602140", @ANYRESHEX=0x0, @ANYBLOB="3c242d82a5b1a63d", @ANYRESDEC=0x0, @ANYBLOB="2c6f626a5f757365723d2c2d292c0046bed14975b40adb4dc72816fb520c59d35b06286ba3122192d804ba02f1a53de0c5b8bc66327dbbcfa285a292"]) 18:04:23 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:23 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:23 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xc000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2577.812278][ T8447] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:23 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x8004, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:23 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:23 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:23 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4801, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:23 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:23 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x1000000]}, 0x5c) [ 2578.290772][ T8657] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:23 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000000)='eth0\x00', 0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000080), &(0x7f00000000c0)=0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x2, &(0x7f00000003c0)=ANY=[@ANYBLOB='nodiscard,dont_hash,fowner=', @ANYRESDEC=r3, @ANYBLOB="2c6f626a5f723d816678fd88b2262afc2b0ade00ffc048f93c3803caff1e7d6de261d245b7699f2ca411cb54004a16a1f8b03eb1651a7128c03c178731ba2beee4e23efa7b569b15819ab83d661e18f69ed59e7bbf7d4d7bc4e7bf5a09045c54c17d6c95d2dbaec15ef0723699d0be9032bcc71f63ac1cf2403ebabcd780a389872de977f934a684e82800366b14047f01855d851e2bb5fd0cc9c2fcb79417d8c2c6b3e0655555e3043e212155438581493a010f6acac8cba446c78a242635dc9150cb6d5fb138ae2f6a1cbb9700"/218, @ANYRESDEC=r5, @ANYBLOB="2c66756e633d46494c455f4d4d41502c7375626a5f747970653d24267b3a2d172c6673757569643d39313735306565382d666561362d026637332d646430382d33336435663935622c736d61636b6673666c6f6f723d402c00"]) 18:04:24 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:24 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:24 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:24 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2578.801679][ T8864] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:24 executing program 1: r0 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000100)={0x1f, 0x45, &(0x7f0000000080)="b244536f81f3e389ea43917d465f88a6ce49b6172c0503f1b9e710c8062d3b1c32e2059d251fea5f6e5e09dca50d9467f4ec8fa76b54996eabf13bf3527d51dd86e8f6e021"}) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000000)={[{@gid={'gid'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x37, 0x64, 0x66, 0x63, 0x38, 0x38, 0x33, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x61], 0x2d, [0x66, 0x61, 0x66, 0x35], 0x2d, [0x61, 0x62, 0x61, 0x63], 0x2d, [0x65, 0x33, 0x69, 0x63, 0x0, 0x32, 0x61, 0x32]}}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:24 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xff00, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:24 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x1000000]}, 0x5c) 18:04:24 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:24 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:24 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:24 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRESHEX=0x0, @ANYBLOB=',uid<', @ANYRESDEC=0x0, @ANYBLOB=',obj_user=,-),\x00']) 18:04:24 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 2579.422626][ T9131] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:25 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:25 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0)=0x4, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) [ 2579.678569][ T9143] jfs: Unrecognized mount option "gid=:F ”µ­rJXDÿ!§£RO›™×$w†" or missing value 18:04:25 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x1000000]}, 0x5c) 18:04:25 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:25 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x23000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:25 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:25 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:25 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/relabel\x00', 0x2, 0x0) socket(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x31800, &(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[], @ANYRESHEX, @ANYBLOB=',uid<', @ANYRESOCT, @ANYBLOB=',obj_user=,-),\x00']) [ 2580.160262][ T9344] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:25 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3e110000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:25 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:26 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:26 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1000000]}, 0x5c) 18:04:26 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2580.704081][ T9536] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:26 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc600, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:26 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:26 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:26 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 2581.078686][ T9715] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:26 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:26 executing program 1: syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_read_part_table(0x3324, 0x7, &(0x7f0000001580)=[{&(0x7f0000000000)="6a409012dc4726f17e565d3f5adafc6a35ff0fbc714ac45d6218eff3ebc8ed6577282ffed665e5e1225739df43577258bad06c4ffc8806b7e525281e1231c907a2ddecae207da7d83394c36b33e96c93ce5c786680ec3b5fead25ff914a0ec2653eb8451423d5925688933ecf2203b09b8e7b1803b5a7addffe7f01d4221c5294ea280c0cfc6e431b2051a6e2fffa78d8f7a7a8fd8c37387a502235aa28c4de9b7cd727521c238c6c8bfd84a6e725cc08fdb444e0c3cd7600c6a1303e00e01620fd158b1646df92542d3720bacf409114507c5454cf4076d3e5189b367a0f5e4333df1d42540cb62599e5b62a6a3a45657", 0xf1, 0x401}, {&(0x7f0000000240)="655f477b7caa2d10a5eccd063c9424f2a5b81a6fea587f106e1ae8c5aa1c9cfaa1433d1378bdb9cde9e99aff011170ab9fa1a22d2b90308c651739c5f98c575848331ac0fe6f3370b727a11d495cb63f3618be2d2250cfd7f3d7733a3b50b6c2499944d1c4f3485a54bd569380b62df791a8698c9a1cb5459a8e15194b3f535465d298c2ff9ae938c57895b9548bcd7a08648afa8fbd20abf35149802ea0152b166a248b22f798665c5105a8ac1a4a0dec7083fd28c59acf1c709cb6cd65880a375640f195f1ad053daa4eccbaa94722af8b40996729a4688ac0c31a4478", 0xde, 0x800}, {&(0x7f0000000340)="25c5b07ce83254083883e78418fcb8cfaa7c71792d4d90a79985c6e397c7ece7b437120b9d9131ec49589812cb3ac1fdd0c3a93f8a016e00e28f6b7873b7b9f526570875a4f2a509a10a79436d32c115446eb8f55ce4ec706bf391f4c6883d72270e094635f6cc18b1727e9d001840eefc8ef5085fceafbcd7601d88ff1f8d915feacf1e9a2bb9a61301a473403cf9f35717c5081af0e3cf1ceb7c7057f11244e44470f4fbfb6e968d33a92a0a1bb96b5588c1019b703ab1f6981a965301319b0d5a14cff1586234d8974a54901ef15411ccdd3e410897eca906011070237cb01f205fadf5dc36efbcf729777cfb4dd95e867904c9aaba90373ff2ac05c3b5cc24295a86a84bf67e97256621ba7d68becbb59e73f070d8562b932573d201b485421f9d33b2f4164f80e4f4393f5757c72c03434ee2fe9d9cff4d39a6142d4a935681281638af444172ed3c608185fcc1bb6ca4fd7c1130f69355711a385165fe071994f9c1bf3d8bcbce9935991de00ae1071c8fcd6d2baa7e10baf919ab455193e95bfc45f4f2a161907a8d73589e9dff79d294c9b6c8b347563eb7ecfdf6c6dc40b2c50a2b618f6ebe8da99ce8229fa9fc7d35ed8753c6dfc14e6929794e29227d29df4af8267ae80e5748b8a4d1098ee4cd4f0b410f247e71db1c1884664ba8cf2270bff7358e7e51708eab8cd9c14aae3679f934308a558f8feb7616e5869ed71b3259557834989bcaec3bc3e361c07672dab548602295024af244b216cf1b1cba471f0abae5439b16239b989c83a2b2bb5401177c2086d624e6ce30055d05d65110098b45bf4b8a8dd20e3dd2b31e1645425bb02cfb7894002c39c5d621876be88c2fd119697a7ada8a17f0210f7b7892c1475167d71192b131fc86049441f312ba20fe59740316228533dba915153c28e5fdb3f4d531cd08ee442d4dc5f408ef77876ec06abec19aace9ad133a3594360faaf69ccd8200b35432d95a49adb242b22cbaa004395d5e4e816a684bb7188589adf9b5feda05975667463531f35e03687bc4e7222622e51b591277bd636ed83d61a2c65279fbc1c77fbdd0bd06bba2317567cbbdbefeb999062f823a0e60d8b7a293066ecdb2311eee6d5ff1bbd4466333177d39b9df56db113506279bf85afc4fb7f763ec45ac87461748bba40260b03037073917af4da0e21b0964e37eda1bbbc31b7cff3d379396c409f6dc789dee8e512fc421dfb6baa9a283a2d725dfd9fd082745fda0edac8bcc76632f19ac44b55da1e7bb06cbf089544e30988542f4b8bd9b59c13cbc36b37e6eff973d53619441f467c36e2d897340ee093198056c89b86553bf30dcd2fd4fac1a53c98ef8cfe782689c1c354d7112e43c50ca410f2057651e15f35778fac6bbfb351315cb7da09b168e54920aae06e334abc5f3cd1e43782e7965d9d1184fd953fe1533e269c331351007a45eafa15d79b983f190b8c82eab7e0c68e3135559a4b7383f22b0c90dee7d25fbeac2bf76eed5892351a4423cfbab95fb6e5f7781aef7be691af3844575b45cd357131fd9936ada7b59e560c25cc8a79bc4b7c7a1a83bffb1347033f8b418c92a73577925c96c4f535237ee74c4c66bd1fa6cbf719ebe926cffe3b7ee6ae014c38844274f1816ea6dae5c327e27bee0ec99218eb15407e9964b80fe7de6e44f0fca7485318d16dd80ae12c13c6dfbc39a664f4a6276741a25353da321dfce99baf4c31f5f2793e68bd54936bf94fb4e4d31d376a7252f6284610e7acc683438788b53a3dcd0385ef8127e7275cde49742d737fccbd83d9a3d7a3cdfad37f01311c37f2c8a0ee83525ded90591b335c45bd6380aeb0b2bfc351d4a58cd6709dc5be94d7ba111bd3dc1ed1c65c8e7f4147b6330f7f06a4cd9f19f158b65631d90b05480d635e41ccffbcabcbad6bf7076245215e3dddf4e0c0bf0c1b01e815a8240a2f43902b00814b753c776a1c56649e718e0b66be19eb2b2876ab4282ea31d46e23072e70c97198ebbb6da1bdaaf8d9b0aa08de3f31b769b9ee6636b96d70b81cfb52bf394d3e205510e9c7b7c241be3a58f7e7b0d06b3cc0e0041865d4cb27e4409d2ec399b53f3233d64e81f80bb4646c039838e403f2b4133ea1e7a9ac63fd68622a63fab71573d1fa9d38da5f16f2c09c2a3740e8bbf8d5473d9393b1121b6172605fc714206c632a1336d67cce60f122c46ded8772df4c55b6e2dcf6a12cde91c463bd56d0b5675af76e25b605455b00876d724d2093f8eb77c573c861e2a6a142c9b2f3fa610e28ebadec8f762c9a4592a34fa50b1648eedefe7c715d5d4f4725d9762409cc3b8ef5c9c8dc36553f84ddebae94737681dd5641eeb6233a9d857a4416ac20457caa7b0d3c39f8ba65ab121dfca00338140fc4fd03782e4ae2a79214dcd96d080ffa8c0343d73d0389757d32f9484167584075093454e8e3b1fb448e85c590603fd74054cc91dacea047a71abcb0752d6da2bcfc93343448b6d10529979aeee8774b112dc5b876060653776ae2941bdd73c9c90b8ddb4bce3b13a4fb9528e3ad14f91e0d4fcd67870007a9c7a17977843695481010622c0a92e7154d9c4644c772a84ef697c1d9ce5439042769e5ace1ad04118ab1ad4eba8f98dd8ae351ce587b1048460ee7f5e562736ec6a366cb9e2ef90c5abf2dabae1f52e68126a1f2e8a6a1fa125ac23ec0ddfdf7d8893985de71c85576579e9adb2cf995f9bf8aa3553cde5bc593266c664a1c8c1f11a5c611ae32f0acd6474f40c7c8f963eaec6cbf03c17bcc0465bd5f99207586f59d98791311d2a1bb67d15c4719907db434bd8ddec26cdb7dd2d676ff18a96e69b0fe171b825a3a9691000dd5dec8708c459c309b0f5067f56ce4de41850036e0f144cd4ebe047eae8dc56168c58cc49902e93cc73b719b4d3c0594b612d48556d1e9c3a12d5ef2c877a1b8143ecb338ce0abab5a8517301bd4c6881e3b1ff9519efa57f6249ff8930bbf32307eacfede8f697eec4a3cebd9c8900f46a9d02e73af4aa39fb8a3dc0720f35757d2d325eac3c33ec8422fd2d77d8e9cc0d3c0c40899714f4e6d94d7190bef0d529261b52f59feed2969268b2c5ce3e5dbb4570836e01eac40b4a3cf9e051913078ce64f130c16c44a89d0ed2c4c63d9866a6c4918e602b5ade2cff83d51c30ca6cef9fbbb0f69c3f818dbab7de1bd10d125053f0237bb3f5b35145b81911d63fc796cb01a89f66ab1868f96649f5b65a8e7fcb5209f8db040500c63d023a7d775e399dd104df944c7dac14845db814ed6d5f8760cda6a417d3c44b5e0362fc7800a915a5af73219aaf1822b84a34651ffcb4977f4021e094e1771aa64501d7d591364a784307771a3175255b11911c585a7e98f92fa5cdd48b545bac71586db22fba56547574c6f9cbdb5f3997ea8035f01aa749f5257f9c400624044f3882183e6115d0a4d60f3e79d543c98e2da434666b9cbaadc4babe14af3d8386b07638eb94f4a6a053899bc890ab2b783ea8b96665389a5eeaa45cd56d4801ad7fa733c6cfb92eb1bdeb95797f51aba6c1290fa9e97833530eddb9c5d9f233a08bcea0a771eb4c9b59cf81db6faa781fe07578088888e65d0ab949db22365dda3d0232ea25bd7a19d5e9171cc1c00d99d7340f7fb6a9f7aa8b71c669a7c7ca01727c8687753bcbaca584903ea07b288b6bd2ed039690b0b590e5dabf52c28cc84a11c20c84bd5cd8032a918ae8f6717592e6f02695a45a8d90db63fa785f0d3768a8a8b027c72827c271418ba4092f6dcba4cfdf780fc47212afd9ceba07e6b4b26cc321a3527654afdb27eeb308e151b8b965ca3ef62ec04a567187795f73848250ac1e365985b045b37e62e26cda0d87a5e1d5ed7b2f9a4a8d842505511d3aadb425e699c3e5d691d6297fd29bc0d9964cb56fd20f43c6c5b1d26fc7f1e26996965335c53c6ed342e0744b2e8bb802dfe989e618f4594d861ddacc18698acab010ed466c7ab8a7ca4e61e7eaf5fb2318d669d9aeb64bdb442fc7431b459529c9a1a0fe1f715aee47cbf253235fa5e6d3808fd6db665e46609b37e18359943962aa9984ce9739501b3cfd42b9b90b827fa49f42d8d6c755b40830915126f8abf20a442ac466a93922dc59100ffcbcc64c551508388894cfcbda4405d7030d926944a479f51dbf3894ac5ff1f073521a19d26878b92292973444bc9f095a4de3298e4b9c14b73a36386587e7add47105a1dbab2ab72f882a7d193ed2be8fde337a39d59b2c42f0a36143585f853fe808bbe2a4408ee3b90a562e172fa3d7eaf95baf8a1684a3b41ad6042ba8b2907f100dcbfdbfd27fe9338d00f52389b112687818d41ddbbe94add621e56b7743e1c8726977537f07d8a34b2623cf30eba27acb4b9c3893dd6709c7daa84695c6eb5753d94b8a7652c568cb0091cb4657ff31b4732800c22702b815e276a78cfb7874afdbb3220cb5f4430965181f7916934984b18ec4ff52ef9c3ecb24f2525ebfd0e0018afad4bb1135aae84600d7dafe2f43d2dd8b4303343a535c18e580ff8e786457473b09a6d24f1d6e6cb1b47d3c9c2bdcdeec3615fb96c2c6cfa5967ad0e0c919b4e0416e44ca129c60ff46bb0bd9ad4a8cd2f1e0574b9cbfa5e2dbeefca9d74a194dabf1b403523a1212676bf39a747e044792043769e57e1ccb378528a2b3c179c80db364ff70478ca40826150260b9e93319572f2ee60b63d89064be990e5aedc2980a59de3a5a47eabc957e8e7c9850101764de6a7a74a6f66af1c539c680bb6f48d6a32cbb99496f37772f82eea60e11c7e5260748404cbf57fe59df1a3e5a40f51c7588d5f0ae8e1016c529859c221f9cc55cbf926b4d0215743aab1fed8b3d7b4a2e34cb050f3f37e88789728100a96c2ea959009d3b6a5f7dc0d1b0d2a9b8f1a24a95d58b3e9c3e1539f122fedb16d242f6ee8c1ab1256bbfffbb40cb1eb6c3fd6ab09ef25820cb8e26c2eb0d447846eaa866a76bac6ffc0381572fc352c45a86af2325e1c57ce5e98065ed7cc30e6a6a2949afb12c0386b9850d6cddf7bd6a249c6cada21e252685685131fe5e8d8047ea9c64f82f3979792bb7dd0ce4a062a281ad4824de21676e9738d3e3f61a0489adba2292bacc2aa59d397121d8def4d06f359891a44acd55ea21e850974012fcf07930e641fb00b7883d4deb66e190b118b3073e64d6706966d2f7ef5b35fe89c94ba9ba5b25d2f1df3892fdf0a1277468a8e6b63b7eeeb8ee05f7bb251e1be254f50e744ca406223fda62be0c77fb31967559926881c15fae7545d8d26ce0f35a5f774b32ca97b68ae8cdd620e8cbc7860054a43a2a3bfe08836dcf901d09b39aa97cc3e4aa7e8b5f06c475081834581f534fee6c8449fb33c42a0c4e96c88fc0037f3ec6457c7461e5bd34b7ccb43dba46b71b63e080c255b1e94aca2dd366bb5e327d47b4a0f665326be5de9ffcc412fc39c4f875f48452d90169ded580b9ed1e6ded07ba0f63186f83ec30a20bb98c00f534a521371d3f12b876686be32c3955b4b45ddccff5f89ee36119a4f476fc61c1bc8b492116b9e9f7371e7f38c0e0febf6a16f43a2e03752de5b1f43f586804a6f1a518ba51805bd0e30d070605dee31d8cada56fb3f1b485b22a6df5be0e0f8f57e4841c36a52e8171cfd35c2138dfb6a651c07f1b3ec9b39f18c789557b304f25da43e15de01085eff5bcae2786186ba1a74f9f76aa2771f90d0b6837e766ae8b021b920614d288c41e7547deb120f08b58cc020acce396d4c53f391224", 0x1000, 0x31}, {&(0x7f0000000100)="e3984b8a0fab2b47616941ce9f7f7d967c08018d2b3e1659508a9e1343c6b8503faf5e258aa52bba68e634f47875dc819c532d395c30dc13ff3269eda390c905ec46fa9b0c34023cb221372bdbbd2aacefaf33d3907f98e7f7d2da83613847299c41ef99ecde136059f0f604c24dcd96f5dbd88021ba6e28239d8c7d63d267d65923ffb6", 0x84}, {&(0x7f0000001340)="cfbd588af17ca9c102d7753b7674c2d77afb5ad5da051df23d6ae6383ff5d052e53ca573f319e852608474d5401d1a7cc229e6ee36b80ed4175153a125eaab4bad34c095720d75911d3117d06ccfa62095088d7ba1e3971728edbc2df5dbfb30093ed2e17790943b1aa6dd530bb2590c1a2bb07f12bc6940a53393719be2c18872bce69e335a0481165195ab80eb9c947dcda803eb660c260a41c5e7921d35351d9ea2cd7cc548c8937ea9f87aa8d46a7eefab3a068deaeaf5c81d345b", 0xbd, 0x1}, {&(0x7f0000001400)="863aa412afd9c77bba581501b7ed306f14f7badd07394bddcb643f867a79c76ab20f7be1ec5effda4c255166ea891426ce00d4b1593a0fd8db152b579ce17b42eac38ac50b6f0bee08bf3c82f5edfd6a4368e514a52e11cbef2bd29ea770f4f8b83c1fc2e6b46647fafc811a74fbf68e6b2a37678b", 0x75, 0x10001}, {&(0x7f0000001480)="2d5c1b1b6a031470ba57471690c305feb51c66561b7d97230ffaedf97c4c8f49f94201540e050de7fcccbc4dbf7f4d3fe40063e96067983bdfbd0ab103198c366a7a32b1d531c9faaec4c1c1bd0469cf9cf6232350c02f3ed8ae172293ec33f377d074e473188e41292b961e2051c823b3755641e4be0f712fc9e80501a06c88bc8fd1db522a2308edb3c3192bcbd49bc889591f852e225a040fdd2399e4a1376bc7ec1df848084550a52e560353c9403118aa626da06b9189b943335a46df606596c2222d0d0d891622d70e7f18fb2cab802f30bd25d2407248a029f6675eb318aa5af39bb9a424c7f8c2c10555ffdf", 0xf0, 0xa23}]) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:26 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x5c) 18:04:27 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:27 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:27 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2581.547179][ T9848] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:27 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x5c) 18:04:27 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:27 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x80, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000080)) ioctl$VIDIOC_G_AUDIO(0xffffffffffffffff, 0x80345621, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c75f5643c", @ANYRESDEC=0x0, @ANYBLOB=',obj_role=uid<,\x00']) 18:04:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:27 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2582.300808][T10055] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:28 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:28 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x5c) 18:04:28 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xff00, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:28 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x5e42ec8b, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:28 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000000)=0xe0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x9, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:28 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 2582.862993][T10197] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value [ 2582.872744][T10203] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:28 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:28 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x5c) 18:04:28 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xff0f, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:28 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:28 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x9, &(0x7f0000000540)=[{&(0x7f0000000000)="4fe54d0b44d4c34ade7a68a39fdd90557f9a44f310eff12d0ad982c4049002f866bc36ce419a861d511e5679d2f807cd", 0x30, 0x200}, {&(0x7f0000000040)="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", 0xfc, 0x6}, {&(0x7f0000000240)="2f6b2b8150a865d305758d2cacc4d3a1a85adcb43e95f5e3b3a030cdc9b2bae49bf00d1a2be10fb2a0d8a020d382cd727fef525cc28fb684f86f5cb713e0c9970bfe9ff554251bea77da31b62227ad37e212f4ef144cb20c08922b70c60d5147fc7e92557e96a4cf35d1c8b2daefcd2bba8bc4d9c4bfe2c8469a5c95fcb878b78f22596011c5bc39ad01ce60f244b50d576ea52955437cf3192130f80dd8ab5c57a336b7427ca601c6bdcf5598896dc30b47d90afecf9ef089f8e1389eec2d", 0xbf, 0x5}, {&(0x7f0000000140)="24d62596fe1378de9425efc7c93009ea3f6db2e996973d9f151483953001b1b94624bfe88b3430bb94f7eef08ee6f16d85f4b2d8ca347249008b03ec234a355a690035e82ee9e5606db0993235af69153bf535b7", 0x54, 0x7}, {&(0x7f0000000300)="318b2c998ba039b777ea0e47315659c22c458cb56fd51fa19106aaf95646d20382e7b919f95ef71f7e8daed66a5a9b8f13cb3ac857488d1bedb62df6b8be88e64c9b99761e2b54fd1e7213a26e0252f5ab8b9172794808205f3dada3eb4c9bb7d874cbd7419d3f5850063cbdf8055dc94ebe51cac1d5578b6b2d2d0c192235ac9389a6135bb4535a9369a8e1d6cd87d696266ebcafaae873cb0ceed899e0e5bd28b44b802afb01526f40b01614a3c42b9616d7d58e559f9ab2d7ac37627c23e9c060596eab9222e0", 0xc8, 0x80000000}, {&(0x7f0000000400)="a6d782a798", 0x5, 0x661e}, {&(0x7f0000000440)="ef4347a2a17858d333fb03e9d3e8c606414fc01e474769f884ed2cdd240e7d9bc4a361f831d87d9f1d6c2a30d8891bb43ddd3e3cc51c156e9518c2e105ba03ab7d57f6c27ae7fcdb6eb958", 0x4b, 0x7ff}, {&(0x7f00000004c0), 0x0, 0x100000000}, {&(0x7f0000000500)="8d298906bb941be32e2a4d02a91963f2c95a67e2c201d92e6b", 0x19, 0xff}], 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="f90000003c", @ANYRESDEC=0x0, @ANYBLOB=',obj_user=,-),\x00']) [ 2583.398403][T10440] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value [ 2583.515992][T10447] jfs: Unrecognized mount option "gid=0x0000000000000000ù" or missing value 18:04:29 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:29 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:29 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x3) 18:04:29 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x400000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000380)={0x71f, 0x6, 0x4, 0x70000, 0x1, {0x77359400}, {0x5, 0x2, 0x20, 0x2, 0x7, 0x3, "bd545872"}, 0x6, 0x4, @userptr=0x9, 0x1f, 0x0, 0xffffffffffffffff}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x20, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x69a3}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0xb8, r4, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x80}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x10001}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7ff}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x35}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6f3e}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x45c8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6bd56f26}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x81}, 0x4) syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4, &(0x7f0000000300)=[{&(0x7f0000000040)="0548a1829ef2c667bce685032fb6331dc90669eca404607fe0b93c7ee7dea6c49b708102790a63f3419baf043d688fcb33e685f6289c92c802a06812c9f0ec6fd3918ee9b69ceb9fab431019eb35da87a7", 0x51, 0x5}, {&(0x7f00000000c0)="04b7e4827b4c5dc19f93c84e45714068e2cc1434a1d60156af50c2f392726b1d8e8e8301a5bcb9336d628dd36ae271463089b30367cfed9e9f496edef0f60b40d457204df39d99b2f19c0c3ee73000dbaeb438eeca0289deb80b691001447838d5bddf3dcd78863ec2bc3b6afe311f246004ecc1f7de3c0522996dee9b64cfa5ba55e03c326e1db615ca87907b2648a1cc7ae76c79677543614e72c34e30b884e4143c63de8477221f2426a20c6bbe72c83be8ea180813423752e33af9bc1e1b65db5899a69eb885137492fa5f1e4d69a03ff7ea21d32a417b73e54dd9baa8a34b91a2ebc2356eed9481a5d7c0ea72e9546e", 0xf2}, {&(0x7f0000000240)="671b35fd11513ef93eadb8fbc103625e3ed04b4b74cf2766cfc4d25b", 0x1c, 0x4a}, {&(0x7f0000000280)="6d42bb520dc44bb57ac58245669ac920c80bb840652f380739dd1c2ec3e7411675932650681132921ff24576cc1677e13406540139e43df031e5a135e3aedf5f89d40eaab722c2b2c9902008cc885849ad70bcc3eabd62dcf62102651d349cd6aebe41cc2f1c9980faf042ffd7aab4b7", 0x70, 0x849}], 0x0, &(0x7f0000000000)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user'}}]}) [ 2583.911470][T10727] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5b) 18:04:29 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:29 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x200003dc) 18:04:29 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x2b, 0x2, 0xfd) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x280010, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:29 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2584.498331][T10959] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:30 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:30 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:30 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x4100) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10001, 0x10000) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000280)={0x9c0000, 0x5, 0x1000, r2, 0x0, &(0x7f0000000240)={0x9a0918, 0x7, [], @p_u32=&(0x7f0000000200)=0xdc}}) ioctl$VIDIOC_G_PARM(r4, 0xc0cc5615, &(0x7f0000000400)={0x5, @output={0x1000, 0x0, {0xc43}, 0xfffffffd, 0x800}}) ioctl$PPPIOCSPASS(r3, 0x40107447, &(0x7f0000000140)={0x9, &(0x7f00000000c0)=[{0xf5, 0x5a, 0x1, 0x6}, {0x0, 0x9, 0x3f, 0x5}, {0x957, 0xff, 0x6, 0x9}, {0x9, 0xbb, 0x3, 0xfff}, {0x5, 0xff, 0xcd, 0x5}, {0x6, 0x6, 0x1, 0x4}, {0x400, 0x1, 0x7, 0x6}, {0x800, 0x3, 0x7, 0x2}, {0x7, 0x9, 0xf6, 0x2}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$P9_RVERSION(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1500000065ffff0300000008003950322f30302e75"], 0x15) r7 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:30 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000040)={0xf000000, 0x9ecf, 0x2, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0xa10906, 0x597, [], @value64=0x8}}) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000080)={0x0, @reserved}) socket(0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000fee000/0x11000)=nil, 0x11000, 0x7, 0x10010, r0, 0x10000000) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="6a8dfccd", @ANYRESHEX=0x0, @ANYBLOB=',uid<', @ANYRESDEC=0x0, @ANYBLOB=',obj_user=,-),\x00']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknodat(r2, &(0x7f0000000b40)='./file0\x00', 0x10, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') ioctl$VIDIOC_G_EDID(0xffffffffffffffff, 0xc0285628, &(0x7f0000000b00)={0x0, 0x5, 0x5, [], &(0x7f0000000ac0)}) sendmsg$NL80211_CMD_GET_MPATH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x28, r6, 0x2468825185d9173d, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000a80)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000a40)={&(0x7f0000000280)={0x7bc, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY={0x4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xffff, 0x3}}, @NL80211_ATTR_SCAN_SUPP_RATES={0x308, 0x7d, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xad, 0x1, "8cfd84c3922fcb38241e8bfcf7268669e6ec4cd8e450369173248ba1b21a591e4484ec2fffb584dacb5c677d9d1bd2eaa4d8d964bf5c17cde30aa4b4bde97964ce4a514741decfd19ef598385d5cd7f11d942e1145550f799736418538839da0943c1692d7660468476a3155f643b5fc544498a3414b94e46dab4aa9536d35e875b9750af34a164cb8cc9ffb3ecd3055c3967001d297b9ce42a50c4753c2dcae4c82ede107ac8beec0"}, @NL80211_BAND_6GHZ={0x23, 0x3, "6a1326764bca551dea5bf7e155418002856e0ea3f760fa8014e7426d01aa8d"}, @NL80211_BAND_6GHZ={0xa4, 0x3, "94176a294c5a144d9e79bb33c86ec85cceb5989bc8306f57f86b70df573f3b25e8d649400783fdaf7be410870ee60fa77ac6bbb08f08ebdf7301b328e8919927439f0911706958be49c01eec620991259c1d595435749bf553d0f2896cbab25ae59e23dfe5c7941bbb2afddbb47b78a7599d5c50d3977b477931cf343c7a1477011099501a19691193a0b3ccb74c6096d6621185a2c4056b871c484bcfe1a55a"}, @NL80211_BAND_5GHZ={0x2e, 0x1, "c0513bed586834bff9eb2cce4681c2f50bc6ab5d66daf950808ae30f3176967e3b87e965ab58638e5a39"}, @NL80211_BAND_6GHZ={0xee, 0x3, "2a961491240f8718fc57634ccd4320cf61b12efffcb620b53a79567a28b6bd3a66cddbf866101e3d258bc556b1d34e6e3164b6ae8ba6c0f52126f07a437dcd72904c434d639d17528163bbf8b233890b9c7c48611340e24f944373cb07540858c0388b0c1b7c3baafa7c6a91f4c09e61484c69b32b96c1ebdb02844307e950775cdaf4814b59ebd5760b7a0a2bbe85e72c037eaca8e07cd637823e9f32b8583aac64cdb5f389f496ac9bb027c2af25f9ba6e74afdb5c31c13ea6a6cc49bd6ea5156038190a9ab9032545e70df484aa2e66b886e13a8cd0bb11a410d63f072d9aa75d6c0dd8fc410d24b8"}, @NL80211_BAND_60GHZ={0x6a, 0x2, "aac9af24c234254a97c268b3e0d06c2fb698e3c157c9ed92a0a08e61fe0f81e6706319b232b84b9eaad3bd67b515ae512557f5e4fb50fab8597bc4ea5f956208e3ba3a11e0dbc9944819d5dba2699fed697032e6044f3c31f6f4bdaa498623dabae30f20fcb0"}]}, @NL80211_ATTR_IE={0x48d, 0x2a, "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"}]}, 0x7bc}, 0x1, 0x0, 0x0, 0x400c0}, 0x4004084) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'wg1\x00'}, 0x18) 18:04:30 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1480000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:30 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x311f80, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/status\x00', 0x0, 0x0) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000540)='/dev/cachefiles\x00', 0x40080, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x7fffffff) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r7, 0x800448d3, &(0x7f0000000400)={@none, 0x690a, 0x5, 0x7, 0x8001, 0x8, "a887406f6877b565857b10bd973b95dd101ab6286deecb1ddb50dae473a06ef0e7fba1b189671422183ce7b71eee7b6c9397b99530199ce47a46ac9c9ef60a4f95319d8ca184c40520b860b2a8454e60948db46980566ad76ed30239672d7752c5a2b73a844648588bddc93a4c1d891bb3d8ba6fc3107432772a00abf3e76d1c"}) r13 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) read(r13, &(0x7f0000000340)=""/53, 0x35) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000100)={0xfffffff, 0x0, 0x8001, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9e0901, 0x8, [], @value=0x7}}) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="37000000382cbd68cb69c8ecff0f00020001000000000001040000020000000000000000"]}) r15 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @loopback}}, 0x5c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r14, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e23, 0xffff0001, @ipv4={[], [], @multicast2}, 0x7}}}, &(0x7f0000000000)=0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r16) setxattr$security_ima(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000300)=@ng={0x4, 0xd, "f42711dd1e727791b2e7cce3d9b132b4a94ddba6"}, 0x16, 0x3) ioctl$sock_SIOCINQ(r16, 0x541b, &(0x7f0000000080)) [ 2585.172599][T11202] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:30 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x8bec425e, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:31 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x1f, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) [ 2585.662104][T11411] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) [ 2585.739777][T11406] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:31 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2586.018861][T11546] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:31 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:31 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:31 executing program 1: r0 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r4, 0x202002) keyctl$chown(0x4, r4, r2, r3) geteuid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$NS_GET_OWNER_UID(r6, 0xb704, &(0x7f0000000300)=0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="712998ad06798b042f89ec16dcd9253cc391b3c7a9fe08d833c9918b0dfdc5aa", 0x20, 0x6}], 0x0, &(0x7f0000000280)={[{@quota='quota'}], [{@measure='measure'}, {@euid_eq={'euid', 0x3d, r7}}, {@context={'context', 0x3d, 'system_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x39, 0x64, 0x38, 0xc, 0x37, 0x36, 0x66], 0x2d, [0x39, 0x61, 0x33, 0x36], 0x2d, [0x35, 0x33, 0x62, 0x63], 0x2d, [0x66, 0x31, 0x33, 0x5], 0x2d, [0x39, 0x35, 0x28, 0x62, 0x33, 0x63, 0x36, 0x39]}}}]}) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x9, 0x1, 0x7, 0x8000}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r11 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r11, r10) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r10, &(0x7f0000000140)={0x3, 0x3, 0xfa00, {{0x6000000, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0xa, 0x0, 0x0, @local}, r12}}, 0x48) write$RDMA_USER_CM_CMD_DISCONNECT(r9, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r12}}, 0xc) 18:04:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:31 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:32 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:32 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400880, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="a89df4e004b0af51a2c73790bf218c4d2a7a4c8976cf3aca8b2e2abd07e3c2ec000000000000", @ANYRESHEX=0x0, @ANYBLOB=',<\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="4a6f626a5f757365723d2c2d292c00ac0483efa2b903deb23494323c6c698b5556037e84fc5491e0a550353b443f63fddfa13a292fbd377c61e34462732e64976a2e41e1c2b6a0cd23d7bb8cdbd81a3dbb9aa2ff54f6400ca6c866563895067c8ee9aacf3146abd2d3b4c540f6734d69eca0ef81d28de783de51330ef9d306ddc28eca73a4b257e95a63c4571fc8822ca8dbb4832e27995433ccd6ff37921c632d042bcbd25df7af58c5f1479303e6bd731d00"/194]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, 0xffffffffffffffff, &(0x7f0000000240)={0x2000}) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000380)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_REMOVE(r4, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, r5, 0x10, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x4814) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000480)=0x800, 0x4) [ 2586.684460][T11871] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:32 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2587.024923][T11922] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:32 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xf5ffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:32 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:32 executing program 1: r0 = syz_open_procfs(0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000040)=0xde, 0x4) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000000)={0x6, 0x4000}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x2, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="007c0000800000", @ANYRESHEX=0x0, @ANYBLOB=',uid<', @ANYRESDEC=0x0, @ANYBLOB=',obj_user=,-),\x00']) 18:04:32 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) [ 2587.419233][T12119] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:33 executing program 1: r0 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendto$ax25(r1, &(0x7f0000000100)="cf967327370e676fbd34ba63d936be554b0e6cf856586b3387f3bc7b3e29378ee5370006f0f47ffeb110aeca69e3a6c0af94fb1317c0fd59bf8ec96c8da16fa8743f6cb3bbb2d2406544402d0fe0e6095ab649a2e518f360fb40be7209838fa1d0c329c3acee8d5fbb6116a647e13ff720ba9550fc8005a783d574a545c57d3c77cdf54f0b02e7a8923e925a3a38e894decf3207fbf3d48e3a932ca0e1cfa5a15579", 0xa2, 0x50, &(0x7f0000000240)={{0x3, @default, 0x8}, [@null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) socket(0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x5, 0x3, 0xc, 0x1c, 0xb, 0x8, 0x1, 0x91}}) r2 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x6, 0x420080) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000080)={0x2, 0x1, [0xb9, 0x6, 0x100, 0x0, 0x5, 0x3, 0x6, 0x1]}) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:33 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:33 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2587.833289][T12338] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:33 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2588.259255][T12577] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:34 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:34 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x8000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:34 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfbffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:34 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f00000000c0)={0x980000, 0xd77, 0x9c46, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9b0001, 0xff, [], @ptr=0x6}}) ioctl$sock_SIOCDELDLCI(r5, 0x8981, &(0x7f0000000040)={'veth1_to_batadv\x00', 0x4}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000000)=0x1) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000240)=0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) io_setup(0x70, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r6, &(0x7f0000367fe4)=""/91, 0x275) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000300)="c6558af45712b736af4305695c185215f70af3bd85ef4d522fc0ddfec4087f1e0884f6efc27d2c902d57181c04ccb722af71fbbe0a92f44fd7520c53f91351f4f90b4a3f1fb02b0f7bf47c3e7b86d1bd3ef45b7a3f770edee37e201ce962af1f75fe169631c31f6661c72edfe6f2b5025e6f70fccb9fb6f8126044894d59eb6ee0865a4d1aa0b2354505e8f106c1026ce9d8b7b74b44aac67bbf1a29e614286cf99384df93b6670011a46f723cd3b81f5ca41e3f", 0xb4, 0xb0}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c7569f4c680743cf9c255257eb705e835d6bd3418ffc1fd7a5a014d285b2fbf04c3fc8e95f0b85e062370c07df43706fbc6da254e5eaa8946f5acdcdd31707eed00beb7fa990e44673a72c5d20000000000000008a5df21ae50228011e4e5181a48f5c81c961997def0410b1ae8", @ANYRESDEC=r6, @ANYBLOB="ac6f626a5f7d2c0008000000000000"]) 18:04:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:34 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2588.846077][T12736] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:34 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2589.049195][T12684] jfs: Unrecognized mount option "uiôÆ€t<ùÂU%~·è5Ö½4ÿÁýzZM([/¿ÃüŽ•ð¸^#pÀ}ô7ûÆÚ%N^ª‰Fõ¬ÜÝ1p~í" or missing value 18:04:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:35 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2589.480591][T12866] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:35 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x3c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:35 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:35 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xd010000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:35 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r3, 0x202002) keyctl$chown(0x4, r3, r1, r2) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid', 0x3d, r2}}]}) 18:04:35 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfdffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2590.002498][T13079] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:35 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) read$dsp(r1, &(0x7f0000000040)=""/242, 0xf2) get_thread_area(&(0x7f0000000000)={0x5b8b, 0x20001000, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1}) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:35 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:35 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:36 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xff000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:36 executing program 1: r0 = syz_open_procfs(0x0, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100)=0x4, 0x4) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x40482, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000000)=0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fanotify_init(0x0, 0x1000) write$binfmt_aout(r5, &(0x7f0000000340)={{0x107, 0xff, 0xf9, 0x33e, 0x3aa, 0x5, 0x6a, 0x5}, "7e394c77fbcc1744", [[], []]}, 0x228) r6 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_mreqn(r6, 0x0, 0x23, &(0x7f0000000140)={@multicast2, @initdev}, &(0x7f0000000240)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) ioctl$RTC_SET_TIME(r8, 0x4024700a, &(0x7f0000000040)={0x1d, 0xa, 0xd, 0x17, 0x0, 0xb6, 0x5, 0x11b}) [ 2590.573639][T13434] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:36 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xff0f0000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:36 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:36 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x80040000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:36 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffefffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:36 executing program 1: r0 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_EXPBUF(r2, 0xc0405610, &(0x7f0000000000)={0xc, 0x5, 0xfffffff9, 0x4000, r0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$XDP_UMEM_FILL_RING(r4, 0x11b, 0x5, &(0x7f0000000080)=0x20, 0x4) 18:04:36 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xb000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:36 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x4000, 0x0) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000480)='NLBL_MGMT\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000480)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100010a0}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x6c, r7, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @empty}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_DOMAIN={0x1c, 0x1, '/dev/infiniband/rdma_cm\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}]}, 0x6c}, 0x1, 0x0, 0x0, 0x1}, 0x810) sendmsg$NLBL_MGMT_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r7, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x4) sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100010a0}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x6c, r4, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @empty}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_DOMAIN={0x1c, 0x1, '/dev/infiniband/rdma_cm\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}]}, 0x6c}, 0x1, 0x0, 0x0, 0x1}, 0x810) sendmsg$NLBL_MGMT_C_PROTOCOLS(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="55268abcc6d98a4ce5832cbcca02d493136d953874246e1381a208ae1eca01ec4bbaff461aaec67f1bd5629f928c355a129d647224b4e5bb5672df8767b28fab5894dd913067ff7646", @ANYRES16=r4, @ANYBLOB="000427bd7000fcdbdf2507000000080004000300000008000800ac1414bb1400060000000000000000000000ffff7f000001"], 0x38}, 0x1, 0x0, 0x0, 0x40080}, 0x8000) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) 18:04:36 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:37 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:37 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xc000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:37 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',uid<', @ANYRESDEC=0x0, @ANYBLOB="2c6f856a5f75738826fa0f9d298997"]) 18:04:37 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x8}]}, 0x1c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, r4, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x6004}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0\x00'}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}]}, 0x58}, 0x1, 0x0, 0x0, 0x4009}, 0x40084) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:37 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:37 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:37 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2592.282518][T14294] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SOUND_MIXER_READ_RECSRC(r1, 0x80044dff, &(0x7f0000000000)) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x90000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev, 0x5}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', 0x0, 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:38 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:38 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x1a, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x4080, &(0x7f0000000000)=ANY=[@ANYBLOB='uid<', @ANYRESDEC=0x0, @ANYBLOB="246f626a5f7573657202282d292c009ce199e5ff26189232797a6d46ff406ca2ffe5fc0c0a0d7c2d89539d181eb74c13f9e79a24747a40fc05d597aa0d5b77fc8a1ccf68e6776696d6dcbb29293b59a6ca781e2d493663ab0277ff89a80dc78be6e2e8b6c1c36ca0e0be561e9cac831a0a6248f3f7bf13fe455cf02e51012d8f808cc5aa0c8b832624ec69"]) 18:04:38 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', 0x0, 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:38 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x440000, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 2592.968511][T14627] jfs: Unrecognized mount option "uid<00000000000000000000$obj_user(-)" or missing value 18:04:38 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:39 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', 0x0, 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:39 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) write(r2, &(0x7f0000000000)="12468589a7a0e4bd8a5d24a769d6ab3bc7ad07bcc1b675e411e46eb8726d940361e014c0fe17fa87d4ac1419bf10e0e7430c6216193444f12ce5aea6a358c11703319850c419920b630b6039bb0c925a79201f105a2a4a44054758acb32e2de0209684f0bcc11af2a3a606c0d3cb7a023f4a1837e1d75886b14d1a4a2807187064defa0ac11ec27b377c4433384c8077ddb0", 0x92) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) ioctl$SNDRV_PCM_IOCTL_FORWARD(r2, 0x40084149, &(0x7f00000000c0)=0x81) 18:04:39 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:39 executing program 1: r0 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4$alg(r2, 0x0, 0x0, 0x80000) sendfile(r0, r3, &(0x7f0000000000)=0x7, 0x100) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000100)=ANY=[]) 18:04:39 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:39 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f0000000000)) 18:04:39 executing program 1: open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:39 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @rand_addr="d629aac71c0cb7cb4d0d31acaac0f481"}, {0xa, 0x0, 0x3, @ipv4={[], [], @loopback}}, 0xffff, [0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x5c) [ 2593.933858][T15036] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:39 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:04:40 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:40 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffff97, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:40 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r4) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$KEYCTL_MOVE(0x1e, r6, r4, r5, 0x0) r7 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r7) r9 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r8) keyctl$KEYCTL_MOVE(0x1e, r9, r7, r8, 0x0) keyctl$search(0xa, r6, &(0x7f0000000540)='id_resolver\x00', &(0x7f0000000580)={'syz', 0x3}, r8) keyctl$revoke(0x3, r8) read(r3, &(0x7f0000367fe4)=""/91, 0x275) fcntl$dupfd(r2, 0x406, r3) 18:04:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:04:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000040)={0xa00000, 0x10000, 0xb767, r2, 0x0, &(0x7f0000000000)={0x9d0902, 0x2b4, [], @value64=0xffffffff}}) syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:40 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x23000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:40 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffff5, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:04:40 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000100)=@gcm_128={{0x304}, "1162f15e50e121d3", "028aa606391cf9968ab2ad36d6ec465f", "45529a1a", "1968c5a21d96868d"}, 0x28) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r4, 0x40086424, &(0x7f0000000040)={r7, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x7, 0x0, 0x0, 0x80000000]}, 0x5c) 18:04:40 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:40 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3e110000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:40 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:41 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xff000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:41 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="3a6d001a6261c58689c19ff8caed837ec63012c24bdf3562224600c69429870261b4cb751744e672ae6560067c9b777f81b8d4d873c73b6fb1b6e7b7625822ebf1ad17f353847b1e209cb61148dce774a96648aab56e636b58fa5341eb1a2f6b51828b81e8fa5c6692cf3563c875bae4839dd0cdd83db3ccec02d5", @ANYRESDEC=0x0, @ANYBLOB=',obj_user=,-),\x00']) 18:04:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:41 executing program 4: socket$inet6(0xa, 0x3, 0x3a) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x5c) 18:04:41 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffffb, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:41 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:41 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x2}}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x0, [0x0, 0x3, 0x1, 0x8, 0xc9]}, 0x5c) [ 2595.918432][T15870] jfs: Unrecognized mount option "gid=0x0000000000000000:m" or missing value [ 2595.940675][T15878] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000000)={0x8, [0x2, 0x3, 0x7, 0x200, 0x100000000, 0x3c69, 0x7fff, 0x7]}) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000f00f88)) msgsnd(r3, &(0x7f0000000200)={0x2}, 0x8, 0x0) msgctl$IPC_RMID(r3, 0x0) msgctl$MSG_INFO(r3, 0xc, &(0x7f00000000c0)=""/177) msgctl$MSG_STAT_ANY(r3, 0xd, &(0x7f0000000080)=""/112) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:41 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffffd, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:42 executing program 1: getpgrp(0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS64(r10, 0x4c05, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, r2, 0x0, 0xf, &(0x7f0000000000)='vmnet0vboxnet1\x00'}, 0x30) r11 = getpid() sched_setscheduler(r11, 0x5, &(0x7f0000000380)) r12 = getpid() r13 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x14ef, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r13, &(0x7f0000367fe4)=""/91, 0x275) preadv(r13, &(0x7f0000000140)=[{&(0x7f0000000080)=""/132, 0x84}], 0x1, 0x1f) sched_setscheduler(r12, 0x5, &(0x7f0000000340)) syz_open_procfs(0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r14 = socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2cb80a3209", @ANYRESDEC=0x0, @ANYBLOB=',obj_user=,-),\x00']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r14, 0x84, 0x8, &(0x7f0000000400), &(0x7f0000000440)=0x4) dup(r15) ioctl$FITRIM(r15, 0xc0185879, &(0x7f00000003c0)={0x80000000, 0x7, 0x8}) 18:04:42 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2596.557429][T16146] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value [ 2596.628704][T16105] jfs: Unrecognized mount option "¸ [ 2596.628704][T16105] 2 00000000000000000000" or missing value 18:04:42 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:42 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:42 executing program 1: r0 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x430002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e20, 0x3, @mcast2, 0x8}, @in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e22, 0x8000, @mcast1, 0x9}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e20, 0x49, @loopback, 0xc6}], 0xa4) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x40000, &(0x7f0000000000)=ANY=[@ANYBLOB='nointegrity,nodiscard,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c6f624f5f757365723d2c2d292c009f60f8"]) 18:04:42 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xffffffff, 0x460080) ioctl$VIDIOC_QUERYCTRL(r2, 0xc0445624, &(0x7f0000000040)={0x1, 0x102, "cf0a43df1b8f9031cd2e4fefe14e192c92c99e142de7719d6b01408ed55025c3", 0x1, 0x4ab82869, 0x0, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x80) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCNXCL(r2, 0x540d) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_DQBUF(r7, 0xc0585611, &(0x7f0000000200)={0x0, 0xb, 0x4, 0x1000000, 0x4, {0x0, 0x7530}, {0x1, 0xc, 0x9, 0x5a, 0x84, 0x4, "cd8a9001"}, 0x134b, 0x2, @userptr=0x3, 0x7, 0x0, r5}) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r9, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$MON_IOCX_MFETCH(r13, 0xc0109207, &(0x7f0000000480)={&(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x2}) r14 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r14, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x24, r10, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r11}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}]}, 0x24}}, 0x20000004) sendmsg$BATADV_CMD_GET_VLAN(r8, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB="49977b025834b000e74ba5863fb9f250000000", @ANYRES16=r10, @ANYBLOB="6fd927bd7000fddbdf251100000008003a00fcffffff0500300001000000080032000600000006002800000000000500350001000000080032000000000008003a000400000008000b00fc30ffff"], 0x54}, 0x1, 0x0, 0x0, 0x40000}, 0x800) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) readahead(r0, 0x81, 0x6df5cc4b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r15) ioctl$sock_inet_SIOCGIFBRDADDR(r15, 0x8919, &(0x7f00000001c0)={'macvlan1\x00', {0x2, 0x4e24, @multicast2}}) 18:04:42 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2597.135237][T16435] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}]}) 18:04:43 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:43 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000000)={0x2, 0x40}, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000000040)={0xa9e4, 0x6, 0x8, 0x200, 0xc, "bbf9ab2dccc6c8a6"}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:43 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:43 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) [ 2597.734670][T16662] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:43 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:43 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:43 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x5e42ec90, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:43 executing program 1: r0 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000140)=@routing={0x0, 0x2, 0x2, 0x0, 0x0, [@initdev={0xfe, 0x88, [], 0x0, 0x0}]}, 0x18) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:44 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r2, 0x3}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000000)={r2, 0x81}, 0x8) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:44 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_open_procfs(r1, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:44 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:44 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x8d, @dev, 0x46e}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffd7e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_S_FMT(r4, 0xc0d05605, &(0x7f0000000000)={0xc, @raw_data="66f2f16863eee66adb2ddadac5b90988ec2d7b68b187b2a7a15a216bd9398a2fb080fe79f007cb80fdb1757e94b4c99276e1266e3a34ad4c282197ffab59a47042fe694f5ae4176731c7ef50ea0e9a33b1bf27b56aa1cb593bfe89ac2736d367f841764f084df0b74d1388f189d225869f10a7788f6f25b0966bfd1f4e16da511e776e703409e82683bac071291901b8e6095b5d68fdff26cce23ffd89ec0d0589549fa2cdf5b0ae586cfffd7078c093d1c2a73c0c1208bb8e2529fb931ab89554019386d4d42a43"}) 18:04:44 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7ffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:44 executing program 3: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:45 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:45 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:45 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:45 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) write$P9_RVERSION(r2, &(0x7f0000000100)={0x15, 0x65, 0xffff, 0x10000, 0x8, '9P2000.L'}, 0x15) r3 = dup(r1) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r4, &(0x7f0000367fe4)=""/91, 0x275) perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x70, 0x2, 0x2, 0x7, 0x6, 0x0, 0xdde, 0x20100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0xc5c265bb5a7ba628, 0x8, 0xa61, 0x0, 0x1ff, 0x40, 0x4}, 0xffffffffffffffff, 0x6, r4, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:45 executing program 1: r0 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000000)={[{@nodiscard='nodiscard'}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000080)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x8001, &(0x7f0000000240)=""/219) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$sndseq(r6, &(0x7f0000000040)=[{0xf1, 0x3f, 0x8, 0x0, @tick=0xffff, {0x3, 0x2}, {0x2, 0x4}, @control={0x0, 0xcebc, 0x2}}, {0x1, 0x6, 0x7, 0x4, @tick=0x1, {0x40, 0x8}, {0x6}, @time}], 0x38) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000440)={0x7f, 0xe0, 0x2, 0x2, 0x6, 0x1, 0xf9, 0x0, 0x91, 0x4, 0x20, 0x2, 0x6, 0x1}, 0xe) 18:04:45 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r4) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$KEYCTL_MOVE(0x1e, r6, r4, r5, 0x0) r7 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r7) r9 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r8) keyctl$KEYCTL_MOVE(0x1e, r9, r7, r8, 0x0) keyctl$search(0xa, r6, &(0x7f0000000540)='id_resolver\x00', &(0x7f0000000580)={'syz', 0x3}, r8) keyctl$revoke(0x3, r8) read(r3, &(0x7f0000367fe4)=""/91, 0x275) fcntl$dupfd(r2, 0x406, r3) 18:04:45 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r4) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$KEYCTL_MOVE(0x1e, r6, r4, r5, 0x0) r7 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r7) r9 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r8) keyctl$KEYCTL_MOVE(0x1e, r9, r7, r8, 0x0) keyctl$search(0xa, r6, &(0x7f0000000540)='id_resolver\x00', &(0x7f0000000580)={'syz', 0x3}, r8) keyctl$revoke(0x3, r8) read(r3, &(0x7f0000367fe4)=""/91, 0x275) fcntl$dupfd(r2, 0x406, r3) [ 2599.866379][T17686] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:45 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:45 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:45 executing program 4: socket$inet6(0xa, 0x3, 0x3a) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$phonet(0x23, 0x2, 0x1) bind$phonet(r1, &(0x7f0000000000)={0x23, 0xe0, 0x81, 0x5}, 0x10) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x100000}, {0xa, 0x4e21, 0x0, @local}, 0x0, [0x0, 0x0, 0x20, 0x10000, 0xfffffffd]}, 0x5c) 18:04:45 executing program 1: r0 = syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000400)={0x17c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x38, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f71}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa49}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}]}, @TIPC_NLA_MEDIA={0x30, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb924}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x41}]}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x401}]}, @TIPC_NLA_BEARER={0xb0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x6e20, 0x1ff, @remote, 0xfffffffe}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @rand_addr="cd9a9b003f478dc0b4ff4c98df323fec", 0x3}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000000}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0xc001}, 0x1) 18:04:46 executing program 3: writev(0xffffffffffffffff, &(0x7f0000001f40)=[{&(0x7f0000002680)="ce", 0x1}], 0x1) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/fib_triestat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1b2, 0x0) 18:04:46 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:46 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:46 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xbc) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) syncfs(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x1, 0x10040) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet6_int(r3, 0x29, 0xce, &(0x7f0000000100), &(0x7f0000000140)=0x4) 18:04:46 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:46 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x800, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:46 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:46 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:47 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:47 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000000)=0x81, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x4e22, 0x0, @dev}, {0xa, 0x0, 0x0, @remote}, 0x0, [0x4, 0x0, 0xfffffffc, 0x40, 0x1000000, 0x1]}, 0x5c) 18:04:47 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0xff) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:47 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x90ec425e, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000200)="ee", 0x1, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 18:04:47 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:47 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r2, 0x3}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000040)={r2, @in={{0x2, 0x4e20, @empty}}}, &(0x7f0000000100)=0x84) syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:47 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xb1a, 0x78242) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_LOG_STATUS(r5, 0x5646, 0x0) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f0000000040)=""/247) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:47 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:47 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:47 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000040)={{{@in=@dev={0xac, 0x14, 0x14, 0x32}, @in=@loopback, 0x4e22, 0x2, 0x4e24, 0x4c8, 0x2, 0x80, 0x20, 0x1d, r3, 0xee00}, {0x10000, 0x2, 0x2, 0x4, 0x6, 0x6, 0x9, 0x1ff}, {0x0, 0x9, 0x48fc}, 0x6, 0x6e6bbc, 0x2, 0x0, 0x3, 0x1}, {{@in6=@ipv4={[], [], @remote}, 0x4d2, 0x6c}, 0x2, @in=@rand_addr=0x9, 0x3506, 0x2, 0x3, 0x1, 0x0, 0xca, 0x40}}, 0xe8) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:48 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000040)=0x7) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:48 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$USBDEVFS_FREE_STREAMS(r1, 0x8008551d, &(0x7f0000000000)={0x6c53}) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f00000000c0)="033eb2537c28c227734eabba4b2bda7cfff43f0bbd6d17b082eee8c1c59df9506dba0511e4a41f57eb10619b0a8f3739f07f3bd39ef500c57c5d6a343e90d66297a795bd91828342", 0x48, 0x4}, {&(0x7f0000000240)="00351c1231286de485918044df089ca101fb90154612ef9311418388a4d9449845c0cb1bb1c2cc5b905f24faad2954d0d7269f74adbcf7b88c7ea3c7ce28d00f81fe7431f7bfe9561b3575107e562c2011ab1e254073fd5b713ed62f0c4f59cfb3979f4105fdb1f5ffea2652d0fa6534a3f84d30aec078d6e97a4202eeb71a5a5c74c77f4dd39bcbee5cd58cac5d899da3336739a171581b8ebd8b2ff7b8fc83667a6250a5f29253b142772eb099d5d17c14fc45434d652fc608f2e8bf417eaf4a035628dcef67", 0xc7, 0x8552}], 0x0, &(0x7f0000000040)=ANY=[]) 18:04:48 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:48 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377bd7b3eb23d9008f0c69b08db538753bcf550f05d219f8c6ca03228dd8d293261ba079190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e", 0x74}, {&(0x7f0000000840)="b5252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d88107b89a1516610f2003d59c73b5c7e008a287d2a1d473414b1adeb4ca87742298b064ae974e919c80525175804799682d67fca4f9defe5754c03f", 0x55}], 0x2) write$binfmt_script(r0, &(0x7f00000008c0)=ANY=[@ANYBLOB="23ff1f0a8117fb6ad5eb1b3c750c75c5533f018823a16997c30a069cb5b742687b28af8baad097514187691d92010000009e3db9f1ab586e0a9ce86db57e1d384bfe3042c49ef9134937af481f2b44e023b3884e0efb76d2659a715f3b513e33fd96c9888a50cbbcb8c360a4000000dd0000000aff7f00000003000000010832ff0769dea9ed32487d2bf1ac37e8b368d4ef58c744b72a12061817b9b9afcf98d817857774004608d60900cc622708000001000000000081f6ffbe89979841db657cfa1250d20d461e000097559772f6"], 0xd0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000140)=0xda6, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:04:48 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:48 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) recvfrom$inet(r3, &(0x7f0000000400)=""/4096, 0x1000, 0x40000000, &(0x7f0000000040)={0x2, 0x4e24, @broadcast}, 0x10) 18:04:48 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) syz_open_procfs(r2, 0x0) open$dir(0x0, 0x0, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:48 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xf5ffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:49 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) syslog(0x9, &(0x7f0000000080), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$PNPIPE_HANDLE(r4, 0x113, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS(r6, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0xbc5, 0x2, 0x10, 0x4, "5cc957814170bb4a2be2131571cc806751f0da46622dcb0d872025f49ec0d2b621c7b4b1f4c2ad75fca5fe117be38b726d9fa54bc53a2344700b7778d309277c", "10a29745ab6b8f547308202f63e10c20584b4e6b22fa34542f2739a33bd0d11a", [0x2, 0x9]}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:49 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x0, 0x0, 0x0) mq_timedreceive(r2, &(0x7f0000000180)=""/130, 0x9a2733f6c2698b56, 0x0, 0x0) 18:04:49 executing program 1: r0 = syz_open_procfs(0x0, 0x0) r1 = socket$bt_rfcomm(0x1f, 0x3, 0x3) poll(&(0x7f0000000000)=[{r1, 0x1020}], 0x1, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:49 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2603.621481][ T27] kauditd_printk_skb: 12 callbacks suppressed [ 2603.621498][ T27] audit: type=1400 audit(1581444289.222:3873): avc: denied { syslog } for pid=19643 comm="syz-executor.4" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 2603.892461][T19670] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:49 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 18:04:50 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:50 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001fe) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x8001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f]}, 0x5c) 18:04:50 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:50 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:50 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000000)=0xf32) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="d51ed23a343ea414e764a53ee9", 0xd, 0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:04:50 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x14d000, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xf}}, {0xa, 0x0, 0x0, @loopback}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8001]}, 0x5c) [ 2604.650669][T19999] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value 18:04:50 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:50 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfbffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:50 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000800)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f0000000840)=0x200) r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000440)={0x3, 0xffffffffffffffff, 0x1}) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000480)={0x6, 0x1, 0x3, 0x0, 0x0, [{{r1}, 0x6}, {{r3}, 0x6}, {{r1}, 0x1}]}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000400)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x2efb, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="68f02011daf456a8d869db3d4ba822e94ee792f5b4f0c1b92123141d750d83e813d70f28fc27a6e137f6aab0d2b4cc64704dfc6ea0dd18a847784e9b285440bca15936cb16fd618782effea7072d6171b8ebd670384d8b14107a1e1be0cd4f50cb0c2f100f17f3d9ac76752e294f775c6e66d58fcb20faeac1b573280f7bdb6ad5938cb8337b3cee948b5118d285bb10eb605b0ff312624d01b14912c34d76d4bb7c6163cea5ec3a8a76851f", 0xac, 0x44}, {&(0x7f0000000140)="8c7b45eb886621bbd6babd604dd799adc0fa3f31cd19c2d8b51d10354a3def0082acb2dbee487908b331f65161b27ddc7eebd6244a6b2faf2256eaa2b6efd934a9acdc5d8a5344894b7aa16253d262076d8ee9323a082ad667abb1d9261f231c1c66aa3407acf8167b8595e7a3e84d86b43ce388f980de75f64ef3a45d02f13c129973619f479a8a1816f9307dd51d93947cd8", 0x93, 0x20}, {&(0x7f0000000200)="1656dcc928794512f45d9e4c52f39c94fd5ce1e8b121943c8d637d88f06fe7967778be65822013090f58814e819ac6c890600ae4fa47348dfd8544423b4de288821cdbed5a0e782e56e2a548fbd4d5d8679638837ad1ba681ad6637c6df63956db4682bb6714627eb523", 0x6a, 0x81}, {&(0x7f0000000280)='\aM', 0x2, 0xffffffff}], 0x8, &(0x7f0000000340)='selinuxppp1em1\x00') setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file1\x00', 0x140, 0x85) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='.\x00', 0x381000, 0x0) execveat(r2, &(0x7f0000000200)='./file1\x00', 0x0, 0x0, 0x0) 18:04:50 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="582a3a45126e8226aa9e24d18668b841f28163bafb85f21d276e9a5d59f6d8e65ac400d2d2a13dcab5bcbe153c2c02016cbe698670d45e3805138bb204e65ad6090e7c34e132471b9028fa009b05e5e94186b23cd5b0bb474e3d1017aec52ed604ff9dacf00ce7134a8afe3ff79fc6bc60a417f03c8f293542806c8c329947b2af0c47189435e8e0a7f8b94f2c4fdcb0ea4fd7490e47cebe92", @ANYRESHEX=0x0, @ANYBLOB=',uid<', @ANYRESDEC=0x0, @ANYBLOB=',obj_user=,-),\x00']) [ 2605.317253][T20231] ceph: No path or : separator in source 18:04:51 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:51 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) removexattr(0x0, 0x0) [ 2605.514495][T20245] jfs: Unrecognized mount option "X*:En‚&ªž$цh¸Aòcºû…ò'nš]YöØæZÄ" or missing value 18:04:51 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x7c9) 18:04:51 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:51 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fsync(r2) r3 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$IP_SET_OP_GET_BYNAME(r5, 0x1, 0x53, &(0x7f0000000000)={0x6, 0x7, 'syz0\x00'}, &(0x7f0000000040)=0x28) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r6 = accept(r0, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000100)=0x80) setsockopt$CAN_RAW_RECV_OWN_MSGS(r6, 0x65, 0x4, &(0x7f0000000140)=0x1, 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:51 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:51 executing program 1: fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, &(0x7f0000000000)='async\x00', 0x0, 0x0) r0 = mq_open(&(0x7f0000000040)=',-)', 0x800, 0x102, &(0x7f0000000080)={0x400, 0x800, 0x4, 0x5fe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x1000000000000, 0x80000001, 0x40, 0x40}) syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x10000000000000, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@noquota='noquota'}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:51 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfec0000000000000], [], @local}}, @in={0x2, 0x0, @remote}], 0x2c) 18:04:52 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2300000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:52 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:52 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfdffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$6lowpan_enable(r3, &(0x7f0000000040)='1', 0x1) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r5, 0x6, 0x21, &(0x7f0000000000)="dcbf0b72a5e40b28a800000400", 0x10) 18:04:52 executing program 3: syz_open_dev$ttys(0xc, 0x2, 0x1) 18:04:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000680)=0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000008c0)={0x0, 0x0}) getresuid(&(0x7f0000000940), &(0x7f0000000980)=0x0, &(0x7f00000009c0)) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/vcs\x00', 0x0, 0x0) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r11 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r11, 0x202002) keyctl$chown(0x4, r11, r9, r10) r12 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) read(r12, &(0x7f0000367fe4)=""/91, 0x275) r13 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/video35\x00', 0x2, 0x0) r14 = memfd_create(&(0x7f0000000a80)='gid', 0x3) pipe2(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc00) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = dup(r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r18) r19 = socket$alg(0x26, 0x5, 0x0) r20 = socket$can_bcm(0x1d, 0x2, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r21) r22 = syz_open_dev$ndb(&(0x7f0000000b00)='/dev/nbd#\x00', 0x0, 0x4240) r23 = openat$vfio(0xffffffffffffff9c, &(0x7f0000001140)='/dev/vfio/vfio\x00', 0x10000, 0x0) r24 = openat$audio(0xffffffffffffff9c, &(0x7f0000001180)='/dev/audio\x00', 0x88000, 0x0) r25 = openat$capi20(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/capi20\x00', 0x28040, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001200)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r28 = dup(r27) ioctl$PERF_EVENT_IOC_ENABLE(r28, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r30 = dup(r29) ioctl$PERF_EVENT_IOC_ENABLE(r30, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r32 = dup(r31) ioctl$PERF_EVENT_IOC_ENABLE(r32, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r34 = dup(r33) ioctl$PERF_EVENT_IOC_ENABLE(r34, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f0000000e40)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000f80)=0xe8) r36 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r36, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r39 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r39, 0x202002) keyctl$chown(0x4, r39, r37, r38) r40 = getpid() sched_setscheduler(r40, 0x5, &(0x7f0000000380)) r41 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r41, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r42, 0x0) getgroups(0x1, &(0x7f0000001380)=[0x0]) sendmsg$netlink(r0, &(0x7f00000014c0)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000880)=[{&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1fc}, {&(0x7f0000000080)={0x60, 0x12, 0x10, 0x70bd2d, 0x25dfdbfe, "", [@nested={0x50, 0x3d, 0x0, 0x1, [@generic="95c3940374c5fdac2d2d640d608ebbe35e25486082b9521e35a9fcfa1f087acc3cec80465151031ea09781f20d1b77b43984bd9895e4565e6df83a92a8fdaa007507fb528f1cf7bfcbfa6c88"]}]}, 0x60}, {&(0x7f00000006c0)=ANY=[@ANYBLOB="a4010000180000042abd7000fcdbdf257401408068c686d77ee76da7fc1961aaa2eaa3056717c2a238de2af131e49e06966eb9213c55582b5a617afc6ec5fa18aa08d234687c2f450f34e9cf8fb4ac06a7ecc313c3512f4ea8d6088d36b479fedc32818403105ef9389b72edcb630683041c6a5dcec9c0c29b876c8273d06c3554ea8c58552aa3e7f9c2da3308006700", @ANYRES32=r1, @ANYBLOB="0800630004000000ef9bcc65ad4379df8427991f2120f334a52a83aa8c1469c0c56948e4c52b9211acd8b6655705503f6fa97fe4ff0f0000073d66d303d178cf5021eba0d6fd55bf274307d26bd27a710294f5d8c0ac4bf80879b6bf4801569d0211942dea0fc7be1c10319e4dbf9bc82407dc39f4078fe397231a38edfc366fc0bdeb4dc64d825fb8708953c534a85380d3c098f649d5baa70a35eedbcc5c7c42692892d8652e42d30500000000000000ba12964be2431d201419a7350a45acd6931944604d2dabf99734fe670e34106cc5abe88ecbd6df7a360f98f296599b019622dffb4ad9769d21af92c041aab225de812000118008", @ANYRES32=r3, @ANYBLOB="0c0083002e0200000000000008006f00ffffffff"], 0x1a4}], 0x3, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {r4, r5}}}, @rights={{0x14, 0x1, 0x1, [r6]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff, r10}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r12, r13, r14, r15, r17, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [r18, 0xffffffffffffffff, r19, r20, r21, r22, r23, r24, r25]}}, @cred={{0x1c, 0x1, 0x2, {r26, r35, r38}}}, @cred={{0x1c, 0x1, 0x2, {r40, r42, r43}}}], 0x100, 0x10}, 0x8801) syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x11) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) 18:04:52 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3e11000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) dup2(r0, r1) 18:04:52 executing program 1: syz_open_procfs(0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_PREPARE(r1, 0x4140, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, ',-)'}}]}) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(0xffffffffffffffff, 0xc01864ba, &(0x7f0000000000)={0x7fff, 0x5, 0xfffffffa, 0xeeeeeeee}) 18:04:52 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:52 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r8}]}}}, @IFLA_MASTER={0x8, 0x4, r6}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000080)={'team0\x00', r8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_mreqn(r14, 0x0, 0x20, &(0x7f0000000200)={@dev, @rand_addr, 0x0}, &(0x7f0000000240)=0xc) r16 = socket$netlink(0x10, 0x3, 0x0) r17 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r17, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r16, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r20}]}}}, @IFLA_MASTER={0x8, 0x4, r18}]}, 0x40}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a80)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001b80)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r23 = dup(r22) ioctl$PERF_EVENT_IOC_ENABLE(r23, 0x8912, 0x400200) getsockname$packet(r23, &(0x7f0000001bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001c00)=0x14) r25 = socket$netlink(0x10, 0x3, 0x0) r26 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r26, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r26, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r28 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r28, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r28, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r25, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r29}]}}}, @IFLA_MASTER={0x8, 0x4, r27}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000001c40)={'batadv0\x00', r29}) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000001dc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001d80)={&(0x7f0000001c80)={0x100, r2, 0x10, 0x70bd28, 0x17, {}, [@ETHTOOL_A_STRSET_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r18}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}]}, @ETHTOOL_A_STRSET_HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r21}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r24}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r30}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x4}, 0x24048090) r31 = socket$inet6(0xa, 0x3, 0x3a) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r33 = dup(r32) ioctl$PERF_EVENT_IOC_ENABLE(r33, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r31, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:52 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x36b07d66fd11c4bb, '\x00', 0x1}, 0xffffffffffffff60) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @multicast2}, 0x100}) 18:04:53 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:53 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xff000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:53 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:53 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/tty/ldiscs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/176, 0xb0}], 0x1, 0x0) 18:04:53 executing program 1: r0 = syz_open_procfs(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r1, 0x8, 0x800}, &(0x7f0000000340)=0xc) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000140)={0x980000, 0xfffff000, 0x2, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x990af7, 0x20, [], @ptr=0x9}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r4, 0x3}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000000)={r4, 0x4, 0x10}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r5, 0x1ff}, 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x9, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c6f621f0000000000000040292c00"]) 18:04:53 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:53 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x5c) 18:04:53 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xff0f0000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:53 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(r1, r0, 0x0) accept4(r0, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000080)=0x80, 0x0) 18:04:53 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:53 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) 18:04:54 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSBRKP(r4, 0x5425, 0x9) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r4, 0x4008ae48, &(0x7f0000000000)=0xd000) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:04:54 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2608.677809][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:04:54 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:54 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffefffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:54 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto$inet6(r4, &(0x7f0000000000)="bd11e79549c3ea7ba3a713abba8545ee7a35e126508d9fba6ba3c95885ae58277becbe46a5785a887511e7410a449f981ae1921fc35339d66652c34a2c0457ac4992c4e02187ba76ff9b0a5be55bd71f6486b76b920c2ae2aa6ae3bd0a35fcdf2a9faf9fa54605f53ef2f2d8cc9f3c0f0a5c8056e057b3dd758336306ba0392e18059f14ff2eea73ee9402874caac94724fd1b9b67d65864da368eafdbaa637484885e1588bae096b003e2282f37521a02bff21195115a62ba2c694d3d2c0fdb403b50906e106e244436", 0xca, 0x24048011, &(0x7f0000000100)={0xa, 0x4e21, 0x3, @remote, 0xffff}, 0x1c) 18:04:54 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7, 0xfcffffff}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:04:54 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:54 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:54 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:55 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7, 0xfcffffff}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:04:55 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r8, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x1, 0x20}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f00000001c0)={r9, @in={{0x2, 0x4e22}}, 0x4, 0x16}, 0x90) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400203) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$VIDIOC_S_EDID(r11, 0xc0285629, &(0x7f0000000040)={0x0, 0x80, 0xfffffffa, [], &(0x7f0000000000)=0x4b}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x3, 0x0, @remote}, 0x0, [0x10000, 0x1f, 0xffffffff, 0x0, 0x0, 0x3, 0x3, 0xffffd]}, 0x5c) r12 = semget(0x1, 0x0, 0x4) semctl$SEM_INFO(r12, 0x3, 0x13, &(0x7f0000001400)=""/4096) r13 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x44042, 0x0) read$snddsp(r13, &(0x7f0000000400)=""/4096, 0x1000) [ 2609.430969][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:04:55 executing program 3: r0 = socket(0x10, 0x80002, 0x0) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) 18:04:55 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:55 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:55 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:55 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000540)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}]}, 0x190) 18:04:55 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7, 0xfcffffff}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:04:55 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev, 0x2}, {0xa, 0x4e23, 0xfffffffd, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7f]}, 0x5c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup(r4) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1a1000, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r5, 0x4, &(0x7f0000000040)=r6, 0x1) 18:04:55 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) r9 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) getsockname$packet(r11, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:04:55 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:56 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:56 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7fffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:56 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RUNLINKAT(r4, &(0x7f0000000000)={0x7, 0x4d, 0x1}, 0x7) 18:04:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000ff5ffc)={0x0, 0x3}, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) write(r3, &(0x7f0000000280)="1c0000001a009b8a14e5f407fc08042400000000ff00000000000000", 0x1c) 18:04:56 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x8bec425e00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:56 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:56 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xd01000000000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:56 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x800, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0xffffffffffffffe2) 18:04:56 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) write$FUSE_ENTRY(r0, &(0x7f00000005c0)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(r0, &(0x7f0000000380)={0x90, 0x0, 0x3, {0x3, 0x0, 0x0, 0x0, 0x6fa2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}}}, 0x90) 18:04:56 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:56 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r10 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) getsockname$packet(r12, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r13, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:04:57 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x8) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x0, @in={0x2, 0x4e22, @loopback}, @generic={0x28, "7c7cf7e36ab6b3532bd3703e8d7b"}, @xdp={0x2c, 0xa, 0x0, 0x12}, 0x7, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000080)='wg1\x00', 0x6, 0x1f, 0x8}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'vlan1\x00', r3}) 18:04:57 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:57 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x97ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, 0x80, 0x0}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0185879, &(0x7f0000000080)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001bc0)=""/112, 0x70}, 0x20) 18:04:57 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xf5ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:57 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:57 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:58 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x8004000000000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x0, 0x0, 0x0) 18:04:58 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:04:58 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x2, @dev, 0x2}, {0xa, 0x0, 0x0, @mcast1}, 0x2, [0xa0000, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x5c) 18:04:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @loopback}, {0x2, 0x0, 0xffffffc1, @dev}, r1}}, 0x48) 18:04:58 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xf9fdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:58 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffff97, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) 18:04:58 executing program 4: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0x1000, 0x31, &(0x7f0000000400)="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", &(0x7f0000000000)=""/49, 0x80000000, 0x0, 0xc, 0x40, &(0x7f0000000040)="da50fac8cb24cd69d91d0ffb", &(0x7f0000000080)="4553484a270c86ab762dd8a447b3a8768f345908c973d7530c7ce9ad0592341ef6d8e701b656b94fafa0bae7674faff2948ddbb62f33842077e5adc5f2e90595"}, 0x40) ioctl$CAPI_SET_FLAGS(r2, 0x80044324, &(0x7f0000000100)=0x1) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:58 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfbffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:58 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r10 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) getsockname$packet(r12, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r13, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:04:59 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:59 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffff5, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:59 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {}, [], {}, [], {0x2}}, 0x24, 0x0) 18:04:59 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfcfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:59 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r9, 0xc0086421, &(0x7f0000000140)={r10, 0xc1db296ba2f28640}) ioctl$DRM_IOCTL_DMA(r8, 0xc0406429, &(0x7f0000000180)={r10, 0x2, &(0x7f0000000080)=[0x10001, 0xfffffffb], &(0x7f00000000c0)=[0x0, 0x7f, 0x0, 0x8, 0x8000, 0x8000], 0x45, 0x8, 0x8, &(0x7f0000000100)=[0x3ff, 0x9, 0x80000000, 0x7000, 0x1, 0x1, 0x1, 0x1], &(0x7f0000000140)=[0xb]}) ioctl$DRM_IOCTL_UNLOCK(r6, 0x4008642b, &(0x7f00000001c0)={r10, 0x6}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000080)={r10, &(0x7f0000000000)=""/119}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:04:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup(0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x0, 0xfcffffff}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:04:59 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:59 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfdffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:59 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:04:59 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000600)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000000)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 18:04:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x5, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) 18:04:59 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$caif_stream(0x25, 0x1, 0x5) r2 = dup(r1) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x7, &(0x7f0000001600)=[{&(0x7f00000001c0)="849589f50bbd5ff3418228248ea8f54f5bbf1cd74ff9dd86ecc44c902e938147077246f2b0e0f0f05934859e0fc19847f6bd5c8613d20217791170f12f3912f7df1b9c7a1d77370a421594b1304b21baed501a272ad41da0b7393f9c8bce58bb7a20afcc21135fadbb5ea8f16e0225d4c35cae8714dcc3902cabe638331f2f90d8f7967767e247782c881658fecbdd885f690595b6664548c85a7765e02d6164acf39451bf1b2783cef5abde8b5a0e1cc7ed48c50437c12e21c7dd72ac83f6d1d8cc10a34bfff54eb3daaa9cd3d85d5a3c7ed04769208db9c3423753bcb958adb477249798dca41bab5f94311fe3", 0xee, 0x7fff}, {&(0x7f0000000400)="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", 0xfb, 0xffffffffffffffdc}, {&(0x7f00000000c0)="13bc0ac39c019174eb86ed783e3d39d6ba9c99daed94ef38ab9c4bc5c05f8eaa62baf6742f215b938c419fc4e13b7000f78c4022bf2b69d43cf9de498a90353c9ba7c5ee6694c56ae01069730b0c37ab11fb19e323b9b6cfe6e944f2afaf6c3846e9150a867fe44cf237f17e115a0bcc1ad1d2bca539e19cde094cffac32a7d12d285aa34a61ec213c6cd51635764ee23564b4a5b7c2012a0cc0e1a820", 0x9d, 0xffffffff7fffffff}, {&(0x7f0000000500)="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", 0x1000, 0x3}, {&(0x7f00000002c0)="036a4cc8cb0b882a89e3cf33c9ece754ad5a9b19e546b5c1a3ce0bfbf09ed2b614d9c3c66641f54374ebca8d7458a014a2baa749da9e536ce9ab2b4b7049ec0942ccbe32e91ddca8e82df32b6a667ec5bc7fc35700e08dccd9d39088bac664b869cd60849bc349deaa02cfe9c057a65337ca8b16177d6d928d3e815f75ff1de0d707babe837fef01", 0x88, 0x3}, {&(0x7f0000001500)="55de1addc4fcd4ef45a39a214d2bc5fbe58edde5133640bafe6b3bf59860e251466a09f9298fd9e7cf9acfad718aa754ec76d1ed9b21a1e9414c765e7a2590232dcdd8a682aea4cb3a857bcfbb4297f366bcf268a13daeac335d20fe68699ae005eab4fe612a5afc4393c11bb27c028c888eb707b954f86501949bc96fbfad3e", 0x80, 0x1}, {&(0x7f0000001580)="9871e32ea9518afb39b0e102dc65719021a0805025fd382bdeeb9da0bb20bcd8b888d026a4713582aca7c7479d3b494f2c39731f245f8147bda511bc19d1ffbc6e97de", 0x43, 0x6}], 0x1000000, &(0x7f00000016c0)={[{@disable_sparse_no='disable_sparse=no'}], [{@uid_lt={'uid<'}}, {@uid_lt={'uid<'}}, {@seclabel='seclabel'}]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, &(0x7f0000001780)='/dev/kvm\x00', 0x454581, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r4, &(0x7f0000367fe4)=""/91, 0x275) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f0000001740)={{0x1, 0x0, @reserved="438119b64a41d35040d0271883d5b66207a2419a8c60d8d5028983479a32124c"}}) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$sock_int(r5, 0x1, 0x2c, &(0x7f0000000000)=0x4, 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 2614.543787][T24413] ntfs: (device loop4): parse_options(): Unrecognized mount option uid<00000000000000000000. [ 2614.560344][T24413] ntfs: (device loop4): parse_options(): Unrecognized mount option uid<00000000000000000000. [ 2614.628153][T24413] ntfs: (device loop4): parse_options(): Unrecognized mount option . 18:05:00 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:05:00 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$sock_linger(r2, 0x1, 0xd, 0x0, &(0x7f0000000100)) 18:05:00 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffffb, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:00 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x30000739, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="5cacaae423dc692cfac118a88cbe7bb2851fb6d6c0557e771cb5e6507a000641c548336612da1482b5a7b10d0f4acd81208d7a83ee0922bf26a3e0c927602e80bad2c0352d6d9483d2426488cf80eaf378b96d484287b000aa6dfa9e9df9bcf4602fd7c7df3fa3e235659ffe708746d9d53e1d6acdb5cedadda27b5883ae8bb056ef007e1b490a4ebc97675acaccd98593ba9b11892f9b7ec21c918e355ee0432af864e843df8e3caf03a4d00000000000000000000000cb460096bcf7eac9195cd339a7d875c50000"], 0xc9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='illinois\x00', 0x9) sendto$inet(r0, &(0x7f0000000300)='+', 0x1, 0x11, 0x0, 0x0) 18:05:00 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xff00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)}], 0x1}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) 18:05:00 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:00 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffffd, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:00 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xff0f000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:01 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) 18:05:01 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:01 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0}) 18:05:01 executing program 4: writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000000)="d7f476083251c7d07fd4b9adf60ea9bfc61472d45b81f5528ce5dcdbfa262a614b524d81c232ad633b5c76e7ef25be1aba91e8eb7328034165e2eb938599f19cecbc88d0377d3f51fb2b99ed6006ab50b1b4c81ad07edbf8a16f284e17d279565aee817b1bf86551a2114ddfa2ec676da0a0dc5715f1cdf699a9b82a071a117a7f54be2c379f0d3ad7c01d5d351aa2e421a7efb65273ee72e967b096f1aa39f34faf9410765c7959e9908086d326a2f68ab394411aacd958790ae4d9cfdc062d36cd0c82bee96148c29abdc4474a7f22c06e1be68b0b", 0xd6}, {&(0x7f0000000100)="225d13fccf59add25b46630860a0de655e9cac725148b3297170c49fe8d0618ba30b402a165612e56c54b4a3159c01b476ec26eba3dfd22b5dc75a1ff48bec69143c946dd732910611e7cc359dc2462419317e751f6e7687902d59aa25d1e8604a0cb7a56f02ea920a3a4e27e56196342f268f", 0x73}, {&(0x7f0000000180)="7135a970a0942c7e241d2c72c0f64d350553ee203627e850cdd69b882270721e44ceb47ece70a703d13ae564d221605573dc1b7fb197b9ee00944e1e2d9106adc4", 0x41}], 0x3) r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) ioctl$VFIO_SET_IOMMU(r2, 0x3b66, 0x7) 18:05:01 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439fce41f144631ac262dcae08c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x139}, 0x48) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) 18:05:01 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffefffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:01 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:01 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) socket$kcm(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, 0x0) socket$kcm(0x2b, 0x0, 0x0) 18:05:01 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:02 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:02 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffffffffff0700, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @loopback}, {0x2, 0x0, 0xffffffc1, @dev}, r1}}, 0x48) 18:05:02 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xff00000000000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:02 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:02 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0x8, 0x1a, 0x0, 0x1, [@AF_INET6={0x4}]}]}, 0x28}}, 0x0) 18:05:02 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffffffffffff7f, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:02 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#'], 0x1) 18:05:03 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:03 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:03 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$bt_hci(r0, 0x84, 0x74, &(0x7f00000000c0)=""/4086, &(0x7f0000001140)=0xff6) 18:05:03 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 18:05:03 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:03 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7ffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x10001) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) socket$inet6_udplite(0xa, 0x2, 0x88) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x4400, 0x43) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) open$dir(0x0, 0x8c802, 0x0) 18:05:03 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 18:05:03 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70ebec677d6ac14c2c794f72cbf5ee31789e70227bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c8a14195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd11747ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01e15d57c55dc458b06533ebe599d18a3a714a7bd4fad615ff6e2991589bbdd1ae0d1bce65c620c4a2527a82afe16e019a5e0b5ec1b1b8aafba090000c3630488edcc4a8cbd3246e962b773a75b28a51cd09cbcb3577fea6f1e9fe8cd2b532c084cbd051b4aeaf0e716b256acf183d8e55580a678c664813354f14a453b093948d49bca31a7170419bb1d32f256ff3010e69b2f0482c63ab78a74dec8b1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe80, 0xfffffe6f, &(0x7f0000000100)="480e003f0000007e5bc5795eca00000800ffffffba0e7200ffff08", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) 18:05:04 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x40000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:04 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2618.579470][ T27] audit: type=1804 audit(1581444304.182:3874): pid=25879 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir539695389/syzkaller.ioHBqY/2734/file0/file0" dev="sda1" ino=17348 res=1 18:05:04 executing program 3: syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x200, 0x6801) 18:05:04 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) dup3(r3, r0, 0x0) 18:05:04 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:04 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:04 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f00000000c0)={0x0, 0x0, 0x0, [], 0x0}) 18:05:05 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:05 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) recvmmsg(0xffffffffffffffff, &(0x7f0000005c80)=[{{0x0, 0xffffffffffffff55, &(0x7f0000003e00)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 18:05:05 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x148000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:05 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x0) 18:05:05 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:05 executing program 3: r0 = epoll_create1(0x0) r1 = socket(0x11, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)) 18:05:05 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) 18:05:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0x200}, {0x80000006}]}, 0x10) 18:05:05 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:05 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_RUN(r4, 0xae80, 0x0) 18:05:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@nobarrier='nobarrier'}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@decompose='decompose'}]}) 18:05:06 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:06 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:06 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 2620.768691][T26861] hfsplus: unable to find HFS+ superblock 18:05:06 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:06 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2620.974791][T26861] hfsplus: unable to find HFS+ superblock 18:05:06 executing program 3: setgroups(0x0, 0x0) getgroups(0x1, &(0x7f0000000100)=[0xee00]) setregid(0x0, r0) 18:05:06 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) socket$kcm(0x2, 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000004c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001240)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)) socket$kcm(0x2b, 0xf, 0x0) sendmsg$kcm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0xff, 0x5, 0x0, 0x0, 0x68000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000000), 0xf2535e2b04ccc46d}, 0x220, 0x3f, 0xfffffffe, 0x60b0d86e86fbf28b, 0xdc0, 0x101, 0x9}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 18:05:06 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:06 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:07 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="24000000200003041dfffd946f6101000a00000a1f000002141008000800030012000000", 0x24}], 0x1}, 0x0) 18:05:07 executing program 3: mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0) write$P9_RATTACH(r0, &(0x7f0000000080)={0x14}, 0xfffffff4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r1) 18:05:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r2, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 18:05:07 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x5, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:07 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xb, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:07 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2621.867381][T27327] NFS: Device name not specified 18:05:07 executing program 3: mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0) write$P9_RATTACH(r0, &(0x7f0000000080)={0x14}, 0xfffffff4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r1) 18:05:07 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x6, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2621.899435][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:05:07 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xc, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:07 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:07 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r2, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 18:05:07 executing program 3: mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0) write$P9_RATTACH(r0, &(0x7f0000000080)={0x14}, 0xfffffff4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r1) 18:05:08 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:08 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2622.604709][T27568] NFS: Device name not specified [ 2622.612445][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:05:08 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x10d, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:08 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:08 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0) 18:05:08 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x23, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377bd7b3eb23d9008f0c69b08db538753bcf550f05d219f8c6ca03228dd8d293261ba079190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e", 0x74}, {&(0x7f0000000840)="b5252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d88107b89a1516610f2003d59c73b5c7e008a287d2a1d473414b1adeb4ca87742298b064ae974e919c80525175804799682d67fca4f9defe5754c03f", 0x55}], 0x2) write$binfmt_script(r0, &(0x7f00000008c0)=ANY=[@ANYBLOB="23ff1f0a8117fb6ad5eb1b3c750c75c5533f018823a16997c30a069cb5b742687b28af8baad097514187691d92010000009e3db9f1ab586e0a9ce86db57e1d384bfe3042c49ef9134937af481f2b44e023b3884e0efb76d2659a715f3b513e33fd96c9888a50cbbcb8c360a4000000dd0000000aff7f00000003000000010832ff0769dea9ed32487d2bf1ac37e8b368d4ef58c744b72a12061817b9b9afcf98d817857774004608d60900cc622708000001000000000081f6ffbe89979841db657cfa1250d20d461e000097559772f6"], 0xd0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000140)=0xda6, 0x4) sendto$inet(r0, &(0x7f00000012c0)="1e268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b087511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:05:08 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x300, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:08 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x480, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:08 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x48, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:08 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:09 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x500, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:09 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:09 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x600, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:09 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:09 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) io_setup(0x0, &(0x7f0000000100)) 18:05:09 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x700, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:09 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x68, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:09 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:10 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xd01, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:10 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:10 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:10 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)=0x2f) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f0000000040)) 18:05:10 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x8004, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:10 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x74, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:10 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xff00, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:10 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:10 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:10 executing program 1: socket$unix(0x1, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @loopback}, {0x2, 0x0, 0xffffffc1, @dev}, r1}}, 0x48) 18:05:10 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:10 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:11 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:11 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x7, 0xfcffffff}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:11 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:11 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:11 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:11 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000001c0)) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = ioctl$TIOCGPTPEER(r5, 0x5441, 0x100) pread64(r6, &(0x7f0000000200)=""/5, 0x5, 0x100000001) r7 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000240)=""/232) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000500)=@assoc_value={0x0}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r16, 0x3}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r9, 0x84, 0x1, &(0x7f0000000040)={r16, 0x5, 0xfffa, 0x200, 0x0, 0x8}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=r17, @ANYBLOB="55e6ffff9fd758183cb7a7ba2a698cf4742907fca82eea451b003643e99f7e642556a9c9e77bce0f562704000000000000004c3da490b54f0b76c6f581971ed09cc7a18c0303734ac2d8e3a93cfbfc684ca8b4a30c86bed9a7"], &(0x7f0000000140)=0x5d) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r2, 0x8983, &(0x7f0000000000)={0x1, 'erspan0\x00', {}, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x3d}}}, 0x5c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = dup(r18) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r9, 0xc02064b2, &(0x7f0000000400)={0x800, 0x8001, 0x0, 0x3, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r19, 0xc01064b3, &(0x7f0000000440)={r20}) 18:05:11 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:11 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x5000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:12 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$key(0xf, 0x3, 0x2) r8 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) getsockname$packet(r10, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r11, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:12 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:12 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:12 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:12 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:12 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x7000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:12 executing program 4: socket$inet6(0xa, 0x3, 0x3a) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x0, 0x4, @rand_addr="4e76a16d989adf47026d52ff3845337d"}, {0xa, 0x0, 0x2, @mcast1}, 0x0, [0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffe]}, 0x5c) 18:05:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xe}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:12 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:12 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:12 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)=0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 18:05:12 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xd010000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/1051], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r4, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r5}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r3, r2, 0x0, 0x8, &(0x7f0000000000)='wlan0\\!\x00', r5}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439fce41f144631ac262dcae08c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x139}, 0x48) 18:05:13 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:13 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:13 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x80040000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:13 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:13 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0x400000000000003a, 0x0, 0x0, 0xfffffffffffffffd) 18:05:13 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x124080, 0x0) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa, 0x80010, r1, 0xa8b) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "00ffd00000003afb324d00"}) r3 = syz_open_pts(r0, 0x0) r4 = dup3(r3, r0, 0x0) ioctl$TCFLSH(r4, 0x540b, 0x0) 18:05:13 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCL_SELLOADLUT(r2, 0x541c, &(0x7f0000000080)={0x5, 0x4, 0x400, 0x20, 0x7}) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r4, &(0x7f0000367fe4)=""/91, 0x275) fcntl$getflags(r4, 0x1) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:13 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:13 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:13 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:13 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:14 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r13) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:14 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:14 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_DMA(r4, 0xc0406429, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=[0xb1, 0x3ff], &(0x7f0000000040)=[0xae57, 0x80, 0x9, 0x6, 0x8, 0x8, 0x5e, 0x5, 0x5], 0x10, 0x2, 0x8001, &(0x7f0000000080)=[0x1, 0x3], &(0x7f00000000c0)=[0x0, 0x2, 0x4]}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SG_NEXT_CMD_LEN(r6, 0x2283, &(0x7f0000000140)=0x8d) 18:05:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x7c9) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 18:05:14 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2300000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:14 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xff000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:14 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:14 executing program 1: 18:05:14 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3e11000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:14 executing program 1: 18:05:14 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfc, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:15 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r13) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:15 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:15 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="400000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100736974000c00028008000100", @ANYRES32=r8, @ANYBLOB="93cb4a58857681afd1bd690d2012282aaccc05710d9ba7d9e3d347bc9dcfa5d680b8912667eea84250cfdfbf6e00"/56, @ANYRES32=r6, @ANYBLOB], 0x40}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) accept(r10, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x80) accept(r1, &(0x7f0000002800)=@can={0x1d, 0x0}, &(0x7f0000002880)=0x80) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="400000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="001f74002c00028008090100fbea4f4e22314d3d4b97852db72f1466ff637afacd6a4468070caf08eb2ceb6ba6602c7facb0d935a8557039599f49ea439678d6cf096371b717064527b39da91a423e89b7d5d2d0d8fd296703ba5c820760e4972ebb2acb1f6c5a3ae21329d8a927f723d1091ac6dfd10f70cba7da1dd056b6cb3fa6d2a8162d2aba9e538a3e67e027fb63f4583bac200fd1c4979e2465a4254982a02e4e3a2bca7cc393c4769556eb434d1f57b42e9a", @ANYRES32=r17, @ANYBLOB="08000400", @ANYRES32=r15, @ANYBLOB], 0x40}}, 0x0) r18 = socket$netlink(0x10, 0x3, 0x0) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r21 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r21, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r18, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r22}]}}}, @IFLA_MASTER={0x8, 0x4, r20}]}, 0x40}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r23) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r27 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r27, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r27, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r28}]}}}, @IFLA_MASTER={0x8, 0x4, r26}]}, 0x40}}, 0x0) ioctl$sock_SIOCADDRT(r23, 0x890b, &(0x7f00000028c0)={0x0, @hci, @can={0x1d, r26}, @hci={0x1f, 0x0, 0x4}, 0x6, 0x0, 0x0, 0x0, 0xe3, 0x0, 0x7ff, 0x100000000, 0x2}) accept4$packet(0xffffffffffffffff, &(0x7f0000003a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003a80)=0x14, 0x80800) r31 = socket$netlink(0x10, 0x3, 0x0) r32 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r32, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r32, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r34 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r34, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r34, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r31, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r35}]}}}, @IFLA_MASTER={0x8, 0x4, r33}]}, 0x40}}, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000003ac0)={@empty, @multicast2, 0x0}, &(0x7f0000003b00)=0xc) r37 = socket$netlink(0x10, 0x3, 0x0) r38 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r38, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r38, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r40 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r40, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r40, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r37, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r41}]}}}, @IFLA_MASTER={0x8, 0x4, r39}]}, 0x40}}, 0x0) r42 = socket$netlink(0x10, 0x3, 0x0) r43 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r43, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r43, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r45 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r45, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r45, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r46}]}}}, @IFLA_MASTER={0x8, 0x4, r44}]}, 0x40}}, 0x0) getsockname$packet(r2, &(0x7f0000003b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003b80)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r49 = dup(r48) ioctl$PERF_EVENT_IOC_ENABLE(r49, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r49, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@loopback, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) accept4$packet(r2, &(0x7f0000003dc0)={0x11, 0x0, 0x0}, &(0x7f0000003e00)=0x14, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) getsockopt$inet_pktinfo(r53, 0x0, 0x8, &(0x7f0000003e80)={0x0, @multicast2, @empty}, &(0x7f0000003ec0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r55) r56 = socket$netlink(0x10, 0x3, 0x0) r57 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r57, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r57, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r59 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r59, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r61 = dup(r60) ioctl$PERF_EVENT_IOC_ENABLE(r61, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r63 = dup(r62) ioctl$PERF_EVENT_IOC_ENABLE(r63, 0x8912, 0x400200) getsockname$packet(r63, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r56, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r64}]}}}, @IFLA_MASTER={0x8, 0x4, r58}]}, 0x40}}, 0x0) ioctl$sock_SIOCGIFINDEX(r55, 0x8933, &(0x7f0000003f00)={'batadv0\x00', r58}) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000004640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000004600)={&(0x7f0000003f40)={0x6ac, r3, 0x400, 0x70bd25, 0x25dfdbfd, {}, [{{0x8, 0x1, r6}, {0x170, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r11}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r12}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r22}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r29}}}]}}, {{0x8, 0x1, r30}, {0xfc, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x120000}}, {0x8}}}]}}, {{0x8, 0x1, r35}, {0xf0, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r36}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r39}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8, 0x6, r44}}}]}}, {{0x8, 0x1, r47}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x5d9}}, {0x8, 0x6, r50}}}]}}, {{0x8, 0x1, r51}, {0x88, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r54}, {0xc4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r65}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x9f1f, 0x73, 0x4, 0x8}, {0x6, 0x4, 0x4, 0x3}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x200}}, {0x8}}}]}}]}, 0x6ac}, 0x1, 0x0, 0x0, 0x4048005}, 0x40400c0) 18:05:15 executing program 1: 18:05:15 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:15 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r13) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2629.766642][T30254] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2629.860397][T30254] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. 18:05:15 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffe, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:15 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xb00, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:15 executing program 1: 18:05:15 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:15 executing program 1: 18:05:16 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r13, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:16 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:16 executing program 4: prctl$PR_SET_UNALIGN(0x6, 0x6) r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPATH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x28, r6, 0x2468825185d9173d, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc}]}, 0x28}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r11}]}}}, @IFLA_MASTER={0x8, 0x4, r9}]}, 0x40}}, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, r6, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x5}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r9}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'veth0_to_batadv\x00'}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'rose0\x00'}, @NL80211_ATTR_IFTYPE={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20001000}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:16 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:16 executing program 1: 18:05:16 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VFIO_IOMMU_UNMAP_DMA(r4, 0x3b72, &(0x7f0000000000)={0x18, 0x0, 0x2, 0x8000}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_ENUMAUDOUT(r6, 0xc0345642, &(0x7f0000000040)={0x7f800000, "eb883f81ab9f2439e75a92fc43e292576a9f04dfa244911bb356ff11f9d02649", 0x3, 0x1}) r7 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101001, 0x0) close(r7) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:16 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:16 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xc00, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:16 executing program 1: 18:05:16 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:16 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:16 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r13, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:16 executing program 1: 18:05:16 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x6]}, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:16 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:17 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:17 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:17 executing program 1: 18:05:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev, 0xfffffffc}, {0xa, 0x0, 0x4, @mcast1}}, 0x5c) 18:05:17 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:17 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:17 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:17 executing program 1: 18:05:17 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r13, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:17 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_procfs(r0, &(0x7f0000000000)='net/l2cap\x00') r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:17 executing program 1: 18:05:17 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:17 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xd01000000000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:17 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x8004000000000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:17 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:18 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x113e, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:18 executing program 1: 18:05:18 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = dup(0xffffffffffffffff) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:18 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:18 executing program 4: socket$inet6(0xa, 0x3, 0x3a) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x422a00, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x4, @remote}, {0xa, 0x4e23, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0xfffff001, 0x0, 0x0, 0x0, 0x1]}, 0x5c) 18:05:18 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:18 executing program 1: 18:05:18 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff00000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:18 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r4, 0xc008551c, &(0x7f0000000000)={0x4, 0x8, [0xff, 0x0]}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @rand_addr="2a62cc2b175cb308eb2756f55d0d570b"}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:18 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = dup(0xffffffffffffffff) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:18 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:18 executing program 1: 18:05:19 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1f00, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:19 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff00000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:19 executing program 1: 18:05:19 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xe3, 0x0, 0x9f05, 0x10, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x7f}, 0x28cc}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r5, 0xc0a85322, &(0x7f0000000040)) read(r3, &(0x7f0000367fe4)=""/91, 0x275) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000000)={0x1, 0x0, [0x0]}) ioctl$VIDIOC_S_AUDIO(r2, 0x40345622, &(0x7f0000000100)={0x80, "80a89c6e68c89af418d6ccc8938cb93aa9667599766698f6fd11c0569bd0460d", 0x0, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r8, 0x3}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f00000001c0)={r8, @in={{0x2, 0x4e24, @local}}}, 0x84) 18:05:19 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = dup(0xffffffffffffffff) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:19 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:19 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xff00000000000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:19 executing program 1: 18:05:19 executing program 1: 18:05:19 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:19 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7fffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:19 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:20 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000040)=0x6, 0x4) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x42}}, {0xa, 0x0, 0x0, @mcast1, 0x3}}, 0x5c) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000080)={&(0x7f0000fff000/0x1000)=nil, 0x7, 0x3, 0x1, &(0x7f0000ff9000/0x4000)=nil, 0xfffff001}) 18:05:20 executing program 1: 18:05:20 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:20 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:20 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:20 executing program 1: 18:05:20 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000000)=0x3f, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x1, 0x0, @loopback}, {0xa, 0x4e21, 0x5, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff]}, 0x5c) 18:05:20 executing program 1: 18:05:20 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [], 0x2}) 18:05:21 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x90ec425e00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:21 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:21 executing program 1: 18:05:21 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x100, 0x0, @ipv4={[], [], @broadcast}}, {0xa, 0x0, 0x0, @mcast1}, 0x1}, 0x5c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0f0000000000000000010f00000008000300", @ANYRES32=r7, @ANYBLOB="0500eb03c000329d9f497103bcce5f91a99538005d6f57b0"], 0x24}}, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x4c, r9, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK={0x20, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8e35}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000002580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000025c0)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) getsockopt$netrom_NETROM_N2(r12, 0x103, 0x3, &(0x7f0000000040)=0x8, &(0x7f0000000080)=0x4) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r4, &(0x7f0000002680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000002640)={&(0x7f0000002600)={0x34, r6, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r10}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x80) 18:05:21 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:21 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [], 0x3}) 18:05:21 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x97ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:21 executing program 1: 18:05:21 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [], 0x4}) 18:05:21 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:21 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xf5ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:21 executing program 1: 18:05:21 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [], 0x5}) 18:05:22 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2300, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:22 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000000)={0x7, {{0xa, 0x4e22, 0x40, @local, 0xd7d}}}, 0x88) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:22 executing program 1: 18:05:22 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [], 0x6}) 18:05:22 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:22 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:22 executing program 1: 18:05:22 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [], 0x7}) 18:05:22 executing program 1: 18:05:22 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [], 0x8}) 18:05:22 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x8) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x101, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r3, 0x3}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000140)={r3, 0x0, 0x71}, &(0x7f0000000180)=0x8) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x800, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r4, 0x107, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:05:22 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}], [], 0xff}) 18:05:23 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xf9fdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:23 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:23 executing program 1: 18:05:23 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3e11, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:23 executing program 0: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r4) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) keyctl$search(0xa, r2, &(0x7f0000000540)='id_resolver\x00', &(0x7f0000000580)={'syz', 0x3}, r4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r4) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:23 executing program 4: arch_prctl$ARCH_GET_CPUID(0x1011) r0 = socket$inet6(0xa, 0x805, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, &(0x7f0000000040)={0x4, 0x16}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) fsetxattr(r3, &(0x7f0000000080)=@known='system.advise\x00', &(0x7f00000000c0)='\x00', 0x1, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDCTL_DSP_GETOSPACE(r5, 0x8010500c, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x2, 0x0, @empty}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:23 executing program 1: 18:05:23 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfbffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:23 executing program 1: 18:05:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0xa0b, 0x5, 0x8, 0x109}, {0x2, 0x1, 0xff, 0x2647}, {0x7, 0xa7, 0x80, 0x100}, {0x8, 0x9, 0x0, 0x2}]}, 0x10) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c8a38ce02f17892971000"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000100)={0x1, 0xc, 0x4, 0x40000, 0x3ff, {0x77359400}, {0x2, 0x0, 0x8, 0xb1, 0x7, 0x0, 'gf0C'}, 0x7, 0x4, @planes=&(0x7f00000000c0)={0x5, 0x33, @userptr=0x80, 0x4}, 0x9, 0x0, r0}) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000240)) open(&(0x7f0000000280)='./file0\x00', 0xdcc4d46df79d0837, 0x180) 18:05:23 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:23 executing program 1: 18:05:23 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat(r4, &(0x7f0000000000)='./file0\x00', 0x1c3640, 0x140) ioctl$VT_GETMODE(r5, 0x5601, &(0x7f0000000040)) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x100000, @loopback}, {0xa, 0x0, 0x0, @mcast1, 0x3}}, 0x5c) 18:05:23 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfcfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:24 executing program 1: 18:05:24 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:24 executing program 1: 18:05:24 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x1, 0x80000]}, 0x5c) 18:05:24 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:24 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:24 executing program 1: 18:05:24 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfdffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:24 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$ASHMEM_GET_SIZE(r6, 0x7704, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:24 executing program 1: 18:05:24 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:24 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:25 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="8769643d", @ANYRESHEX=0x0, @ANYBLOB="1ed07bca94b6e51b129e86ea2c00"]) truncate(&(0x7f0000000000)='./file0\x00', 0x7) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r4, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getrule={0x1c, 0x22, 0x1, 0x70bd26, 0x25dfdbfe, {0xa, 0x10, 0x80, 0x6, 0x0, 0x0, 0x0, 0x8, 0x10010}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4081}, 0x8000) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}]}}}, @IFLA_MASTER={0x8, 0x4, r2}]}, 0x40}}, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r7, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x0, &(0x7f0000000200)={0x3}, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x8001, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x200}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x10, &(0x7f0000000440)={&(0x7f0000000100)=""/190, 0xbe, r8}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f00000009c0)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000ac0)=0xe8) setxattr$trusted_overlay_upper(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="00fbb204002ab88c2707e5cb989814efb68e9689a1b1752d0219b045ba60af947b4bddc7aca0f93f97b77d12a362e251319b5ee8387f7f659c046e601a051398eb18d2896f56158e446ac478f0afa2955a1f27acd6285da314febcb71f34a4eb24e1e1ba1d686e6ef7fee7b5f631b19e4a2d656431407de783409f8c50ad1576ace1c900000000000000000bf387cd29b42f673a224dae62a8646ffe9b2e5cca8fc3f23ffeb795834bfb7171046f7799ec8d"], 0xb2, 0x0) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x19, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000140)='syzkaller\x00', 0xff, 0x0, 0x0, 0x41100, 0x1, [], r13, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x2}, 0xa7, 0x10, &(0x7f0000000240)={0xfffffffd, 0xe, 0x0, 0xffffff7f}, 0x10, r8, r10}, 0x78) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f0000000080)='./file0\x00', r14}, 0x10) 18:05:25 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:25 executing program 1: 18:05:25 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xff00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:25 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xc27c, 0x80100) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000080)={0x1, 0x7}) r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f0000000000)={'veth1_to_team\x00', 0x800}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) r6 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r9, 0x300, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x1}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4044804}, 0x24000000) ioctl$SNDCTL_DSP_SYNC(r8, 0x5001, 0x0) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x24, r4, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xab7b69c85ac43f3f}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r4, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0xc000) r10 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:25 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r3, 0x202002) keyctl$chown(0x4, r3, r1, r2) r4 = socket(0x10, 0x5, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r7, &(0x7f0000367fe4)=""/91, 0x275) splice(r0, &(0x7f0000000000)=0x80000001, r7, &(0x7f0000000040)=0x10000, 0x100, 0x0) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r8, 0x202002) keyctl$chown(0x4, r8, r5, r6) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r12 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r12, 0x202002) keyctl$chown(0x4, r12, r10, r11) syz_mount_image$cifs(&(0x7f0000000080)='cifs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)="f9fef4d96c1c498a181b4a0be6da3988f3e1c0e0bd104ca568699dce684fad87b707b601a0360a42b002dff5", 0x2c, 0x1ff}, {&(0x7f00000002c0)="41e860e336a40e75a64aef79214ddc0cf7e8354fef991c47cb0e6545ceabf35ab69ba4adad40f05bbb466dd9b887dd2595402346ceb4866241f77273b051e314f7ab629a", 0x44, 0x9}, {&(0x7f0000000200)="67a45cc428f30d6d8cb65c84e7", 0xd, 0x7ff}, {&(0x7f0000000340)="f9fe3cb5e6d758ceb15b809aa4fc5d39532599acb2400f15c852f04f8b", 0x1d, 0x10000}], 0x108000, &(0x7f0000000400)='syz') syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x200000, &(0x7f0000000240)={[{@errors_remount='errors=remount-ro'}, {@discard='discard'}, {@quota='quota'}, {@nointegrity='nointegrity'}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) 18:05:25 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:25 executing program 1: 18:05:25 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e24, 0x5, @rand_addr="25f3912afa97950d8cbe754454a13044", 0xff}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x2, 0xd172560ec187f718) ioctl$TIOCSPTLCK(r4, 0x40045431, &(0x7f0000000040)) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r5, 0xae78, &(0x7f0000000100)) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:25 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:25 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xff0f000000000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:25 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ocfs2_control\x00', 0x4001, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f00000002c0)={0x1, 0x1ff, 0x0, 0x5, 0x3, "27e03e01d7b3c24b"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = socket$inet_dccp(0x2, 0x6, 0x0) getpid() sched_setscheduler(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r3, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000000480)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000500200000801000000000000080100000000000000000000b8010000b8010000b8010000b8010000b801000003000000000000000009000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000080100000000000000000000000000000000000000003000636f6e6e6d61726b000000000000000000000000000000000000000000010000000000000000000000000000000068004354000000000000000000000000000000000000000000000000000000020100000000000000000000007070747000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000b000000000000000000000000000000000000000000040004c4f4700000000000000000000000000000000000000000000000000000000005c6fc2e7275395b17d34dd6dc85df343fd190001e1c0a3a6997adc537e09000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x2b0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r3, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1400002f008c112aa5e93d6bed0000000000000000796267d87b17dee5d491209e0c5f081dcb6a5d46495aef808dd6b02e9eda5346314e00ac24", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00'], 0x14}}, 0x0) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) r7 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000040)) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:26 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x0, &(0x7f0000000400)) ioctl$void(r0, 0x5450) [ 2640.809864][ T27] audit: type=1400 audit(1581444326.402:3875): avc: denied { name_connect } for pid=1102 comm="syz-executor.4" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 18:05:26 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:26 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x44, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r5}]}}}, @IFLA_MASTER={0x8, 0x4, r3}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', r5}) 18:05:26 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:26 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) lsetxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380), 0x24, 0x0) 18:05:26 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffefffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:26 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:27 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x3, &(0x7f0000000100)=[{&(0x7f0000000240)="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", 0x1000, 0xffff}, {&(0x7f0000000080)="8865be6daf9dfc3cf5f026f3cda8e4c6cdefab1fc16b5e100386c521279abac20cada5fc3f7cff58a6e394fe6860a9dfb7f11dabc7f466acd477bd263f9e34173c5b5af62ed546a72bfd05589a43f30169dc0e4d2922695e6287809a07d196b3bc130b4edd0b055ae635db2d88", 0x6d, 0x6}, {&(0x7f0000001240)="ce472914cf26a1aa8e2fe416ddaf47ec5b7ed9965f26a6d707acd8c0dec4268143db052a09d0f704441ce41ab74e566d1f7cc6dddc750c74e7744d8c48ce5483b9df4591af84fdbcae63d57faa6208a9318b4c2be82a58dacedc1192619baa1ac532ee6a446e273ec9b4eae1fe40e5ddbb87514419e71303f368ed5045ad3ceb3eb9f3a6aac5bbfcb66502976890664d3f42cf900b33e5d174413da1cfce325b9863787b40b4468d483277b99d12289f166559b90980ae162dae3286077afb4684faf6947800b235f7852201caebca5f", 0xd0, 0x3f}], 0x2891c60, &(0x7f0000000180)='\x00') [ 2641.426146][ T1102] dccp_close: ABORT with 1061 bytes unread 18:05:27 executing program 1: bpf$BPF_BTF_LOAD(0x35, 0x0, 0x0) 18:05:27 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:27 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:27 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:27 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x206081, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000040)={0x2, 0x0, [], {0x0, @bt={0x6, 0x9, 0x0, 0x2, 0x0, 0x6, 0xffff430a, 0xd984, 0x4, 0xb6a, 0x1, 0x200, 0xff, 0xaec, 0x15, 0x20, {0x10000, 0x4}, 0x8, 0x2}}}) r1 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000480)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) ftruncate(r1, 0x8) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f0000000100)=""/82) 18:05:27 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:27 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r9, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 18:05:27 executing program 4: socket$inet6(0xa, 0x3, 0x3a) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:27 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffffffffff0700, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:27 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000001880)={@local, @rand_addr, 0x0}, &(0x7f00000018c0)=0xc) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000001900)={@ipv4={[], [], @empty}, @ipv4={[], [], @remote}, @remote, 0x7fffffff, 0x88, 0x8, 0x400, 0x40, 0x4, r4}) 18:05:27 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$selinux_context(r1, &(0x7f0000000000)='system_u:object_r:etc_runtime_t:s0\x00', 0x23) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="67fc7a03f99ec8ad020067392d8aa4241a1f31c137a3294c0c5275de49254492865138a162b60f83cb70354ea3a0b1585b76", @ANYRESHEX=0x0, @ANYBLOB=',nodiscard,\x00']) 18:05:27 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000001480)={0x7, 0x0, [{0x1000, 0x53, &(0x7f0000000080)=""/83}, {0x1000, 0x30, &(0x7f0000000100)=""/48}, {0x6000, 0x1a, &(0x7f0000000140)=""/26}, {0x100000, 0x1000, &(0x7f0000000240)=""/4096}, {0x2, 0x50, &(0x7f0000001240)=""/80}, {0x4000, 0xb7, &(0x7f00000012c0)=""/183}, {0x6000, 0xfc, &(0x7f0000001380)=""/252}]}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x1000, 0xfff}, &(0x7f0000000040)=0x8) 18:05:28 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffffffffffff7f, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:28 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup2(r1, r0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, 0x0) socket$inet6(0xa, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) syz_open_procfs(0x0, 0x0) 18:05:28 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000000)=""/43) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:28 executing program 4: socket$inet6(0xa, 0x3, 0x3a) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev, 0x1}, {0xa, 0x1, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0xfffffffe]}, 0x5c) 18:05:28 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:28 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="fa8a9dea7d1832054e535865cdccae9009189ec9c46997c558c9ce7db9770a0a28fd8b06e061d82ac60b713a226095c45c067a", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = getegid() chown(&(0x7f0000000240)='./file0\x00', r1, r2) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x2c002, &(0x7f00000000c0)={'trans=unix,', {[{@access_uid={'access', 0x3d, r1}}], [{@subj_role={'subj_role', 0x3d, 'eth0\xc2(selinux'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'gid'}}, {@appraise='appraise'}, {@measure='measure'}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) 18:05:28 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:28 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x9, {{0xa, 0x4e23, 0x4, @mcast2, 0xfffffff7}}, {{0xa, 0x4e24, 0x1, @ipv4={[], [], @multicast1}, 0x8}}}, 0x108) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x4e20, 0xffffffff, @dev={0xfe, 0x80, [], 0xfe}}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xfffffffd, 0x3]}, 0x5c) 18:05:28 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:28 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup2(r1, r0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, 0x0) socket$inet6(0xa, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) syz_open_procfs(0x0, 0x0) 18:05:28 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB='\x00'/11]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 18:05:29 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x20, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x69a3}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x124, r5, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x30, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x55a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}]}]}, @TIPC_NLA_BEARER={0x88, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x9, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e23, @local}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}]}, @TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffff8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}]}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x200}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x81a9}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x200080d5}, 0x404c010) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:29 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@gid={'gid'}}]}) 18:05:29 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup2(r1, r0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, 0x0) socket$inet6(0xa, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) syz_open_procfs(0x0, 0x0) 18:05:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0xb02]}, 0x5c) 18:05:29 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:29 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:29 executing program 0: r0 = getuid() syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[], [{@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'dont_appraise'}}]}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r7, 0x202002) keyctl$chown(0x4, r7, r5, r6) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='dont_appraise', 0xffffffffffffffff}, 0x30) r10 = getpid() sched_setscheduler(r10, 0x5, &(0x7f0000000380)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000240)={{0x2, r2, r3, r0, r6, 0x1, 0x5}, 0x5, 0xfffffffffffffffb, 0x0, 0x2, r9, r10, 0x5}) 18:05:29 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:29 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup2(r1, r0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, 0x0) socket$inet6(0xa, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) syz_open_procfs(0x0, 0x0) 18:05:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x1, {0x4, 0xfffffffd, 0x5}}, 0x46) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:29 executing program 0: r0 = creat(&(0x7f0000001700)='./file0\x00', 0xc7be286efdc01060) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000001740)="331e5209b6a36711d87011dc9a0b0470", 0x10) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000001600)=0xe8) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x5, &(0x7f0000001400)=[{&(0x7f0000000080)="b7c5cd0edf8d05e77a89dab30cde3133ac7180844b0ea238fa002fdb4e80804e2782aaed56aaaafc57", 0x29, 0x8}, {&(0x7f0000000240)="911f5eac81cdca70b4f48e7c3e2d9638dea0a8f9c8f1c0b2b308a21758a81c00214d04fcb36987c7d5719c06618164e7021d546c8fa74ed6576f233071a899ce6b918998663817e271b04da993a4645a34bda7f96327f183f4cd6f11417b307b7f079ec6c9276ce1b420b19243ea27ebea61951bc3c53ac9cc042fc2e76f4cbe44a435b3c5c9e505c4bc6b285b40b8f0a4cbbc239a765cf3eaee3313758f73468dd83f38fdf6e25a62bd91cdc8f0060649633ae2517bbddb03d90ccb39f1ae8704378bdb4101bcc496e09dd7dc72d6d5f059b3e6fcb8f7667b17d74d374b6d2f446852dc5a2133c2bac92c7d271ce2938beae9197f", 0xf5, 0x4}, {&(0x7f0000000340)="ddb2c303ade8afb3c4b4c3886fd25c21859a345a3b211aed9f62cedda031d67b1bf5345757a133cb1b0ece3063bd1f45a63f01a73020324c1ce5a3e58399d55e4906cf485284f0d8d1db863c4ae606df109d57fa69cfed150e535d7fd718a8e1949f45ea9b9ede19084e72fc050efd67a288374dc8d38f491eb89f32906be91dec264a86b08def", 0x87}, {&(0x7f0000000400)="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", 0x1000, 0x548}, {&(0x7f00000000c0)="4fa40dd6556225cfe3eb1f5d8d85d48ee6557efa2f5cdd10f78d510233b2477ef6d146db28a98a674381fdd0bb585f8a3b15b31ff2f374f57f", 0x39, 0x8}], 0x2814080, &(0x7f0000001640)={[{@errors_remount='errors=remount-ro'}, {@errors_continue='errors=continue'}], [{@uid_lt={'uid<', r1}}, {@subj_role={'subj_role', 0x3d, '@GPLmd5sum'}}, {@fowner_gt={'fowner>', r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x38, 0x32, 0x55, 0x36, 0x0, 0x63, 0xdfa8c9efb9cc5cce], 0x2d, [0x64, 0x36, 0x63, 0x66], 0x2d, [0x62, 0x63, 0x34, 0x65], 0x2d, [0x65, 0x66, 0x33, 0x37], 0x2d, [0x32, 0x31, 0x68, 0x38, 0x37, 0x32, 0x39, 0x31]}}}]}) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x800400, &(0x7f0000000100)=ANY=[@ANYPTR64, @ANYRESHEX=0x0, @ANYBLOB="62c3", @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYRESHEX, @ANYBLOB, @ANYRESOCT, @ANYPTR64]) 18:05:29 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup2(r1, r0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, 0x0) socket$inet6(0xa, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:30 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:30 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:30 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x2}, 0x5c) r3 = openat(r2, &(0x7f0000000000)='./file0\x00', 0x21a100, 0x8) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000040), 0x4) 18:05:30 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:30 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000000)={{0x0, @empty, 0x4e22, 0x1, 'sed\x00', 0x4, 0x0, 0x67}, {@empty, 0x4e22, 0x4, 0xfa72, 0xfff, 0x20}}, 0x44) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000080)={0x5, 0x2, 0x4, 0x1000000, 0x9, {0x0, 0x7530}, {0x1, 0x0, 0x2, 0x8, 0x3, 0x81, "fce43b79"}, 0x6, 0x3, @offset=0x9, 0x100, 0x0, 0xffffffffffffffff}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000100)=0x18f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$9p(r2, &(0x7f0000000240)="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", 0x1000) 18:05:30 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup2(r1, r0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, 0x0) socket$inet6(0xa, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:30 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0xfffffffffffffffa, 0x40000) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000140)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) sched_getparam(r4, &(0x7f00000000c0)) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x1000]}, 0x5c) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r5, 0x401845ff, &(0x7f0000000040)={0x2, 0x6, 0x6, 0x5c, 0x20, 0x999}) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) 18:05:30 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:30 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:30 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup2(r1, r0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, 0x0) socket$inet6(0xa, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:05:30 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="676964c755fa879f0254ac7860cf3d", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) 18:05:30 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x7) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:31 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:31 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000001700)) 18:05:31 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:31 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:31 executing program 0: r0 = msgget(0x1, 0x400) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/210) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:31 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup2(r1, r0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, 0x0) socket$inet6(0xa, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:05:31 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:31 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f0000000000)=0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:31 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup2(r1, r0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, 0x0) socket$inet6(0xa, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:05:31 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x8, 0x2a4300) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f00000000c0)) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@gid={'gid'}}], [{@dont_appraise='dont_appraise'}, {@dont_appraise='dont_appraise'}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 18:05:32 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:32 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$VIDIOC_S_PARM(r2, 0xc0cc5616, &(0x7f0000000000)={0xa3fb78be440099f2, @capture={0x1000, 0x1, {0x80000001, 0x3f}, 0x8, 0x1}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r8, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x3, 0x10}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r10, 0x3}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f0000000200)={r9, 0x2, 0x3, 0x0, 0xffe0, 0x800, 0x2, 0x9, {r10, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}}, 0x5, 0x71a7, 0xffff, 0x6, 0x40}}, &(0x7f00000002c0)=0xb0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, [], 0xa}, 0xc3f0}, {0xa, 0x0, 0xfffffffe, @mcast1}, 0x0, [0xa, 0x6, 0x0, 0x0, 0x0, 0x8, 0x0, 0x20]}, 0x5c) 18:05:32 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:32 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="67696404", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40081, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPATH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x28, r2, 0x2468825185d9173d, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000080)={@initdev, @loopback, 0x0}, &(0x7f00000000c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$PNPIPE_IFINDEX(r7, 0x113, 0x2, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x4) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80100008}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x38, r2, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'macvtap0\x00'}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x11) 18:05:32 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="67e4643dbf325895b4ee6410c1c1a6045d7a4bf307e382a2e60db74da91eb9af841c45a314c7bb92c2467885bcb5c15c4286abafe74379450995d263938f05c9bf329758dda76d5df5e726933be3dae07330802784a64f851d172ca879cea531ce", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$FUSE_INIT(r0, &(0x7f00000000c0)={0x50, 0x0, 0x7, {0x7, 0x1f, 0x74, 0x8400, 0x9, 0x5000, 0x1}}, 0x50) getuid() 18:05:32 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:32 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup2(r1, r0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:32 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:32 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @remote, 0xffffff81}, {0xa, 0xfffc, 0xffffffbd, @mcast1}, 0x0, [0x200, 0xfffffffe]}, 0x5c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RXATTRCREATE(r4, &(0x7f0000000000)={0x7, 0x21, 0x2}, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$IPVS_CMD_SET_SERVICE(r6, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2080004}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x40000) 18:05:32 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:32 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='gId=', @ANYRESHEX=0x0, @ANYBLOB=',\x00']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) close(r2) setsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000000)="ce7a4047508030d53560d5338b095569affce99c850768c5f10736814f02ce4b50879cf2ff5544e5d07013ec8ba2d666dc84703925981b6147468392d217364f913c67a7cd84afa5e704ffe9fb7a67a58bf892869110d4f63126620633", 0x5d) 18:05:32 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup2(r1, r0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:33 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000000)={0x0, 0xfff}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000080)={r7, @in={{0x2, 0x4e24, @multicast2}}, 0x200, 0x8000, 0x0, 0x3, 0xc8, 0x1, 0x8}, 0x9c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:33 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup2(r1, r0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:33 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:33 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:33 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2238083, &(0x7f0000000080)=ANY=[]) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x238801, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) fcntl$dupfd(r0, 0x0, r1) 18:05:33 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x1c, r5, 0x400, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040001}, 0x80) dup(r4) r6 = dup(r4) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$VFIO_IOMMU_UNMAP_DMA(r7, 0x3b72, &(0x7f0000000040)={0x18, 0x3, 0x69c1, 0x81}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:33 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xff00, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:33 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xb, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:33 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup2(r1, r0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:33 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@resize_size={'resize', 0x3d, 0x3}}]}) 18:05:33 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:33 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f00000003c0)={0x88, 0xa, 0x4, 0x2000, 0xfff, {r2, r3/1000+30000}, {0x2, 0x2, 0xcb, 0x8, 0x9, 0x8, "20b26e58"}, 0x6, 0x4, @userptr=0xdb9, 0x81, 0x0, r4}) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000600)={0x81, 0x5, 0x4, 0x10000, 0x8001, {}, {0x2, 0x1, 0x81, 0x8, 0xe3, 0x3, "df340175"}, 0x1, 0x1, @planes=&(0x7f00000005c0)={0x2f5ade09, 0x7, @userptr=0x9, 0x400}, 0x4, 0x0, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f0000000140)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$sock_inet_SIOCADDRT(r8, 0x890b, &(0x7f0000000240)={0x0, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e24, @loopback}, {0x2, 0x4e24, @remote}, 0x14, 0x0, 0x0, 0x0, 0x9a15, &(0x7f0000000000)='veth1_macvtap\x00', 0x9, 0x100000000, 0xc5a}) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x1f, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f696e746567726974792c6572726f72733d72656d6f756e742d726f2c666f776e65723c87fa25b0b8d27c18b710ecec1d654524b3a276254493b853b71e45497bfd4e5c173d3721c4a2a7934b7117e0", @ANYRESDEC=r6, @ANYBLOB=',fsname=jfs\x00,smackfsroot=errors=remount-ro,smackfshat=,pcr=00000000000000000019,\x00']) 18:05:33 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r4, 0x6, 0x7, &(0x7f0000000000)=0x3, 0x4) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101]}, 0x5c) 18:05:34 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xc, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r2, 0x3}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={r2, 0x20}, &(0x7f0000000040)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x6b) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000c40)=ANY=[@ANYBLOB="4000000010000507000000000000000000000000ebc560a10da445932e482b6085b05aacebca9dfe6d0d189a77380ee6df021228e1ea57dbba9c79c1b3419ae1dce3e4bcbc23d0685b86bab62e7e5ac379dae398c4eacf64c225e650fc559268967b293c756b7101d14764a0f7d459a8ca21ac760500bcec613bba00dc5e83a9f197dc7d36f1398b9e00000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100736974000c00028006000e000900000008000400", @ANYRES32=r7, @ANYBLOB], 0x40}}, 0x0) sendmsg$kcm(r4, &(0x7f0000000c00)={&(0x7f0000000100)=@xdp={0x2c, 0x0, r7, 0x5}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000080)="ffd01d3a46f1dde7ae698f1ba38ff139b4407e372226e4b50e2d6599672309be6a093e7830b26033f4b06a8a6fd0a9ae9ab099cb45f64399040fe8133b", 0x3d}, {&(0x7f0000000240)="1424bf2d18dddc7127e12e5f06519a149ab4d799d35a3518ffdaea1ea2b9983e46f9d2715587c211a4bd4df6e26480efa304a4e0109e02e3894ffb531812d1dcaebb3c4f3d3bdff9c907c954c253a47f04db9d367a0c5afc431b9355fb111f0fd920e04cb19f44291029f9a527f21d86f207055f31c225a9307c7a13a3937a6b777e9598424f66074fbe6a597478e07373e54ffa537ba45283664a013f7bf1cbd80ff5d3ddccd3bfedd606e3bdbed1077f8c15e0039e891a035b", 0xba}, {&(0x7f0000000380)="8f36fd316a50b22ab0ac4c9f02456a55294a71fdcb8fc653aab625f83cd501a5a996273eb0543835c0b27361cef95b146f4b3034dba7693237a821792d32c56dd74e404c38422e0e894fc5e9f203ab74d2278b426fde7f490d9350a0c8618ee5581fb157ac3c3be842f8f82d0303e927a5e8d10c5ffab44a6a271958a67e67e38e657a293f867019b7aa89dee7299bf5072076d386146731f4e1c2d361383cef3a733259a6216392023f30d1d182637970527aa72075160cf022413b4fcb7998643ddc62ed9d3f9551b246a21c664615aab03c62a9b2d276bf7edee1fea1bd8019e7fa60d8f6cc8f44f027960f05e35850810a", 0xf3}, {&(0x7f0000000480)="71f17d3fd00ab0e1bbad168b3f3dac16915abc4c8f5103e45bbe01dab7b4c4a441219a8db543e61a38079493ac6a7458163b342cb7a277be9ab2c0a35167f938a73ca54935aeaaf4c735fb2231e88275c576d09e3415fe51d9537cc9c042a37be2b2481371904ada1c440c10275c60aa257127f542ba2fe4051ed791d4f1d6e45f62cdf80726929d6a0c316453da4bd72a67ab9e1cc9c231ee378c3c002ac20acb665d50af99c7fb64ffd1c2349b92b32d440d6508a302c03f8e894f0de6303ff4bec81a3f0bbbef251c11af99737a92cb9dcf02c7ff8846addd1954e0e006cdadde", 0xe2}, {&(0x7f0000000300)="959d6f7e59e7875ff79ff8f00d55b948e5ab5263112498ebd5fd0e70d8ea4133432a6500f4785f5b2a1ce5941136a74ffa045508aecb9d7d46430c48", 0x3c}, {&(0x7f0000000580)="7c0bcb1788ee396c5136495de69088a1dd73ad408eb0e8080791ba6eab91e086b01eec78fe15a48c7b605dcd16741064360bb48db1860703a1befe63796400eaa28f04f544688979fb2b9356a6935f95b374d5b42f458e7e0ef3eb26fed0274ced7e8f3189ae", 0x66}, {&(0x7f0000000600)="85450e1a2015415ad61feeb1d95861982f81b40a620fcc1749fc889ec585cd88396df11955b6233aa29c737037275d05a47912fd3bd75e05d10490a698ae3aa7b9236c2837b6c148430ea517cb05e3bcf86e2edc35c5e95a6d7eef293c43937d1f6776e66589211424bf396586795d5ae50c0629e4ef178da91ee8419e8557f192f661a172171a1204c68dde7147f2077ba033f2843478e29fc57dee6deba7ff6ae483a29906c6089871122d339f75cffae91bd3a60e6783db156bc0a798e268df8886fef081081cc023d0d14f97ae", 0xcf}, {&(0x7f0000000700)="cfbe93b4e06ee7ec703bc81146414ed48fbd35b08f3ba5745fb34642412dc0cfd478402015d8998e0ebcc3d83ae8834b016232fcdfef653d2ae34a520567c9bded4bbf", 0x43}, {&(0x7f0000000780)="04cae723adfc8a4a1ba5472bdb0143e1169ad5db1a8f460f2cb54fa4626827b3857cb8b77d474fb9654f9e832430191835b60aaf7d29822c7d9e83cff630bee7dbe078b2483058bd07d0999587d3e1b31d9e6c26b67944be3f2a33dc44b538badb1f23383648aef9ed98394a374af8ba8f695e76cbee923e22d2eb1f698d5725cef4ecaaf020e066810d6bd0c286fb776be5735b07c2cc880537926139cf435ca608f06b14bbfe6c6ef3d929285f574d2f2e787de53f84b765edf85fe831b44c462524c549aff2d9e5fad7e0f53b04da733df51e06658f8d855b1ce33d9b2d9a07bdfd4eecb29477771db56400e2fd", 0xef}], 0x9, &(0x7f0000000940)=[{0xd0, 0x113, 0x7ff, "acfddbde3c4088d7ce66c596d3615b23a056a4927b6d2bb19e48487f1eab2bc5a3d3e60bdf3e65948b71a2825be204f71b9c893aabfe45fb5542a48b4d6eab701d98a8663fb9637df907718cb8a4e4388b9407c991510aaac9883fbcdafca553eb2aafa53d31ac83027d2b3144899267f0da574e905a5f944e5273ff957522954fcabf200ff62506954c618ffb23d62bd69a33730cb7afd4ddd8d4b0eaa195abe169f55a0fb09e9b3febef7c1ef7eb5be3671bdf6d77e57215"}, {0x80, 0x11, 0xf, "17023c3116aec78e6b770244b912d404960c3cb66e7a18ed5b146d1ea3a0f02b630aad64fa7208fdb6ea04a4c60c1aea30ee62818f6092f05b736866d89ef19ac5578634bf5529f0e7144ad66c21acaf8bd737a0e2a9945567153c92874314cd437f72f2ed1dd83c535bba01494845"}, {0xb0, 0x109, 0x1, "0319d0b52b98f66fd780e4d98da6ed806b8b6083d6d24a8a0c69e5c2c55ed7770d2f278f5eeeed3f4e95f4e52d86e8b5fde83501c5858157c1f2922e337bd5a6f1ba1b755710060da2af4db3a11282baa53cad8580cacf8d20a73212eae55ef1539412b27aab2554e70892e4a86e467174775efe086181c529e2597f16235963ad2316be873f17a4c0936c037cb2bf540710fa7c6acb8e3b05957a54"}, {0x90, 0x103, 0x2a9e, "e5e9afe210e48989144b3325d6356a31046a37852e604acefd86ffebeccef0833abb19bbcab59506176e8005db3e9aac4e88d919c9961c924671f93aca1185dd80744ba31a1705c43833d3a90fff77483abb7aef895509074594abd8151e3968f5dbfb7f00a2569048579a3ab74d87cb8439303918883b611312d261"}], 0x290}, 0x40081) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c04"]) 18:05:34 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:34 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2648.830679][ T4339] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 18:05:34 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xff0f, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:34 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x14}}}, 0x5c) 18:05:34 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) dup2(0xffffffffffffffff, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:34 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='scalable\x00', 0x9) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6769643d0dae206f76a3b1bb6c4e7b0f84aae8109eea0a01bd793eae00d66f2e35c9e1ef1edc8be3dafb15a19f8ece7deb0461cbcb448eaf98a4acac2a61f26fc3823da572e5cdedd17e982c6fecb98b46ab28354a8f9cf0db7402764b4cc5f395be58", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) 18:05:34 executing program 4: socket$inet6(0xa, 0x3, 0x3a) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet(0x2, 0x3, 0xc5) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x7ff]}, 0x5c) 18:05:34 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:34 executing program 0: r0 = getuid() syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@uid={'uid', 0x3d, r0}}]}) 18:05:34 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x23, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:35 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) dup2(0xffffffffffffffff, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:35 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x180, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x16, 0x17, 0x1, {0xd, './file0/file0'}}, 0x16) 18:05:35 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='gi\v%', @ANYRESHEX=0x0, @ANYBLOB=',\x00']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000000)={0x14, 0x3}) 18:05:35 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:35 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r4, r3) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000140)={0x3, 0x3, 0xfa00, {{0x6000000, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), r5, 0x5}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 18:05:35 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) dup2(0xffffffffffffffff, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:35 executing program 0: write$selinux_context(0xffffffffffffffff, &(0x7f0000000000)='system_u:object_r:tpm_device_t:s0\x00', 0x22) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c400c496441f12d6095e726ae9779b3d15c4472d83f02f748c8b5d1bea52c922f2445f0384863e26a19ca7f08d4"]) 18:05:35 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x48, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:35 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet_SIOCDELRT(r3, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x4e22, @rand_addr=0x5c}, {0x2, 0x4e21, @local}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x3e}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='veth1_virt_wifi\x00', 0xda9, 0x81, 0xdf77}) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x28c9802, &(0x7f0000000240)=ANY=[@ANYBLOB="7876c7c28672d1d5cd5dcd0bb9a61158c328ae0fd78c7ce02f522862b9653d419aaafafd48a592b13d422ea3157826b7506b3a6b69d228bdd1c39d432b20125b8ea0d1", @ANYRESOCT, @ANYBLOB="821b31d203fb00e48caf6ba426ab30052d578e162bc2891f15615db497c11647524e76e71b0b6fd6c7dae6165fea"]) 18:05:35 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:36 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:36 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:36 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r12) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r13) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = dup(r15) getsockname$packet(r16, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r14, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r17, 0x7, 0xfcffffff}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, 0x0, 0x0) 18:05:36 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x2090030, &(0x7f0000001700)={[{@gid={'gid'}}]}) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x40, 0x3, &(0x7f0000000240)=[{&(0x7f00000000c0)="51e9627315121cd22aae72a1dbbfeb086a2a9950d80b62fa21b7a4cd9ee58107f97b89b5753464bc943e237c5948826ad8c77241e006397c90", 0x39, 0x2}, {&(0x7f0000000100)="036d6f072ae5eeaa49b2bb38a992e8741991baa9e6b9e025ff5b61cb", 0x1c, 0x5}, {&(0x7f0000000140)="e7e81b883582379ce2227ead209d842e65c69099480bdb8f1cbff452fcf07d114d7402a8abf07fcc61379fd2927dfc0f96746fafeca05b0d69f18b2696d34e7e43cfec481eb1436a247a5d97c849b65581d428be0790d79fc06f7f8f5289066b6bee7dfbde5e96c13419be99f93d49da9c44d9f6983495c782c5b362cbc4215fd30985d5b4cd1c", 0x87, 0x1000}], 0xaa1010, 0x0) 18:05:36 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:36 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:36 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x18400a8, &(0x7f0000000000)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000000)) 18:05:36 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x68, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:36 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:36 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000000)) 18:05:36 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:37 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:37 executing program 4: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3f, 0x3}, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0xf2d138372113268e, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f00000005c0)=ANY=[@ANYBLOB="010000000000000000000000040000000000000000000000ddff0000fd000000000000000000000000000000000000007d740000000000000000f0124a61face70920ded5b264bcde8a2e4f31b033ec28b4e01991c194d35b22831c2716adfbe72f65002f4c281a2a3dc874108588befdb8852bea78e7dff87f6c3f06cbb182219a0e0dc19a35d6a20a0baa2ed8dbc6ac4b60b7f4e7ffe38f2fe2a2c4939b9b25f749f73e12d4bd5e87e95dd23edb42e1c32e320a5ca666680be6614a3cf26b90191e7c3df6d6d82509f353da9f69b2ca36986f7870e6f438d"]) 18:05:37 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r0, 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:37 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) sendto(0xffffffffffffffff, &(0x7f0000000000)="89474929dc321e1700728f05625bb601b690741bfcc6856516735e1162de788cfea0529898", 0x25, 0x24000000, &(0x7f0000000040)=@pptp={0x18, 0x2, {0x1, @multicast1}}, 0x80) 18:05:37 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:37 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r0, 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:37 executing program 4: r0 = socket(0x2, 0x6, 0x0) close(r0) 18:05:37 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000040)=""/85) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8983, &(0x7f0000000000)={0x7, 'bond0\x00', {0xffff71ac}, 0x5}) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB='1\x00']) 18:05:37 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x74, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:38 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r0, 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:38 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:38 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x1047060, &(0x7f0000001700)={[{@gid={'gid'}}]}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x90400, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000040)={0x2, 0x1, 0x0, [{0x0, 0xd5f, 0xe64f, 0x2, 0x5, 0x81, 0x1}]}) 18:05:38 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:38 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 2652.810267][ T5517] gfs2: not a GFS2 filesystem 18:05:38 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x410000, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x5, 0x1, 0x7fffffff, 0x2, 0xe, "3a4949ef3bd1674768688a383c30ec750c111c"}) 18:05:38 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:38 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:38 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:38 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:38 executing program 0: r0 = socket(0x10, 0x2, 0x0) getpeername$llc(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@discard='discard'}], [{@appraise='appraise'}, {@hash='hash'}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@uid_lt={'uid<', r1}}, {@subj_role={'subj_role', 0x3d, 'jfs\x00'}}, {@dont_hash='dont_hash'}, {@obj_user={'obj_user', 0x3d, 'jfs\x00'}}, {@uid_lt={'uid<', r3}}]}) 18:05:38 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:39 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:39 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x148, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2653.428104][ T5689] gfs2: not a GFS2 filesystem 18:05:39 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x3, 0x0, 0x0, 0xc001, &(0x7f0000000240)=ANY=[@ANYBLOB="67698102", @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYRESOCT=r3, @ANYBLOB="1d988c61fc2b4d80a5b1a05f8dcd9ee00fb1d707bf11182956615b2230c426604211af75ac71523d39321877df848e8551096684d489", @ANYRESHEX=r1, @ANYBLOB="9b877e29628f9256b791a137e73c04bd0d6a8775bc17dca53cafede8de49568e5967e8df4ea0aaee76483299f9b361f93f298b9006fcf5b4a32328056cae781c8303acc114e8b370b1ced4bd59325047ed0a29f6e400338621912a3358a575e33687eef0978f4c6ce2422dd2ea0d231474ce3506bef8d83f436d222cebdfaafe03873b47263d31451159a1bdd3c70c342fc4122bd7f5a6e87c686bab7b41cf5d4215cdb151b2859db9c2cc2a53a4efa32f1893a379d5a4f2bf0d", @ANYRES16=r4, @ANYRESHEX=r0], @ANYBLOB=',fowner<', @ANYRESDEC, @ANYBLOB=',smackfsfloor=jfs\x00,smackfsroot=selinux,+/md5sumbdeveth0,context=staff_u,appraise,uid=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) sendmsg$IPSET_CMD_TEST(r5, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IPSET_ATTR_DATA={0x30, 0x7, 0x0, 0x1, [@IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0x1}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_IFACE={0x14, 0x17, 'syz_tun\x00'}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x40008c0}, 0x8005) 18:05:39 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x0, 0x0, 0x840a0, &(0x7f0000001700)) 18:05:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:39 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:39 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c00ba127581db679af5d1f5e823140f4c8fb47ebbe503210b14f1170e37693b603b82d979b84d34ea855a38161aaef6f5f6676135179698ec20c113bc370cab00472138c51f3d20395b923b9d032c2f21f5afbcdc3cc185a6a191a91dbab4f881c448493581daec85f649d358e26541211e0f36a1"]) [ 2653.803433][ T5780] gfs2: not a GFS2 filesystem 18:05:39 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:39 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:39 executing program 1: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:39 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:39 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x400, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x0, 0x0) statx(r2, &(0x7f00000000c0)='./file1\x00', 0x100, 0x40, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) accept$ax25(r0, &(0x7f0000000100)={{0x3, @bcast}, [@netrom, @netrom, @bcast, @netrom, @default, @remote, @rose, @bcast]}, &(0x7f0000000180)=0x48) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000240)) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x20, &(0x7f0000000340)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@rq={'rq', 0x3d, 0x7ff}}, {@rq={'rq', 0x3d, 0xffff}}, {@sq={'sq', 0x3d, 0x10001}}], [{@euid_gt={'euid>', r1}}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@appraise_type='appraise_type=imasig'}, {@dont_measure='dont_measure'}, {@audit='audit'}, {@fowner_eq={'fowner', 0x3d, r3}}]}}) [ 2654.354072][ T5903] gfs2: not a GFS2 filesystem 18:05:40 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c00f8506d3b95324421499cad7d25a7ee22ad0553c36174f5810998a0d5829e2c645ad7dc6f0421957fb6851f5ca5cc43bffaab2ee911582acc5827393bdcd0cdf109249797b0950a2f1300"/100]) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet_buf(r0, 0x0, 0x2d, &(0x7f0000000000)=""/97, &(0x7f0000000080)=0x61) 18:05:40 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:40 executing program 1: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:40 executing program 1: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:40 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:40 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@gid={'gid'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x63, 0x61, 0x39, 0x33, 0x63, 0x30, 0x31, 0x61], 0x2d, [0xf, 0x39, 0x30, 0x62], 0x2d, [0x33, 0x30, 0x38, 0x34], 0x2d, [0x32, 0x33, 0x65, 0x39], 0x2d, [0x33, 0x30, 0x37, 0x66, 0x63, 0x33, 0x39, 0x64]}}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@subj_role={'subj_role'}}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r1}}]}) [ 2654.907864][ T6004] gfs2: not a GFS2 filesystem 18:05:40 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:40 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:40 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:40 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x80, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x80082102, &(0x7f0000000080)=r2) 18:05:40 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2655.325276][ T6054] gfs2: not a GFS2 filesystem 18:05:40 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:41 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:41 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r1, 0x3}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r1, @in={{0x2, 0x4e24, @rand_addr=0x1}}, 0x9, 0xb4, 0x20, 0x5, 0x8}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={r2, 0xdc, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x1, @empty, 0x7f}, @in6={0xa, 0x4e24, 0x7f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e21, @rand_addr=0x3}, @in6={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x22}, 0x48b7}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e20, 0x5, @remote, 0x5}, @in6={0xa, 0x4e20, 0x8, @ipv4={[], [], @multicast2}, 0x4c7}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e20, @remote}]}, &(0x7f0000000180)=0x10) [ 2655.662442][ T6175] gfs2: not a GFS2 filesystem 18:05:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:41 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c00cfb852cd3824d09736951d941ce79cf82f8e3cfea337df053afd5140439763b00ea9c35210f9136d016268322ede700c090dddbc64c59f1202b8a183ad2163877a367128f2c131c0657f191a00f60cef4bb38ad5e26462a970cca34f4d28d91cc20570a8ddf966ad4e93fce3bf75254f6b33771dbea7fc652358229f2313c97677ea056b292ca58113374d3e07771b077e3f94284e0d9bbe692a88234d7206dd159914087472a7d32f5578744388c9d9889cb893959f06f441026fd30ad97ae505f0d6805e265e44b997e2260cea858bb6401f4a319aacdd09c28fe91b44be105fb436"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = semget$private(0x0, 0x2, 0x0) semctl$GETVAL(r1, 0xcb3ef225c7a31d65, 0xc, 0x0) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f00000000c0)=""/163) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="020ebb070800000028bd7000fedbdf3602000a00580000000600000000000000043b0507698c4b230002003b0000000300000000000000f7ffffff00"], 0x40}}, 0x4040841) 18:05:41 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:41 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:41 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:41 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) prlimit64(r0, 0x2, 0x0, 0x0) [ 2656.135999][ T6293] gfs2: not a GFS2 filesystem 18:05:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) [ 2656.326903][ T6339] gfs2: not a GFS2 filesystem 18:05:42 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:42 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:42 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) sysfs$3(0x3) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r4, &(0x7f0000367fe4)=""/91, 0x275) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x1d, 0x3f, 0x8, 0x0, 0x0, 0x54, 0x1, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xff, 0x2, @perf_config_ext={0x8, 0x5}, 0x20000, 0xd145, 0x30e4, 0x1, 0x38, 0xf49, 0x8}, 0xffffffffffffffff, 0x5, r4, 0x2) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r5, 0xc008ae67, &(0x7f0000000140)={0x8, 0x10001}) dup(r3) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ipvlan1\x00'}) [ 2656.652419][ T6420] gfs2: not a GFS2 filesystem 18:05:42 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:42 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 2656.922365][ T6435] gfs2: not a GFS2 filesystem 18:05:42 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6769643d6e09a994d4ab38b817e47ee21f3bc57dd56969d0d2eb1b27408b52940e7c5a183cd02b89ba7ffd668f7e44f742104934084b32adf7258990992001cc8012f36d25", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r4) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) keyctl$search(0xa, r2, &(0x7f0000000540)='id_resolver\x00', &(0x7f0000000580)={'syz', 0x3}, r4) r6 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r8, r6, r7, 0x0) keyctl$link(0x8, r2, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SIOCAX25OPTRT(r10, 0x89e7, &(0x7f0000000080)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, 0x2, 0x56}) 18:05:42 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x8000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:42 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:42 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:42 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:42 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x82, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:43 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@nointegrity='nointegrity'}, {@discard_size={'discard', 0x3d, 0x4}}, {@nointegrity='nointegrity'}, {@discard='discard'}]}) [ 2657.507718][ T6555] gfs2: not a GFS2 filesystem 18:05:43 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) getsockname(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000380)=0x80) open_by_handle_at(r1, &(0x7f00000003c0)={0xe1, 0x0, "8f001f8621227cd07ddcc81dbc186d55054c89903efc43dff2470341a58d3d6ee8f8c40a9f5f6a9ced0c1b1fa4ce110b168ad4acfe0b1fa21644f00756adc7a4fedb45442d56da0c18e39bb044f307bc2cad7ca1f4b6740569643bcf3c3a1886a5754ed6391ded808cc9d42b0e59922f37e8aea47fb2f509700151f51dc8911ac9d35598f2481490b0502a8693b94677fb64bd38d48de8b62387527beb48a586a66ebec3829cf3bd725b912ef86af3502847a8ce4c0c79bf2ad8b4c05b963552e17cd10b9cfd599ff1989afbde733b83ffe527db28cb1d6e69"}, 0x8000) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="76b384f24c04e5b3a4a029fae1af830dd8cae47ab095d0b0dba5f926ede2ecf450e33d4813ada1e1cb7888c8a27a061275a5d33fd999a10aa78ffd35ffaf6bf3ebb4b46f0e3d5c852e1ed2b15952d0b59bc4d563ef43d215a110990c13d49caaf04aa1a7cc8b1f29fa2aa796fdb0599ae3d02a5b199565185cfa913b6af396bbdbe7e78d5e267f8b5b4564bd7bcb36c9937dd4871611ee45faa2add2bae10f340b0a0d979bae34311b3416b150f236de03d65fe95c4f77fab115cc532e467e75684a170c08d78ea185a9769b117defc4fcbf38605e930c11cfd4118a39f21f938ace55fb2f8583fc0c23b1b1cd81647f5ab5871c74cdac0d389e31939a97a477e78b", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x42000, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000100)=r3, 0x4) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000040)=0x9) 18:05:43 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:43 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 2657.972437][ T6663] gfs2: not a GFS2 filesystem 18:05:43 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:43 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x181000, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x84e00) fsetxattr$security_evm(r1, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@sha1={0x1, "7870521355a5701a4713525196e973a11ebea2e0"}, 0x15, 0x3) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040), 0x2) 18:05:44 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x9000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:44 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:44 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:44 executing program 0: r0 = getgid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000000)={0x4, 0x401, {r3}, {0xee00}, 0x7, 0x8}) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r8, 0x202002) keyctl$chown(0x4, r8, r6, r7) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x0, 0x0, 0x100000, &(0x7f0000000040)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r0}}, {@uid={'uid', 0x3d, r4}}, {@gid={'gid', 0x3d, r7}}]}) [ 2658.566672][ T6707] gfs2: not a GFS2 filesystem 18:05:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:44 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:44 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x802108, &(0x7f0000000000)) 18:05:44 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:44 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xb00, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2658.925017][ T6824] gfs2: not a GFS2 filesystem 18:05:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) dup2(r1, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:44 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="67e5a43d66d1ddd8f562206fac99268fcf", @ANYRESHEX=0x0, @ANYBLOB='\x00\x00']) 18:05:45 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:45 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:45 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(0xffffffffffffffff, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:45 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:45 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_COMPAT_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x0, 0xb, 0x201, 0x0, 0x0, {0xa, 0x0, 0x5}, [@NFTA_COMPAT_NAME={0x5, 0x1, '\x00'}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_COMPAT_NAME={0x8, 0x1, 'jfs\x00'}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20040000}, 0x4090) [ 2659.479858][ T6849] gfs2: not a GFS2 filesystem 18:05:45 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(0xffffffffffffffff, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:45 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c00ec90915bcfc05c9a50989db70fb4354bcf3e6dac3a5537fe1f7cc9bba2d8fe8af6797503ae282d5648083372e8d8ec5fd4cc9a94c42e3bca04a9c5f87a8b0b57e2a51017"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000100)=0x100, &(0x7f0000000140)=0x2) write$P9_RWSTAT(r1, &(0x7f00000000c0)={0x7, 0x7f, 0x1}, 0x7) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000000)=0xfffffff8) 18:05:45 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xc00, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2659.941537][ T6971] gfs2: not a GFS2 filesystem 18:05:45 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:45 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(0xffffffffffffffff, r0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 2660.295901][ T6987] gfs2: not a GFS2 filesystem 18:05:46 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xb000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:46 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="e7615ef5bdff2b74c14c7d9ce6eac18b"]) 18:05:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:46 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000000)=""/127) fchmod(r0, 0x50) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000001700)) 18:05:46 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r0, 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 2660.634100][ T6998] gfs2: not a GFS2 filesystem 18:05:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:46 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:46 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:46 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r0, 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:46 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@discard='discard'}], [{@dont_appraise='dont_appraise'}]}) [ 2661.159942][ T7120] gfs2: not a GFS2 filesystem 18:05:46 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r0, 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:47 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xc000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r3, 0x202002) keyctl$chown(0x4, r3, r1, r2) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r2, @ANYBLOB="60ff"]) 18:05:47 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup2(r1, r0) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 18:05:47 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2661.724000][ T7148] gfs2: not a GFS2 filesystem 18:05:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r4, 0x3}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000000)={r4, 0xad, "5b3766480e576348431133039d8a934c71b65a7e6fc8b7efb46a859473da6132e3f8bc00f17252dd5fa8bd3af33a773eaa4bb68a418e192d91f950d9c0380579b9d258fd610c5bf8b80fa9ba924ec919650ea4f3a508967d3a723611724045ad988d7fe001ee498006025bd6e0b3a04257e1323f6c5ad143805eba9757dda8ee4eb50e9202481436e0a536b8996c9beb35dece754d7253ce8f0aeae9bcb7c17775a98081c5ffaa3a17564b7a6b"}, &(0x7f00000000c0)=0xb5) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000240)={r5, 0x1000, "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"}, &(0x7f0000000100)=0x1008) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) pkey_alloc(0x0, 0x3) 18:05:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, 0x0) 18:05:47 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x113e, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:47 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:48 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/ubi_ctrl\x00', 0x101200, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r3, 0x3}, &(0x7f0000000340)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SIOCX25GFACILITIES(r5, 0x89e2, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000001300)={0x5, 0x1, 0x0, 0xfff, r3}, &(0x7f0000001340)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000001380)={r6, 0x40c}, 0x8) r7 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r8 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x20a481, 0x0) ioctl$UI_SET_SNDBIT(r8, 0x4004556a, 0x3) ioctl$FS_IOC_GETVERSION(r7, 0x80087601, &(0x7f0000000000)) [ 2662.438592][ T7347] gfs2: not a GFS2 filesystem [ 2662.480702][ T7376] attempt to access beyond end of device 18:05:48 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="ece39fe603ea6193cc854b2bb9ef0c723e28a61a70776f580fc4fa25fe8dbf313773c7a0423cc1cde429cf6273e5b43d444fb282063eb2626d554bfe1b3f712e17886c44fcc565f590c8815b3534d3"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x3}]}}, &(0x7f0000000040)=""/211, 0x26, 0xd3, 0x8}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_netfilter(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x14, 0x2, 0x100, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x8080}, 0x4000) [ 2662.604973][ T7376] loop1: rw=4096, want=136, limit=58 18:05:48 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) [ 2662.655383][ T7376] gfs2: error 10 reading superblock [ 2662.864834][ T7396] gfs2: not a GFS2 filesystem 18:05:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@lockproto_dlm='lockproto=dlm'}]}) 18:05:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000000)={0x9, 0x8, 0x4, 0x0, 0x80, {0x77359400}, {0x5, 0x8, 0xe1, 0x0, 0xff, 0x15, "5eeba394"}, 0x3, 0x4, @fd=r1, 0xe00, 0x0, 0xffffffffffffffff}) getpeername$tipc(r2, &(0x7f0000000080)=@name, &(0x7f00000000c0)=0x10) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="14053d82293a06e690a64a489cb554619765aaf77f75f5ef2ceb3f6f9cc3f500099c7a572a43eca3800fc9868a82685fd5636b3521b0719c3050fb440a8f0c4987bf53", @ANYRESHEX=0x0, @ANYBLOB="2c00cdb540b99d9328ff2f889bb845bafac80c9919c459f1cb2aa7c2b12127e2fecd3112e3f95c66d40bd112d41c9e7b108a7226a6e09d3ae9d88a22d6984479859d78e76b31ba0969a1383d6b6dcc650cc77ea3aeb73df70fe9b6f78dec3beaa85122a27e5e76323917d6a27aa38d2211b8880b3cd98a90f792f073fea77d1ec2a597851d0c56f7cf4da3ad0c248a47521195da8ba2ecdf6b"]) 18:05:48 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2663.293428][ T7508] gfs2: not a GFS2 filesystem 18:05:49 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:49 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r1, 0x5501) [ 2663.489801][ T7516] gfs2: not a GFS2 filesystem [ 2663.844186][ T7707] gfs2: not a GFS2 filesystem 18:05:49 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1f00, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:49 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000080)='pagemap\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f00000000c0)="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", &(0x7f0000000240)="e081594febcd5478ebf90bdaed5d01fd1523a7369b89bc1d25551767ae0c9d62587ad64233d6e96867675c9c236c350da81adeabab6241656a6cac30a6aacfe95ba50e88d0d205d56fedacc0fdb43b9bbb736c51a8c5fb40e552aad0aa599e26cc9c7826b03a67313655a002a80f7ea82eae3d6ca9f36c28f89dc8c89fbcb5e1b61f6b2aaf48667bd821da51065de6ef555fda", 0x2}, 0x20) getpid() syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="676964bd77df78cf7b9ca5891535ee301554007a2ac0cc581fcc0dde4be7be23f1912e5809a8972440ec6736dba6e7064ebbba", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) 18:05:49 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78ab7f34e4d5b318e2ec0efd49897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6ef3bb622003b538dfd8e012e79578e41bc5305eb57c6a14bb746c71e3ac6efdbe1d99e90f4580d78e0c9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2bcbbf35b1e7be6bc927d9eb643c50dc9be7c320df0148ba532e6ea09c346dfebd31a08b32808b8020000005500000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54860d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390af9a9ceafd07ed00b0000002cab154ad029a119ca3c9727808700146065780fd9e08f00993094af7d3d3557b651c9f00f818e85840c9573cf3bede5e915d16111b7a26d8cedc1ed7b52c9d28f1eb9df100332eb3487d38cdada4d282a0f6d6f1665bb7cd5d8accead440b82c477b63cce87b6696e2f23b80476fcd4290069bdc4f0be5f46535e7d54fa3db3803faf6828473c8f22d31a9e6ba97388bc1cf257f96ef0681502e5a3529e451e81d81098a25a1a1324a601ad3c71f9783734c7b6067c03be2ee34c256a48bcc05d9a2693091f325bd0309283d102ea6f5fcb96eaf18048b8f778817cdb7e8119a79f0bfc845cde8790bd4f0104fdfa6553ab14f5bc1794a077bd077699c3d653f65688440a8da914a9ffb177e18ebd73d923c01c841d9ccd3cbf130b69b18c4375a801902c62c8e1957b4489e6ffa865d9522696c4e1e146a5b26671c112c819fb999e927b952772469eca1047614d99d0b0672d0453fe1f9e7f9e0c4888e9635e37f8dcdf988ce01ae42f02c35afddf4aa433682c7950d8284e9d84d016674e7457c740c718ebb22ef3c9432f783d34c37ad29f2dc0613eb25743e4319565101ac5d56598c36021427a6f3518682ee87cec69f5c32dad0a8487207cc23d836b49e7b875e15c208be5859f4fa0cda02e17799142ec91dac7b60c8d54398487ef78267e6d001b5adfb67d3a9b829edc14c0c4adf9a02410dfad009a1c949a85"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001fffffff00004000632977fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 18:05:49 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:49 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:49 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00', @ANYRESHEX=0x0, @ANYBLOB="2cb44838e93e9c9f9baa0300000000000000"]) [ 2664.274476][ T7819] gfs2: not a GFS2 filesystem 18:05:49 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x2, 0x300) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000000)=r4, 0x4) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 18:05:49 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@gid={'gid'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f0000000240)={0x2, 0x1}) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x5, 0x5, [0xa, 0x9, 0x401, 0x9, 0xcf8]}, &(0x7f0000000080)=0x12) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000000c0)={0x8001, 0x3, 0x8002, 0x1, 0x6, 0x20, 0x7, 0x9, r4}, &(0x7f0000000100)=0x20) 18:05:50 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:50 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:50 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x24, r1, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="00012abd7000fedbdf25e700000005002f0001000000a766bfc0b3ca4d6eae64b91fa9f3e5e29b55e675df053e94c7c20dd21e3b93b8e514f93f0e347897b8e79ab523689762cc5add3c765ae6e952ff8cac6d79fd3b9f850b3fc536c5cdaee4d516356b1a5320a63b1f6186e10dd8b8144d72183838cb00104dd963eaf012b7ca619899cc206dd48bc05135a4977eba0593e475c1ac45471f"], 0x1c}, 0x1, 0x0, 0x0, 0xc000}, 0x8000) [ 2664.792606][ T7867] gfs2: not a GFS2 filesystem 18:05:50 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:50 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:50 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:50 executing program 0: ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000040)={0x980000, 0x8001, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x9c090a, 0x100, [], @value64=0x5}}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000100)={0xffff, 0xa, 0x4, 0x70000, 0x4, {r1, r2/1000+10000}, {0x3, 0x0, 0x40, 0x6, 0x7, 0x4, "333ceb71"}, 0x2, 0x0, @userptr=0xbf, 0x3, 0x0, r0}) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1000004, &(0x7f0000000240)={[{@resize='resize'}, {@usrquota='usrquota'}], [{@pcr={'pcr', 0x3d, 0x9}}, {@smackfshat={'smackfshat', 0x3d, 'vmnet0vmnet0:(userem1J'}}, {@pcr={'pcr', 0x3d, 0x40}}, {@pcr={'pcr', 0x3d, 0x2a}}, {@seclabel='seclabel'}, {@obj_type={'obj_type', 0x3d, '/selinux/load\x00'}}]}) 18:05:50 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2665.128725][ T7981] gfs2: not a GFS2 filesystem 18:05:50 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:50 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$tipc(0x1e, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0x4018620d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x717000, 0x0}) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2665.416027][ T8022] gfs2: not a GFS2 filesystem 18:05:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x2, 0x300) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001740)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000010000000480000000000000095000000000000002ba728041598d6fbd30cb599e83d24dda3aa81d36bb3019c13050000000000000026fb0b71d0e6adfefc41d86bd917487960717142fa9ea4318123741cd2b4212060851e79997dc50a0e168c1886d0d4d94f2f4ef70cf0983976ae4ce78429297424f7335c652fbc1626e3a2a2ad35806150ae0209e62f51ee988e6e0dc8ce974a22a550bdfd70800c86ae3b3e05df3ceb9fc464c2a100c788b277beee1cbf9b0a4def23d410f6296b32a8343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449abe802f597eba9ffab3e05379e5aeb0597a13b3e22278d00031e5388ee5c867ddd58211d4ececb0cd2b6d357b8580218ce740068725837074e468ee23fcf49822775985bf31b715f5888b2153052ccb1a78a8b2b8c6ef48a71221ce3c601db96fe1a90374b8f883a2db630e0af6e80187cbebd5bbd6208bc064baef219787e784c3b12011ae7cd2b75614b4e9373fcf51814d5d4d3527268f50ce374341e30bc2400f8d1ef6358410c93e83d6536e43cc941f2102666d4c415a52e1b0866cf541dde3217e14531cfb7df6594b4b056358ab807dd0f5c84fbe550f97168660aa6da2fb008a76bde511a974fabb5fbc50bdd02a390e0922edef93ed7ecbe09666f61b8bd31df5326ce7218b73653e91f9f799a2c827548e5f83874dff41119430ae77c7441e71bb9307a3dafb12f2611ad360de54e480f9f4cf018aaafb4be34275c2f253321577fb043fae52142f06803cec4d7d5f2d53eb18eee0338516f9cc5bad0bd0b4380c2b959e47ee50000000000000359c8f5c49f41ca0ced463d18c7cd55246b79f5e0d361998cc2c73256c9406476dc0ccf922b4bea952c936c8f7abe06625d710098f4fb4dc64a349c929310c621581479fe4d76d1d42e18dbeba5c3da28b87c68bb1dc5a45254099f4800d27bdafa47efcbcc14c8"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000000)=r4, 0x4) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 18:05:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:51 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2665.596134][ T27] audit: type=1400 audit(1581444351.192:3876): avc: denied { set_context_mgr } for pid=8099 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 2665.626749][ T8100] binder: BINDER_SET_CONTEXT_MGR already set [ 2665.657772][ T8100] binder: 8099:8100 ioctl 4018620d 20000000 returned -16 18:05:51 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6769643dfbfb1f63ef3a0cbc5fecab9a0f0416a1b9690f7eda381262f10cfc6357fc6cb0cdc9c56778db4ae4d42f0fb9900daaedbfaceaa05556b8ba658fb3ce36aaaf64db15135b1f19d0e3410cd85f9e90a7da45782bd201b5e36638ba47f1743de086f4f383bf8bbe5200000000000000000000003ba5702deb352872a76cf1e0d709dd611749ebebd65ab7f807669be08c1089992e1077ae59e873b7ffdb11e3faa877802ecda9", @ANYRESHEX=0x0, @ANYBLOB='\b\x00']) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x400240, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000440)={0xa, &(0x7f0000000300)=[{}, {@none}, {@fixed}, {@none}, {}, {@none}, {@fixed}, {@none}, {}, {}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netlink(r2, 0x10e, 0x8, &(0x7f0000000540)=""/148, &(0x7f00000000c0)=0x94) ioctl$KVM_RUN(r0, 0xae80, 0x0) [ 2665.847805][ T8109] gfs2: not a GFS2 filesystem 18:05:51 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:51 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:51 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:51 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x5, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x4}, 0x0, 0x0, &(0x7f00000000c0)={0x3, 0x2, 0x7, 0x1000}, &(0x7f0000000100)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x7}}, 0x10) [ 2666.282917][ T8228] gfs2: not a GFS2 filesystem 18:05:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:52 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x2, 0x300) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000000)=r4, 0x4) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 18:05:52 executing program 0: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r4, 0x202002) keyctl$chown(0x4, r4, r2, r3) newfstatat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580), 0x5800) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r6, 0x0) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r8, 0x0) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r11 = creat(&(0x7f0000000200)='./file0\x00', 0xc4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r12, 0x3}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r11, 0x84, 0x1f, &(0x7f0000000600)={r12, @in={{0x2, 0x4e24, @local}}, 0x2, 0x3}, &(0x7f0000000500)=0x90) chown(&(0x7f00000001c0)='./file0\x00', r10, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='grpquota,uid=', @ANYRESHEX=r0, @ANYBLOB=',resize=0xffffffffffffffff,uid=', @ANYRESDEC=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r8, @ANYBLOB=',audit,appraise,fscontext=system_u,appraise_type=imasig,defcontext=user_u,euid>', @ANYRESDEC=r10, @ANYBLOB=',obj_user=rq,\x00']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) sendto$netrom(r14, &(0x7f0000000240)="7e7379bea834c3a3835a5d60140dd9cb14bb8e74ac011530536842150504b796c33277f934a1c57c89bf38d9d11d01ec390e63b2336b5b5c03a0b06cbb1ebcf40445173cfc6badd9ff3448ce4edda7e3ac2aa72f49ee1e4e7ea2d835f80a9674534d8ad8b56b928392fc483e62e8ed2222c3e449b3d17f1eed68da65f76a31661392932a4e921e0fa63139d1d8f827391bbd906cc3dfd14076013f5227cb20615ba72842a51e5a421c271913cd2217b17f3a69878503f6b6d0c2da15c0d1ce55eb0f07a48266f27f83", 0xc9, 0x1, &(0x7f0000000340)={{0x3, @default, 0x6}, [@null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x2c00, &(0x7f00000000c0)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@rq={'rq', 0x3d, 0x2}}, {@rq={'rq', 0x3d, 0xb4}}, {@rq={'rq', 0x3d, 0x1}}, {@rq={'rq', 0x3d, 0x3}}, {@rq={'rq', 0x3d, 0x3}}, {@sq={'sq', 0x3d, 0x6}}], [{@context={'context', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}}) 18:05:52 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x23000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:52 executing program 0: getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000240)=0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid', 0x3d, r0}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000000)="ba210066b80080000066ef64670fc77f0066f3af660f65fb660fe9fb0f07ea00304400de6afb6766c7442400007000006766c7442402090000006766c744240600000000670f011c2466b92109000066b80000000066ba010000000f30", 0x5d}], 0x1, 0x0, &(0x7f00000000c0), 0x0) 18:05:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:52 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2300, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:52 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'veth0_to_hsr\x00', {0x2, 0x4e21, @multicast2}}) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:53 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="71756f74611c88"]) socketpair(0x22, 0xa, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x60000212}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x6c, 0x7, 0xa, 0x401, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x1}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x54a623c2e9295def) 18:05:53 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:53 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6769643d79c45d82e9899aef2265d01096eae23e63adb82a2c340a1eb365f9c9efa47ac9ccfd843d2ad0c608217bda53516c8211da883861fdf600"/74, @ANYRESHEX=0x0, @ANYBLOB=',\x00']) 18:05:53 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x2, 0x300) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000000)=r4, 0x4) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 18:05:53 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:53 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3e110000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000400)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f00000003c0)=0xfffffd52) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x84400, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@uid={'uid', 0x3d, r4}}]}) 18:05:53 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@suiddir='suiddir'}]}) 18:05:53 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3e11, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:53 executing program 0: openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:53 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:05:53 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2668.449122][ T8521] gfs2: not a GFS2 filesystem 18:05:54 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000040)=0x8) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:05:54 executing program 0: socketpair(0x23, 0x4, 0x9, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[]) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2000, 0x0) [ 2668.754040][ T8537] gfs2: not a GFS2 filesystem 18:05:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$packet(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 18:05:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:05:54 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:54 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2669.103762][ T8553] gfs2: not a GFS2 filesystem 18:05:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 18:05:55 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:55 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@noquota='noquota'}], [{@pcr={'pcr', 0x3d, 0x3}}, {@subj_role={'subj_role', 0x3d, 'gid'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@audit='audit'}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(r1, &(0x7f00000000c0)='oom_score\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r10, 0xc0086421, &(0x7f0000000140)={r11, 0xc1db296ba2f28640}) ioctl$DRM_IOCTL_DMA(r9, 0xc0406429, &(0x7f0000000180)={r11, 0x2, &(0x7f0000000080)=[0x10001, 0xfffffffb], &(0x7f00000000c0)=[0x0, 0x7f, 0x0, 0x8, 0x8000, 0x8000], 0x45, 0x8, 0x8, &(0x7f0000000100)=[0x3ff, 0x9, 0x80000000, 0x7000, 0x1, 0x1, 0x1, 0x1], &(0x7f0000000140)=[0xb]}) ioctl$DRM_IOCTL_UNLOCK(r7, 0x4008642b, &(0x7f00000001c0)={r11, 0x6}) ioctl$DRM_IOCTL_SWITCH_CTX(r5, 0x40086424, &(0x7f0000000100)={r11}) setsockopt$inet6_udp_int(r4, 0x11, 0xb, &(0x7f0000000000)=0x9, 0x4) [ 2669.511999][ T8665] gfs2: not a GFS2 filesystem 18:05:55 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 18:05:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$packet(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 2669.934472][ T8680] gfs2: not a GFS2 filesystem 18:05:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000367fe4)=""/91, 0x275) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="4e0496674dd8a82f24bd6f610f6769643d", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="dda8a3f0356bfafd8c1669873a491528831f6021dce64613d769584aca63a93abf2e7198e59829bde3ef470d7fb85cc3f83c947637f671979404191b2c7d01b59c", @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYPTR64, @ANYRES32=0x0, @ANYRES32=r0, @ANYRES64=r2, @ANYRESHEX]], @ANYRESHEX]) 18:05:55 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:55 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 18:05:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x5) r2 = fsmount(0xffffffffffffffff, 0x0, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f00000000c0)={0x980000, 0xba4, 0x8000, r2, 0x0, &(0x7f0000000080)={0x980922, 0x10000, [], @string=&(0x7f0000000040)=0x40}}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 18:05:55 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2670.457828][ T8703] gfs2: not a GFS2 filesystem 18:05:56 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRESHEX=0x0, @ANYBLOB=',\x00']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000002400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002440)=0x14) sendmmsg$sock(r0, &(0x7f0000003d00)=[{{&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @multicast2}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000000c0)=[@timestamping={{0x14, 0x1, 0x25, 0x50000000}}], 0x18}}, {{&(0x7f0000000100)=@in6={0xa, 0x4e20, 0x2, @remote, 0x7}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000240)="50ec88405f6bd9010c59158d88f16d0311cc898537c3a990550c989ace43247d7590cb851067e8eadfd236aaaf6f25eacdba898ebceef1a0169e5a3e88594a35f98c085c4a38f3020676f3809c38d2e1a7e8d754fd4f25647141c4754fb40794650ecba154e746cff03f373a37a378f69a9274a777", 0x75}, {&(0x7f00000002c0)="780b2342d802553c26f81fd05cc53b58c050f88348e94749db55df376b95512fdd00a4cf2a591c7d57724e7cd47de276f008c497f4738a3dbef866dae7ca0c8e2476de45d47b0081ca3a42611696b44adeeb048fae633e420945d933c8782861fbea", 0x62}, {&(0x7f0000000340)="eff4564ecb4bf5579c39b546330aaf909d59fd0a1f1738eba0a0846ee4ff06e6ecf2f351fdd2ae2f15e8d102b6999bb88ac7ce5f1841f90e575f9280cbec1fbb2f903954943cf466a6b012f7", 0x4c}, {&(0x7f00000003c0)="deddde7f3a866ca600b44575cf03c3244a5dd49e3d7664bd602d3e795fe8c654d38f9b80fead4c3837f3c662d807e83772a701acecfdfeb736008c4350a5e8bdf2c140f22c06663ac0f9936daa56722c9da56de9f7e8f06574d9893b4b560d5804381d63ce5b6dca14c75df2263984728cbe326789703c7b77be656186fcb99f7bfa4512afed3bb4adb0509b23c5f167c040906fb2ccf5bbb234823f858e18cc6003a9b69bab13c004", 0xa9}, {&(0x7f0000000480)="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", 0xfe}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="5251214e99ea9cad11c11efebdc67655f7ea0692e99116a63f152feafe53aab69ec2a04a1d34bc54bb0f59f983a183440597e87b66f4edbf28da2335e438c77294f0b3d9975b56aa33fb1a4a9a7cc18d4eeda50198ce4c90c2ff133bcaac22408a76386cddc82676acc78cce175c9d54f856ebe95806caa41ac0b1dc3a87a554e6eb143946abda48fd4a5ca7515e850717655a9ee6b25179e93368899d309898caf9963edbcd869c254abb84fbf2e4481feae06ff039fde0fa7e327fbc2341814a2ba8945688f0c25672e64b1771e6dde56651458c0e6701264b75", 0xdb}], 0x7, &(0x7f0000000180)=[@mark={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}], 0x30}}, {{&(0x7f0000001740)=@in6={0xa, 0x4e20, 0xfffffff8, @local, 0x6}, 0x80, &(0x7f0000001b00)=[{&(0x7f00000017c0)="21888e0c476faad49799d4b1495e6186c144110a1d3abbc5582a16836376f046d8a77414bb29b3f2a311f72bfe4b4a0d6a8e9f9c053f92ab2f41bd4dae9a1037a885a830a20c51d946731094e4134b2079aa8f267645de5221dc424704a7637a43b71e4b790ca46933db6b8a523f11772238837e1d611540dc3660843a2ce37790501c1f504a22e83b690a1f68b65beafc2844501c72f771c37e403ece068eb9a36acb01b8b5b1b96081eb3c2747844f861779dea586f83e81a9acbf8ca38de7d5dc26514072a44b73f1c8bf2a116299ae8229ff760f6e0cee58bfd999f6818ec08c20c346532fbc1215", 0xea}, {&(0x7f00000018c0)="18cc58caac2f8a09e89cc209b18afeaee098db82d5f6a5353b322fdf5d75ec580788ab8d564d2fb5f7198227800eb7b5b03765852e93ec7d1ce8aaa2336c2905f5fcfcebcb35fd3ca07fd348d06e42e60767563679fe7dd1bc802aa0d387ac46ef170be5cc3ca0e11117826898f68b4cc0659c42c74479c32457a0711f9a09be599e4d81d6a1af61204cb9981edabf3508ded3176c55b83a721d2499d5ba01087e327a600bb7110d1073fc0c704e42e7da4a4c9ed5c0a0a6c7a5f28c0e19bd005b547c5fa403994e4978b0", 0xcb}, {&(0x7f00000019c0)="975e67d2fb88f2f442041b33bfcb50c0095de19ce4d2bf342c1be48d65fc4f2c50657ef74eade8c8d5dabf0db96995a91e5fa00de6e85f73d214c03c63249cb30dd364e3c5ef0888fc10a60e", 0x4c}, {&(0x7f0000001a40)="ac7de3f7ff83bbf1c62fa21536b1625f1a992eda52b45422acd620784d8c697297809e93969db7cbbba1547f43331fa5832297cc9ae427a98277934a649979e5c5edbe4d41de0537b96dba4944196cafde56e9e4da399373d983108be6ae1c3c493fe9ad4727e153d261b37ee9afca88a2fd7faea077f5f5ea5cd81512f0cb8f49d80a80164862b7095bf7cd1e4c", 0x8e}], 0x4, &(0x7f0000001b40)=[@mark={{0x14, 0x1, 0x24, 0x1}}], 0x18}}, {{&(0x7f0000001b80)=@l2tp={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}, 0x2}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001c00)="8519c6cfcf561d6464d698337df07ca6f2b2ac8c38269fd76fdff4340b7112a31a5c0ff62bd5fb3640582c35eede85773dcdc8ce076f9406c169f376f238e547d131d137a9d47724ee5ab051b3612c88c6799de410d8da5558b369dd68e62e8309e58f8f2b4d382171ded560e24306a24760aaa32b1e44aa917400367d2122e68e843be4294c31761f215629d78e02f4833b5649fce04f3b6325649156338c5f2f0d6e4b04e473cd5729c3b3fcdceea9ec792476e29c375e718f688fe1a38f7a2a0e0d2f2af4ffef2013cc55743f507e9c298be336b1a8f37cab8b422bf327fd58e85bc039d1", 0xe6}, {&(0x7f0000001d00)="d64dc16135da1877f8be20ed036958b3239ba73ca91d6b34e0515266a851f3bbcf3d8b3ca7bf5a3d258be569d8147603b2576ed52d519cf3ac4aca67f75ca8b543f76089c3ac85c03ff6e5b12cdd7a68bbb837ec00ec95ea3ad9391d4a566f510e07c93793dfacecc4bddf5067d5d3786a", 0x71}, {&(0x7f0000001d80)="4daf750077463931a8374227533b5cd2aaeb4ab6c9b0e05034ab19bd55b094950e5eeb2fac5df9cf7c84c3a2df22e9ff53fce2f347edd18e47acd284050ab69ca9a3c230e660f2fc0ab4b31e29146d1a5344336e", 0x54}, {&(0x7f0000001e00)="f781c76bcddbe5b5792c7f04df9edb83917bca11b026e38a3bb8c307c7b67880c7ab929385bdca98111593cfc1cf4931675948748e61d235c5a2867161f262418626907e2150dc847bceef245c90656efe43ed4e33ecb70f80bfbaa951e3fd8e9ba591fe3ae2b1905e9d5b3e43edef13886758c2167aa84d59320566afe377da143f01dcbefea5ae6ae5bb79a30da54e081ac8f53042bcc174461d4a7fa4aaf63d50a0896a150535c56d7964c6b3938d356ecc3aa9109e3745d1f4a127ac037e60d07fa7211c8747cee54e05a6c6c0dbb54b6aeb72e98a9f731a859cb8f87b65696482452d96561421e49bcd13c47f97a6056b9a2d3557be17c83269", 0xfc}, {&(0x7f0000001f00)="70cad7600c6788077d5448d74d18fea6b64a30a23849a23bc7f880cec665894107a2d6265b85b15c61ac5e9e528b039ba2ccf821b1b5dce7a227130a160b18184612b694ac99f3f329685202b67ed03d6625faf4e8a7e403d8616a77dc9d8007470a35a25fde9b7b99b20f3ae4b85e1227829a95b212073825d0ae1cf767cfd026c5305ad56ea2bdd340802f5e4f0ba4b1ab441f73b30cc006e344fe3272612d925171727b18cceaf86a92b2522bd0f6109e8e445b59a7a142dc85c8b6895198fd654ae5cfec017f736497", 0xcb}], 0x5, &(0x7f0000002080)=[@txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x10a}}, @timestamping={{0x14, 0x1, 0x25, 0x401}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x1f}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}], 0xc0}}, {{&(0x7f0000002140)=@in={0x2, 0x4e24, @multicast2}, 0x80, &(0x7f00000022c0)=[{&(0x7f00000021c0)="fc190219885fa2e5", 0x8}, {&(0x7f0000002200)="938e17c8def6eaf549608dfa37d0d5566bfe73c38311832699c83ba89a5bb5a841919a79d429e978cba5b7bf92834ccad53bfd6c0a1551c669b3d6ae600e7c", 0x3f}, {&(0x7f0000002240)="cc09cc34e7ec65c2c38c9a7d05e06e577a790498c2d4475385c225b7517616019b30ded9d3152e1b6fdda0493b637edec6b101377f0da5e93640d78375c7f29150b14c2ad83cc340c48f903cd4d2695bc3d7d02bd63fc0a568d0db6ab8243b0336285e91b6308d7f3e0a38ffdf37c30c", 0x70}], 0x3, &(0x7f0000002300)=[@timestamping={{0x14, 0x1, 0x25, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x1f61}}, @mark={{0x14, 0x1, 0x24, 0x1a670549}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0xe62}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}], 0xd8}}, {{&(0x7f0000002480)=@ll={0x11, 0x2, r3, 0x1, 0x4, 0x6, @broadcast}, 0x80, &(0x7f0000002800)=[{&(0x7f0000002500)="e12157836caeda2d8b513100a1fd82494784f3a295cd0e45d0bf086b3703c269396fb7a71a4a68f28bd3363f99e4ef170dc1e5bed58d8913eeceaf6b7aff46ef06a46226bbf849fcc2619c2f12212a8c65419fc7cd467b04174ddcd2d3c907266bb769e5ef1a795874694f942627ddbe3d69ecb28c68ba45a1b239434fbff09be5ffac97eddcc7495041aa3a31626f31c294640b2223ad5e494e05a063ec59e628eb5a911f", 0xa5}, {&(0x7f00000025c0)="ce47c43f43762b655ec7501d28943e120accec7afea08e34ea46b9404fb233489c07a414520c448074d5a5fe8b8b83ac8fc0fa241c5b846081b530b6acc999b3040e004fa00dbdcbf934ea938e797f35102ed151764dce2aa1ce64834eedc02b62f484a6c682ba0c9c85379e7d4096d5b239e06760f445d784d253fe1be13dc9c755e0326dcca3513e635e7271b5f3c260783c1e4305fbb012cfbe7cf38b8ea1ea69c79fbe696fec734a3aa8", 0xac}, {&(0x7f0000002680)="e7171945685065e47f606ae9c3f042cd1acf54f7aa31b1a799f74a9e4e3487371a56a2844997fe", 0x27}, {&(0x7f00000026c0)="dc22e105b5694cb25711bf242b1b52e75418c6bad69a53f83e4dfbacac811f89cc166d20900d36c41c38135410964836a555d0362f3e39ec4d5ed7", 0x3b}, {&(0x7f0000002700)="c9cabfbe6e46832795fb84adcbbf64fc9ac856ace76e5de4c0c4160de0653b0d9fabeddd466b16eca479135520eb685585dc85b706b08ee8ecdb89c346465391e0d5f0a2b55a11a91b63ba7f2ad2b63dc3f88e332172473fb2206d39182c3cb594c08f46ea89d78258fe2b4abfa1ea6d4c1c11851407226e00f775943c00de6df83a2d72931c6524b2151fb53a0a3efc0815a9a4ff7f0bda021753bdc7f37a0f500dcacda75796efb339481ae765d3af2c04540c7f91fe889ed9d8c02eadf41ae108aff2b8989c79c2ee8de21e2d86151e83219bf76e8ec9581b62c38cbe6a1a21f74a7bd4be03d35cb4956e601cd739e6", 0xf1}], 0x5, &(0x7f0000002880)=[@timestamping={{0x14, 0x1, 0x25, 0x5a}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffff7}}], 0x30}}, {{&(0x7f00000028c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha256-ce\x00'}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000002940)="85ff3cd52e32b6724ad601c9c84835c8fc8bb000e29975ed99c336a735026e503e42d56dd03410f9ff6a187436f27fb3b80d454e7e713716d7cb483bb633a0c807bc72b9f0a8260ecb499824b4e850347eca61ea280ab2ce82d3a690dbbac4828b2571bd2969658ed2750d841119f84f661b254aee024cc731dda0d5720ef8c53449bda9672c25c1000d9c9a34e1e6702b87d8689ed67a2df3ec3f363cf79cf98449ad86acd544694be7ed6ba1ec19af7bdbabab34fe57532860cec84ff3b90a2efb514559446721636e8c5eda3b2aab2623283627ed419e8e82fd30b4c1e20181", 0xe1}, {&(0x7f0000002a40)="8e6b31f23796e6eaea75fafdbfc601569a504aed842681b664797b4b21be85f52e4c9eeebfcc21cade552684788310fe110b55977700404d7c1f5af4ec28a603e736b23ba76f5e89a0745069fdebc4f5f79c4b7d198f", 0x56}, {&(0x7f0000002ac0)="522b9208c9a38d8523c7074d06098127049277271ead3b83b06694544e702e1f38951bf4e2c7fcb37eb6993de0b76654f2c7a4e8c733106917", 0x39}, {&(0x7f0000002b00)="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", 0x1000}, {&(0x7f0000003b00)="c9def0a2545f74bc60e13cff7418c18308faa8f720e00be1f3f539e76eefa9bce55efbeee8bb33eae144b62cd5a9f1aa1ffe82aa59dc1c9fca7ebe809056cb077336f143d0577d44cfea470286445f56f7786a7a0557ebd5321305648ddb22e5da8e1235cea3908e9859b16e0de4cd6ad2162326fd21d9999eb27ab8113c59ee69d6afa122e7bbb5373369c28435b73483cf51e17206d2fc8fd360279704980e6c5ea544b52308341c4b8e6b30d100f37639c4c12743498a2dc81451447389176346e4bc1b9effa4f23d60a336216f6849d84953f74c38775d74715698ce57dce4bea29fbd36fa21a30a92977c68ab967dac00", 0xf3}, {&(0x7f0000003c00)="d2fb53974a7af439e125c17ce1cccf502194f4563e1601c5184b82258998ec11b0c151fcda4857c88f56965f4dd56002ed1dd8f2bfda2078119c90bdeb29254f09f8a1b5a5e889f786fb293a", 0x4c}], 0x6}}], 0x7, 0x4000) 18:05:56 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) socket$unix(0x1, 0x0, 0x0) 18:05:56 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:56 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:56 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB='K\x00']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000080)={0xa10000, 0x0, 0x3, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x9a0917, 0x2, [], @p_u8=&(0x7f0000000000)=0x1}}) ioctl$SIOCAX25OPTRT(r2, 0x89e7, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x56}) 18:05:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$packet(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 18:05:56 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) socket$unix(0x1, 0x0, 0x0) [ 2670.959060][ T8821] PF_BRIDGE: br_mdb_parse() with invalid attr 18:05:56 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@gid={'gid'}}], [{@audit='audit'}, {@context={'context', 0x3d, 'system_u'}}, {@hash='hash'}, {@dont_appraise='dont_appraise'}]}) [ 2671.115874][ T8843] PF_BRIDGE: br_mdb_parse() with invalid attr [ 2671.136799][ T8843] PF_BRIDGE: br_mdb_parse() with invalid attr 18:05:56 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:56 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) socket$unix(0x1, 0x0, 0x0) 18:05:56 executing program 0: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000040)={0x6, 0x118, 0xfa00, {{0xffff, 0x5cd2c22e, "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", 0xf7, 0x1, 0x9, 0x8, 0x8b, 0x20, 0x8}}}, 0x120) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xdef5, 0x80) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000180)={0x9, "1614d9097f6f64fc3e8303c54eb9cfdf27908dfb04dc686c9fd67a1fdee6cf05", 0x1}) [ 2671.335127][ T8853] PF_BRIDGE: br_mdb_parse() with invalid attr [ 2671.357514][ T8853] PF_BRIDGE: br_mdb_parse() with invalid attr 18:05:57 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:57 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) socket$unix(0x1, 0x0, 0x0) 18:05:57 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0x6, 0x9, &(0x7f0000000700)=[{&(0x7f0000000080)="aab1d685a90a264b22f78275a410b1ebba6c1b7b236baa59bdd0b75d6c7f4214b14cb781bcc27b2e6d1b7187c1c5fd423711a1e12350f109e8fae233c421cc9815569de1238c", 0x46, 0x7}, {&(0x7f0000000100)="77f4db988b16c6f20d766423fa77a2e28703e566bcb9fbd9c0a7541c63adfa677c5247b5f6a85b3f672f195f190d9eba3a3ab5c5e6d48104010638f20c2d2ded96ff49f262b9aa4927c5d872480448e3f5a39131c566d4cc992ad90b1a2c8b446d9483b329b4702f7905e7bb1dc8e159a7ab2f4034ff8a77b4c664286e36f3d410d638785800c18ee3419b6b0f7d4f42ea0ecb19a3ed6f3da180dfcf75d32a1d48c1b631c164121ad16b0d4ea7b1374f11a6a83dbe", 0xb5, 0x4}, {&(0x7f0000000240)="cee37918ecb1eabffd2e952c2ff2f6bcce73c38c0337422066799bfe81a78c9ede3a694a9cb1b98e9864b1af839057e81acd5e79ca8ffbcd5ea013d874337ccdb335bc00b65418251c2eb93e70bcaa069093d08c4c111b4672ea8345c6c3df69d73eb2b95ed6d5f38b6f54438e1ccd1d56f0db70592956bc95e69192e10a94897850b5cd32f70f036caa4d8fd5bb14358addf51ccc", 0x95, 0x2}, {&(0x7f0000000300)="a6c03495d2c283cc28d15e9508c6ee9698c168c8a3a94f39b2df2e4c0c4188e40ece5ac3d6ad9e451ace91c33cf5c550627040f492bc00b76a27266c7b3b602c289d12406ed190a6c7022f44ddf7751d6beaebdf8231941433058c59fd628d1430e54516ce1716348d95a96e8b78de5211a86f3399ab4ce6b7c22b099ee3fd9bc952", 0x82, 0x8}, {&(0x7f00000003c0)="37e85b927fa3dfd0b5521c5ab853f9b4745b26a5b38e79e021af86d4654fdfd1439c48ab77df21bac906f9bd83ca1fe8fdfec9fba1d8c465bbdfa2880638e13d38cc8862ed0deff01f80b02034ab31fb738721ab0d2b17bebd89e98edeb2a06e9c61685e7609e284ebf28f6bab14d69acb0d65a04ecedad383183bdb87936c11a76f544ab1e890f90be32f0c74a50acf0e381b4f049faf3eedddcc759e10cc8bf99525f56880f013272d74d17567d97fd0947797bef9c7579b634d22c0aa97b7b3198826268487f1000f5a44b7b4864a58", 0xd1, 0x5}, {&(0x7f00000004c0)="44f5050c0d7502a9b6b8b50e6e91071a17a162dfb071bedfbcd5dd6d15f0931876d1de698d7f5dbdf03b830a5f71e0dc65bd9cdd133380289c508c4802bd455faf84c7f084d69cbb", 0x48, 0x3}, {&(0x7f0000000540)="e4ed7057380cb560857a805a571f61f703f25fd4dd379cb7d0d2bdfbf791cd07b65b77ae164c923c187f593201fdec8f967cbe5fea897e47e2b5011f865cbcafa716a6a3b7ec577c30696abf08724f7d1600b9a5c428abcb2ab2f02994598c", 0x5f, 0x20}, {&(0x7f00000005c0)="7e2ceee13ecef7ae53d974ba6dbf2d03e0a502c38aa4472ecb0c0a34bd500e6af5e1b62a0b87fb62faa8b1a5c486429ad08ed40022e54dce836bd1ee2a17dc766e80e8057da8a82b482696e11cc783dd58a9ee3cbb99495dd0b10d99ae5b4627e1d803c5f69652a0d575db780f7df58c8c717f11d333665303596b639b6a44ea84e35cb7bf6a8c9a7defa52c6d6ebafb8357e02e83bd20292f4b8f06f9859909a147c4a27f18ccfe4529033e6f4e4142f52fe80cd3357172a07325f980291e547afcdc5bdef42c975943bb3b9fac65647301daebb2a5dcbc44e99918183d83", 0xdf, 0x1}, {&(0x7f00000006c0), 0x0, 0x7fffffff}], 0x20000, &(0x7f0000000800)={[{@usebackuproot='usebackuproot'}], [{@fsuuid={'fsuuid', 0x3d, {[0x34, 0x63, 0x6a, 0x37, 0x30, 0x62, 0x33, 0x37], 0x2d, [0x35, 0x64, 0x39, 0x65], 0x2d, [0x6, 0x64, 0x37, 0x36], 0x2d, [0x32, 0x37, 0x37, 0x65], 0x2d, [0x36, 0x64, 0x35, 0x37, 0x64, 0x64, 0x63, 0x32]}}}]}) [ 2671.655287][ T8865] PF_BRIDGE: br_mdb_parse() with invalid attr [ 2671.714803][ T8865] PF_BRIDGE: br_mdb_parse() with invalid attr 18:05:57 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:57 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r3, &(0x7f0000367fe4)=""/91, 0x275) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = accept4$nfc_llcp(r5, &(0x7f0000001240), &(0x7f0000000180)=0x60, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r15) r16 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000012c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = dup(r17) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = dup(r19) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) r21 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001300)=0x0) getuid() r23 = socket$inet_udp(0x2, 0x2, 0x0) r24 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r25 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r25, &(0x7f0000367fe4)=""/91, 0x275) r26 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000001340)='/selinux/load\x00', 0x2, 0x0) r27 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001380)='/dev/uinput\x00', 0x2, 0x0) r28 = syz_open_dev$media(&(0x7f00000013c0)='/dev/media#\x00', 0x1, 0x80) r29 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r29, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r30, 0x0) sendmsg$unix(r0, &(0x7f0000001500)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x24e23}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000000080)="0f966b7aac2b378850b2a111a563f8c5bb4a94e141febb2c7b328dad4ceb332cd343bdadb223123f541f4e75f640fa440edf7dd56b1bb6be42e19d55e19bce414371f486c3d09d6d65e73baea62067516b04d29875b381994fc251fb48a7a2b2019f", 0x62}], 0x2, &(0x7f0000001400)=[@rights={{0x24, 0x1, 0x1, [r1, r2, r3, r6, r7]}}, @rights={{0x2c, 0x1, 0x1, [r8, r10, r11, r13, r14, r15, r16]}}, @rights={{0x14, 0x1, 0x1, [r18]}}, @rights={{0x1c, 0x1, 0x1, [r20, r21, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r22, r30, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r23, r24, r25, r26, r27, r28]}}], 0xd8}, 0x20000000) 18:05:57 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 18:05:57 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 18:05:57 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) [ 2672.195674][ T8979] PF_BRIDGE: br_mdb_parse() with invalid attr [ 2672.222533][ T8979] PF_BRIDGE: br_mdb_parse() with invalid attr 18:05:57 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2672.308815][ T8988] PF_BRIDGE: br_mdb_parse() with invalid attr 18:05:58 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) 18:05:58 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="10007fcd858af60c75053258302d105e201a91dc3fa9153e0f485b0b1e7451d3cadedc998e6f83b61e419f380a69f79dae8fc8a6f9ae327a8705551f3f836a696a16198feca5c49b41df14bb6d015ce6bbd5818b4cdb1512b4ea82121f90d5e009f3117ac2a1a0551414501bd9edfb8218523e57480d7e7de9ac4e0945204d23957fba1b960c6fe1e91282726218085d8a4d34537d2cd34009dd336ec5c504a860"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r6, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x1010000, &(0x7f0000000280)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other='allow_other'}], [{@smackfsdef={'smackfsdef', 0x3d, 'gid'}}, {@fowner_gt={'fowner>', r6}}, {@hash='hash'}, {@context={'context', 0x3d, 'root'}}, {@smackfsroot={'smackfsroot', 0x3d, 'jfs\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'jfs\x00'}}, {@fowner_lt={'fowner<'}}]}}) 18:05:58 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2672.620216][ T9096] PF_BRIDGE: br_mdb_parse() with invalid attr [ 2672.653160][ T9096] PF_BRIDGE: br_mdb_parse() with invalid attr 18:05:58 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) write(0xffffffffffffffff, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) 18:05:58 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$can_bcm(r1, &(0x7f0000000240)={&(0x7f0000000000)=@ax25={{0x3, @rose}, [@null, @default, @remote, @bcast, @rose, @netrom, @default, @rose]}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/28, 0x1c}, {&(0x7f00000000c0)=""/110, 0x6e}], 0x2, &(0x7f0000000180)}, 0x22) [ 2672.923736][ T9108] PF_BRIDGE: br_mdb_parse() with invalid attr 18:05:58 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) write(0xffffffffffffffff, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) 18:05:58 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4801, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:58 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 18:05:58 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x5e42ec8b, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2673.325383][ T9217] PF_BRIDGE: br_mdb_parse() with invalid attr 18:05:59 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) write(0xffffffffffffffff, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) 18:05:59 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x400020000000010, 0x2, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) [ 2673.543298][ T9233] PF_BRIDGE: br_mdb_parse() with invalid attr 18:05:59 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) dup(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2673.745114][ T9237] PF_BRIDGE: br_mdb_parse() with invalid attr 18:05:59 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) 18:05:59 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r9 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r9, 0x202002) keyctl$chown(0x4, r9, r7, r8) sendmsg$unix(r2, &(0x7f0000000540)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000100)="f81d59127ab9f614c20e70a29081912d1ae081f1dc1df9240085f8036e272a41246a68bb728c9ccbf8028839ad5228f5cfd0ac8e", 0x34}, {&(0x7f0000000240)="ae5da6b9189e22a77c6b8e273fd01a5a6cdd112af454e89903e460d34e2bde8f6d24ffb4a59f551ab94ffdebd686448a5c3b0ddbdedc372ebef8fa7b28ae3c351bca2c244cb15f98001647f454126c76c638050b908a4c4b16d211732340a7aa264526", 0x63}, {&(0x7f0000000140)="36b24168f169f5f3e8cd1369e0b4dbee8e09450907e7b606c510720034fe8ed3e185bcef5d56c7d89e8b25a7fdb08d896cc8cae5e48bca6afca6e05aa1756531", 0x40}, {&(0x7f00000002c0)="0c0c4ccdd9a0198091bb0cf0b709fcd3c358e990fc2acc5488ea4d610b063cc350f7645d0776cbb426d83c3ae57bfa1c1541478c762f7320a4ea65b2909ca696b43a49c567e484b855072f141f9f93ba2cd1e0605218371da3c6279011d8548dd0d6cf36e86e07d25f629fd75f2317c156a71710267918f9eb1289336ef4de9d337f504c5b2d05f4b0c4c76e0a1209aae228646f1ff5fbfb3a491c1a81b67bf11fd6523cb2f49d5a9625b45d2636400b719e17a0fe433e97179a01201f27d169b7a519f04e39479eb02ca4dcae78f5bd7b39feec5824d560da4bde331cb12a909365357d22e63ad07783e38ec8b18f2888", 0xf1}, {&(0x7f00000003c0)="0cebba0b249ed576b1d78be4b77e0d80b62e30f94771efd2847a78636520f21ef2585c1d2cfaa5dba830866b8f117953bced1b8fc248dcce7e7e2b74334dc1ba57c04789770ced5de24ce94c9bf755f0ada9df124cb65204db7efba43ff19a8ebf9a69ba97d2a6e4842bf7b36c2d993d1124188b96426c32abe466f4434dc5a57ae010410bc4a462", 0x88}], 0x5, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r3, r5, r8}}}], 0x20, 0x2000c0e1}, 0x1) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000000)) 18:05:59 executing program 0: syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="98660a22df53400fd3000000000000000000"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_pts(r1, 0x400) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000000)) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) quotactl(0x460, &(0x7f0000000040)='./file0\x00', r4, &(0x7f0000000080)="bdca73b46e549aef86522ccafef450e3d9a3b0cb12e4b732f86d685a27d2ee4e295bea8f0e576ccbea6c6fb8a21aa876ebbf944f5320029cf4ffc0f7d91cdfe10652b5edc0343c454734dfe8bff632adf9945515300ad3ee622636e6cfca12614f43ebe44390569528c73c2299bbca09be7db50f4b181be3ce5b268e499a043768b3285f4d94e175bdc11fb1288ca4f884bade8636f6906109a314c1ae824cdd4b1a2024a150894de1f3ab6f58c903e7890896bddca052ab53fb5ff02e953274433c5e725fd0ca1480878e3b2da8eb33c04bd893bf7682535a96643ea4a572a400d31fa0f97a6e512461d4b464ee53d7b5179aa08479c658e3bbaa9f2b") [ 2674.086143][ T9248] PF_BRIDGE: br_mdb_parse() with invalid attr 18:05:59 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) dup(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:05:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 18:05:59 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:05:59 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) 18:05:59 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:06:00 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() r0 = gettid() tkill(r0, 0x1000000000016) r1 = socket$inet6(0xa, 0x100000003, 0x80) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 2674.543933][ T9369] PF_BRIDGE: br_mdb_parse() with invalid attr 18:06:00 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) 18:06:00 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) dup(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2674.772609][ T9377] PF_BRIDGE: br_mdb_parse() with invalid attr 18:06:00 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) 18:06:00 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) [ 2674.988647][ T9385] PF_BRIDGE: br_mdb_parse() with invalid attr 18:06:00 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2675.161264][ T9389] PF_BRIDGE: br_mdb_parse() with invalid attr 18:06:00 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x400020000000010, 0x2, 0x0) write(r0, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) 18:06:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 18:06:00 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:06:01 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2675.436147][ T9497] PF_BRIDGE: br_mdb_parse() with invalid attr 18:06:01 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x400020000000010, 0x2, 0x0) write(r0, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) [ 2675.583011][ T9511] PF_BRIDGE: br_mdb_parse() with invalid attr 18:06:01 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x400020000000010, 0x2, 0x0) write(r0, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) [ 2675.814848][ T9516] PF_BRIDGE: br_mdb_parse() with invalid attr 18:06:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) r7 = socket$unix(0x1, 0x5, 0x0) r8 = socket$unix(0x1, 0x1, 0x0) r9 = dup2(r8, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xffc7}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000080)={@rand_addr="51167d89eb1b870dd49a376400", @dev, @rand_addr="ee5974510000000a00", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10}) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000140)={@local, @rand_addr="6409c0b80e989be29fc70dc012b95603", @ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400003, r10}) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000f00)=ANY=[@ANYBLOB="2000000011000d0400"/20, @ANYRES32=r13, @ANYBLOB="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"], 0x20}}, 0x0) 18:06:03 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:06:03 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) 18:06:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001740)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000010000000480000000000000095000000000000002ba728041598d6fbd30cb599e83d24dda3aa81d36bb3019c13050000000000000026fb0b71d0e6adfefc41d86bd917487960717142fa9ea4318123741cd2b4212060851e79997dc50a0e168c1886d0d4d94f2f4ef70cf0983976ae4ce78429297424f7335c652fbc1626e3a2a2ad35806150ae0209e62f51ee988e6e0dc8ce974a22a550bdfd70800c86ae3b3e05df3ceb9fc464c2a100c788b277beee1cbf9b0a4def23d410f6296b32a8343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449abe802f597eba9ffab3e05379e5aeb0597a13b3e22278d00031e5388ee5c867ddd58211d4ececb0cd2b6d357b8580218ce740068725837074e468ee23fcf49822775985bf31b715f5888b2153052ccb1a78a8b2b8c6ef48a71221ce3c601db96fe1a90374b8f883a2db630e0af6e80187cbebd5bbd6208bc064baef219787e784c3b12011ae7cd2b75614b4e9373fcf51814d5d4d3527268f50ce374341e30bc2400f8d1ef6358410c93e83d6536e43cc941f2102666d4c415a52e1b0866cf541dde3217e14531cfb7df6594b4b056358ab807dd0f5c84fbe550f97168660aa6da2fb008a76bde511a974fabb5fbc50bdd02a390e0922edef93ed7ecbe09666f61b8bd31df5326ce7218b73653e91f9f799a2c827548e5f83874dff41119430ae77c7441e71bb9307a3dafb12f2611ad360de54e480f9f4cf018aaafb4be34275c2f253321577fb043fae52142f06803cec4d7d5f2d53eb18eee0338516f9cc5bad0bd0b4380c2b959e47ee50000000000000359c8f5c49f41ca0ced463d18c7cd55246b79f5e0d361998cc2c73256c9406476dc0ccf922b4bea952c936c8f7abe06625d710098f4fb4dc64a349c929310c621581479fe4d76d1d42e18dbeba5c3da28b87c68bb1dc5a45254099f4800d27bdafa47efcbcc14c8"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 18:06:03 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:06:03 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) [ 2677.679103][ T9630] PF_BRIDGE: br_mdb_parse() with invalid attr 18:06:03 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) [ 2677.804271][ T9637] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2677.915314][ T9639] PF_BRIDGE: br_mdb_parse() with invalid attr 18:06:03 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) 18:06:03 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2678.111667][ T9646] PF_BRIDGE: br_mdb_parse() with invalid attr 18:06:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) 18:06:03 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) [ 2678.317981][ T9654] PF_BRIDGE: br_mdb_parse() with invalid attr [ 2678.384701][ T9656] PF_BRIDGE: br_mdb_parse() with invalid attr 18:06:04 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) [ 2678.425115][ T9643] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2678.534123][ T9665] PF_BRIDGE: br_mdb_parse() with invalid attr 18:06:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) r7 = socket$unix(0x1, 0x5, 0x0) r8 = socket$unix(0x1, 0x1, 0x0) r9 = dup2(r8, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xffc7}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="0b4a1914200cc3ad134d722638676806c8290e7b562b6cf4fa7af6933aa62720930c5bde67868a7ae19a80ff6b106ddb9c0c311a7feda8455842b5365ce6d901001f056abd876b3e43df416758c774ccb2812e65015ed0b8842bd64eaedb3091495364373194c8291924cde4eb65b0168d36955facea07381b9a4e74fa4c0f111cc2fbf6cd1ea6877a05e7d76dc889950a0af8a3842cf9e6364c087a3d48f2dfc7e7f89b7aa5060d8e3c2e7630e2a22d7e017e36c2e9fcd5e64ba064ca4f8e00a658f5fefd6b640a426762cd0f8368575b72e7b5a6431e3e326a41614b2f54f06fa19d4a475b9da7f71d8bdc5e22c3e9e6ddfe7b31706ad0e0e97bef4388bbbdb5e2cb77e43eb48248565888a7a67a38fe5344e4d43ddccca47ad855d1174aed891ab7cb13c7773d32cee8d2a16aca453da8165308f03920d7fd3c360ebb9451374df5632af7bcadf36fd435da0c0217370b4c9a6e1d63e0fa0ccaaee41f1f885ea0e9e58e9828a4b8ba15adf788ec35a8b7812ec90544402f24fd4aa56d6b6cc69503e0b9937ba71bd84d4ad99d88d26ebe9d2d1634f5db9ae05d89fcffd8aea9e4d611fde1ce2b86c0e738a88654f9546ed90ee732c896f75e86356cf5b55dac78a4a30d235de529"], 0x48}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000080)={@rand_addr="51167d89eb1b870dd49a376400", @dev, @rand_addr="ee5974510000000a00", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10}) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000140)={@local, @rand_addr="6409c0b80e989be29fc70dc012b95603", @ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400003, r10}) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000f00)=ANY=[@ANYBLOB="2000000011000d0400"/20, @ANYRES32=r13, @ANYBLOB="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"], 0x20}}, 0x0) 18:06:04 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:06:04 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:06:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 18:06:04 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:06:04 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) 18:06:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) [ 2678.887459][ T9776] PF_BRIDGE: br_mdb_parse() with invalid attr [ 2678.914639][ T9756] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2679.074890][ T9784] PF_BRIDGE: br_mdb_parse() with invalid attr 18:06:04 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 18:06:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) [ 2679.352144][ T9791] PF_BRIDGE: br_mdb_parse() with invalid attr 18:06:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000100)="1f00000055000d0000000000fc07ff1b070304000d00000007000100010039", 0x1f) 18:06:05 executing program 2: chown(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x8bec425e, 0x0, 0x0, &(0x7f0000001700)={[{@gid={'gid'}}]}) 18:06:05 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r11 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2679.600053][ T9795] PF_BRIDGE: br_mdb_parse() with invalid attr